On Thu, Aug 13, 2020 at 06:19:21PM +0300, Alexander Popov wrote: > +config SLAB_QUARANTINE > + bool "Enable slab freelist quarantine" > + depends on !KASAN && (SLAB || SLUB) > + help > + Enable slab freelist quarantine to break heap spraying technique > + used for exploiting use-after-free vulnerabilities in the kernel > + code. If this feature is enabled, freed allocations are stored > + in the quarantine and can't be instantly reallocated and > + overwritten by the exploit performing heap spraying. > + This feature is a part of KASAN functionality. After this patch, it isn't part of KASAN any more ;-) The way this is written is a bit too low level. Let's write it in terms that people who don't know the guts of the slab allocator or security terminology can understand: Delay reuse of freed slab objects. This makes some security exploits harder to execute. It reduces performance slightly as objects will be cache cold by the time they are reallocated, and it costs a small amount of memory. (feel free to edit this) > +struct qlist_node { > + struct qlist_node *next; > +}; I appreciate this isn't new, but why do we have a new singly-linked-list abstraction being defined in this code?