2
0
mirror of https://github.com/edk2-porting/linux-next.git synced 2024-12-19 10:44:14 +08:00
linux-next/mm/kfence
Marco Elver 94868a1e12 kfence: zero guard page after out-of-bounds access
After an out-of-bounds accesses, zero the guard page before re-protecting
in kfence_guarded_free().  On one hand this helps make the failure mode of
subsequent out-of-bounds accesses more deterministic, but could also
prevent certain information leaks.

Link: https://lkml.kernel.org/r/20210312121653.348518-1-elver@google.com
Signed-off-by: Marco Elver <elver@google.com>
Acked-by: Alexander Potapenko <glider@google.com>
Cc: Dmitry Vyukov <dvyukov@google.com>
Cc: Andrey Konovalov <andreyknvl@google.com>
Cc: Jann Horn <jannh@google.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2021-05-05 11:27:27 -07:00
..
core.c kfence: zero guard page after out-of-bounds access 2021-05-05 11:27:27 -07:00
kfence_test.c kfence: report sensitive information based on no_hash_pointers 2021-02-26 09:41:02 -08:00
kfence.h kfence: report sensitive information based on no_hash_pointers 2021-02-26 09:41:02 -08:00
Makefile kfence: add test suite 2021-02-26 09:41:02 -08:00
report.c kfence: fix reports if constant function prefixes exist 2021-03-13 11:27:30 -08:00