Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932534AbdCFTLM (ORCPT ); Mon, 6 Mar 2017 14:11:12 -0500 Received: from mail-pf0-f177.google.com ([209.85.192.177]:33434 "EHLO mail-pf0-f177.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932322AbdCFTJ4 (ORCPT ); Mon, 6 Mar 2017 14:09:56 -0500 From: Kees Cook To: kernel-hardening@lists.openwall.com Cc: Kees Cook , Andrew Morton , Rik van Riel , "Paul E. McKenney" , Jakub Kicinski , Viresh Kumar , Ingo Molnar , Thomas Gleixner , Dmitry Vyukov , Olof Johansson , Peter Zijlstra , Josh Poimboeuf , linux-kernel@vger.kernel.org Subject: [PATCH 0/6] bug: further enhance use of BUG_ON_DATA_CORRUPTION Date: Mon, 6 Mar 2017 11:09:40 -0800 Message-Id: <1488827386-87193-1-git-send-email-keescook@chromium.org> X-Mailer: git-send-email 2.7.4 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 496 Lines: 12 This continues in applying the CHECK_DATA_CORRUPTION tests where appropriate, and pulling similar CONFIGs under the same check. Most notably, this adds the checks to refcount_t so that system builders can Oops their kernels when encountering a potential refcounter attack. (And so now the LKDTM tests for refcount issues pass correctly.) I'd love to get people's Acks in case this needs to go through the kspp tree instead of something else, like maybe -mm if that seems better. Thanks, -Kees