Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753363AbcDFUye (ORCPT ); Wed, 6 Apr 2016 16:54:34 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:45222 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751776AbcDFUyb (ORCPT ); Wed, 6 Apr 2016 16:54:31 -0400 Date: Wed, 6 Apr 2016 13:54:29 -0700 From: Greg KH To: kernel-hardening@lists.openwall.com Cc: Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Andrew Morton , gthelen@google.com, keescook@chromium.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, labbott@fedoraproject.org, Thomas Garnier Subject: Re: [kernel-hardening] [RFC v1] mm: SLAB freelist randomization Message-ID: <20160406205429.GA13901@kroah.com> References: <1459971348-81477-1-git-send-email-thgarnie@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1459971348-81477-1-git-send-email-thgarnie@google.com> User-Agent: Mutt/1.6.0 (2016-04-01) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 429 Lines: 12 On Wed, Apr 06, 2016 at 12:35:48PM -0700, Thomas Garnier wrote: > Provide an optional config (CONFIG_FREELIST_RANDOM) to randomize the > SLAB freelist. This security feature reduces the predictability of > the kernel slab allocator against heap overflows. > > Randomized lists are pre-computed using a Fisher-Yates shuffle and > re-used on slab creation for performance. > --- > Based on next-20160405 > --- No signed-off-by:?