|
Message-ID: <0100016a26fc7605-a9c76ac4-387c-47a3-8c53-a8d208eb0925-000000@email.amazonses.com> Date: Tue, 16 Apr 2019 16:30:40 +0000 From: Christopher Lameter <cl@...ux.com> To: Alexander Potapenko <glider@...gle.com> cc: Andrew Morton <akpm@...ux-foundation.org>, linux-security-module <linux-security-module@...r.kernel.org>, Linux Memory Management List <linux-mm@...ck.org>, Nick Desaulniers <ndesaulniers@...gle.com>, Kostya Serebryany <kcc@...gle.com>, Dmitriy Vyukov <dvyukov@...gle.com>, Kees Cook <keescook@...omium.org>, Sandeep Patil <sspatil@...roid.com>, Laura Abbott <labbott@...hat.com>, Kernel Hardening <kernel-hardening@...ts.openwall.com> Subject: Re: [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL On Tue, 16 Apr 2019, Alexander Potapenko wrote: > > Hmmm... But we already have debugging options that poison objects and > > pages? > Laura Abbott mentioned in one of the previous threads > (https://marc.info/?l=kernel-hardening&m=155474181528491&w=2) that: > > """ > I've looked at doing something similar in the past (failing to find > the thread this morning...) and while this will work, it has pretty > serious performance issues. It's not actually the poisoning which > is expensive but that turning on debugging removes the cpu slab > which has significant performance penalties. Ok you could rework that logic to be able to keep the per cpu slabs? Also if you do the zeroing then you need to do it in the hotpath. And this patch introduces new instructions to that hotpath for checking and executing the zeroing.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.