|
Message-ID: <201906172225.4645462F1E@keescook> Date: Mon, 17 Jun 2019 22:26:54 -0700 From: Kees Cook <keescook@...omium.org> To: Andrew Morton <akpm@...ux-foundation.org> Cc: Alexander Potapenko <glider@...gle.com>, Christoph Lameter <cl@...ux.com>, Masahiro Yamada <yamada.masahiro@...ionext.com>, Michal Hocko <mhocko@...nel.org>, James Morris <jmorris@...ei.org>, "Serge E. Hallyn" <serge@...lyn.com>, Nick Desaulniers <ndesaulniers@...gle.com>, Kostya Serebryany <kcc@...gle.com>, Dmitry Vyukov <dvyukov@...gle.com>, Sandeep Patil <sspatil@...roid.com>, Laura Abbott <labbott@...hat.com>, Randy Dunlap <rdunlap@...radead.org>, Jann Horn <jannh@...gle.com>, Mark Rutland <mark.rutland@....com>, Marco Elver <elver@...gle.com>, linux-mm@...ck.org, linux-security-module@...r.kernel.org, kernel-hardening@...ts.openwall.com Subject: Re: [PATCH v7 1/2] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options On Mon, Jun 17, 2019 at 10:19:32PM -0700, Andrew Morton wrote: > On Mon, 17 Jun 2019 22:07:41 -0700 Kees Cook <keescook@...omium.org> wrote: > > > This is expected to be on-by-default on Android and Chrome > > OS. And it gives the opportunity for anyone else to use it under distros > > too via the boot args. (The init_on_free feature is regularly requested > > by folks where memory forensics is included in their thread models.) > > Thanks. I added the above to the changelog. I assumed s/thread/threat/ Heh whoops, yes, "threat" was intended. Thanks! :) -- Kees Cook
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.