mirror of
https://github.com/Fishwaldo/Star64_linux.git
synced 2025-06-26 00:21:17 +00:00
mm/page_poisoning.c: allow for zero poisoning
By default, page poisoning uses a poison value (0xaa) on free. If this is changed to 0, the page is not only sanitized but zeroing on alloc with __GFP_ZERO can be skipped as well. The tradeoff is that detecting corruption from the poisoning is harder to detect. This feature also cannot be used with hibernation since pages are not guaranteed to be zeroed after hibernation. Credit to Grsecurity/PaX team for inspiring this work Signed-off-by: Laura Abbott <labbott@fedoraproject.org> Acked-by: Rafael J. Wysocki <rjw@rjwysocki.net> Cc: "Kirill A. Shutemov" <kirill.shutemov@linux.intel.com> Cc: Vlastimil Babka <vbabka@suse.cz> Cc: Michal Hocko <mhocko@suse.com> Cc: Kees Cook <keescook@chromium.org> Cc: Mathias Krause <minipli@googlemail.com> Cc: Dave Hansen <dave.hansen@intel.com> Cc: Jianyu Zhan <nasa4836@gmail.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
This commit is contained in:
parent
8823b1dbc0
commit
1414c7f4f7
7 changed files with 60 additions and 5 deletions
|
@ -106,12 +106,15 @@ struct page_ext *lookup_page_ext(struct page *page)
|
|||
struct page_ext *base;
|
||||
|
||||
base = NODE_DATA(page_to_nid(page))->node_page_ext;
|
||||
#ifdef CONFIG_DEBUG_VM
|
||||
#if defined(CONFIG_DEBUG_VM) || defined(CONFIG_PAGE_POISONING)
|
||||
/*
|
||||
* The sanity checks the page allocator does upon freeing a
|
||||
* page can reach here before the page_ext arrays are
|
||||
* allocated when feeding a range of pages to the allocator
|
||||
* for the first time during bootup or memory hotplug.
|
||||
*
|
||||
* This check is also necessary for ensuring page poisoning
|
||||
* works as expected when enabled
|
||||
*/
|
||||
if (unlikely(!base))
|
||||
return NULL;
|
||||
|
@ -180,12 +183,15 @@ struct page_ext *lookup_page_ext(struct page *page)
|
|||
{
|
||||
unsigned long pfn = page_to_pfn(page);
|
||||
struct mem_section *section = __pfn_to_section(pfn);
|
||||
#ifdef CONFIG_DEBUG_VM
|
||||
#if defined(CONFIG_DEBUG_VM) || defined(CONFIG_PAGE_POISONING)
|
||||
/*
|
||||
* The sanity checks the page allocator does upon freeing a
|
||||
* page can reach here before the page_ext arrays are
|
||||
* allocated when feeding a range of pages to the allocator
|
||||
* for the first time during bootup or memory hotplug.
|
||||
*
|
||||
* This check is also necessary for ensuring page poisoning
|
||||
* works as expected when enabled
|
||||
*/
|
||||
if (!section->page_ext)
|
||||
return NULL;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue