From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932071AbcBWWiG (ORCPT ); Tue, 23 Feb 2016 17:38:06 -0500 Received: from mail-io0-f181.google.com ([209.85.223.181]:36281 "EHLO mail-io0-f181.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755440AbcBWWh6 (ORCPT ); Tue, 23 Feb 2016 17:37:58 -0500 MIME-Version: 1.0 In-Reply-To: References: <1455844533-24787-1-git-send-email-labbott@fedoraproject.org> <56C79301.5040003@redhat.com> <56C7A02F.7070902@redhat.com> <56CB866A.8070306@redhat.com> Date: Tue, 23 Feb 2016 14:37:58 -0800 X-Google-Sender-Auth: uk6OTJIG4EqV4FLnQPE1pTJSAHk Message-ID: Subject: Re: [PATCHv2] lkdtm: Add READ_AFTER_FREE test From: Kees Cook To: Laura Abbott Cc: Laura Abbott , Greg Kroah-Hartman , Arnd Bergmann , "kernel-hardening@lists.openwall.com" , LKML Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 23, 2016 at 1:25 PM, Kees Cook wrote: > zero poison only: > DEBUG_PAGEALLOC=n > PAGE_POISONING=y > PAGE_POISONING_NO_SANITY=y > PAGE_POISONING_ZERO=y > page_poison=on This combo (in next-20160223) results in an unusable system. :( [ 1.754183] random: init urandom read with 11 bits of entropy available [ 1.768449] hostname (1171) used greatest stack depth: 11808 bytes left [ 1.787954] BUG: Bad page map in process init pte:3d656c6f736e6f63 pmd:00020067 [ 1.789177] addr:00007f9f68200000 vm_flags:00000070 anon_vma: (null) mapping:ffff88007c314058 index:141 [ 1.790564] file:libdl-2.19.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage -Kees -- Kees Cook Chrome OS & Brillo Security