The patch titled Subject: mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options has been removed from the -mm tree. Its filename was mm-security-introduce-init_on_alloc=1-and-init_on_free=1-boot-options-v10.patch This patch was dropped because it was folded into mm-security-introduce-init_on_alloc=1-and-init_on_free=1-boot-options.patch ------------------------------------------------------ From: Alexander Potapenko <glider@xxxxxxxxxx> Subject: mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options Link: http://lkml.kernel.org/r/20190628093131.199499-2-glider@xxxxxxxxxx Signed-off-by: Alexander Potapenko <glider@xxxxxxxxxx> Acked-by: Kees Cook <keescook@xxxxxxxxxxxx> Acked-by: Michal Hocko <mhocko@xxxxxxxx> Acked-by: James Morris <jamorris@xxxxxxxxxxxxxxxxxxx> Cc: Christoph Lameter <cl@xxxxxxxxx> Cc: Kees Cook <keescook@xxxxxxxxxxxx> Cc: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx> Cc: Michal Hocko <mhocko@xxxxxxxxxx> Cc: James Morris <jmorris@xxxxxxxxx> Cc: "Serge E. Hallyn" <serge@xxxxxxxxxx> Cc: Nick Desaulniers <ndesaulniers@xxxxxxxxxx> Cc: Kostya Serebryany <kcc@xxxxxxxxxx> Cc: Dmitry Vyukov <dvyukov@xxxxxxxxxx> Cc: Sandeep Patil <sspatil@xxxxxxxxxxx> Cc: Laura Abbott <labbott@xxxxxxxxxx> Cc: Randy Dunlap <rdunlap@xxxxxxxxxxxxx> Cc: Jann Horn <jannh@xxxxxxxxxx> Cc: Mark Rutland <mark.rutland@xxxxxxx> Cc: Marco Elver <elver@xxxxxxxxxx> Cc: Qian Cai <cai@xxxxxx> Cc: James Morris <jamorris@xxxxxxxxxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- mm/page_alloc.c | 8 ++++---- mm/slub.c | 5 ++--- 2 files changed, 6 insertions(+), 7 deletions(-) --- a/mm/page_alloc.c~mm-security-introduce-init_on_alloc=1-and-init_on_free=1-boot-options-v10 +++ a/mm/page_alloc.c @@ -157,8 +157,8 @@ static int __init early_init_on_alloc(ch if (!buf) return -EINVAL; ret = kstrtobool(buf, &bool_result); - if (bool_result && IS_ENABLED(CONFIG_PAGE_POISONING)) - pr_warn("mem auto-init: CONFIG_PAGE_POISONING is on, will take precedence over init_on_alloc\n"); + if (bool_result && page_poisoning_enabled()) + pr_info("mem auto-init: CONFIG_PAGE_POISONING is on, will take precedence over init_on_alloc\n"); if (bool_result) static_branch_enable(&init_on_alloc); else @@ -175,8 +175,8 @@ static int __init early_init_on_free(cha if (!buf) return -EINVAL; ret = kstrtobool(buf, &bool_result); - if (bool_result && IS_ENABLED(CONFIG_PAGE_POISONING)) - pr_warn("mem auto-init: CONFIG_PAGE_POISONING is on, will take precedence over init_on_free\n"); + if (bool_result && page_poisoning_enabled()) + pr_info("mem auto-init: CONFIG_PAGE_POISONING is on, will take precedence over init_on_free\n"); if (bool_result) static_branch_enable(&init_on_free); else --- a/mm/slub.c~mm-security-introduce-init_on_alloc=1-and-init_on_free=1-boot-options-v10 +++ a/mm/slub.c @@ -1281,9 +1281,8 @@ check_slabs: out: if ((static_branch_unlikely(&init_on_alloc) || static_branch_unlikely(&init_on_free)) && - (slub_debug & SLAB_POISON)) { - pr_warn("mem auto-init: SLAB_POISON will take precedence over init_on_alloc/init_on_free\n"); - } + (slub_debug & SLAB_POISON)) + pr_info("mem auto-init: SLAB_POISON will take precedence over init_on_alloc/init_on_free\n"); return 1; } _ Patches currently in -mm which might be from glider@xxxxxxxxxx are mm-security-introduce-init_on_alloc=1-and-init_on_free=1-boot-options.patch mm-init-report-memory-auto-initialization-features-at-boot-time.patch