aboutsummaryrefslogtreecommitdiffstats
path: root/tools/perf/scripts/python/bin/stackcollapse-report
diff options
context:
space:
mode:
authorAndy Lutomirski <luto@kernel.org>2021-02-09 18:33:45 -0800
committerBorislav Petkov <bp@suse.de>2021-02-10 16:27:57 +0100
commitca247283781d754216395a41c5e8be8ec79a5f1c (patch)
tree1c37b9a7d3880b66e489f9e254cf4775982a5429 /tools/perf/scripts/python/bin/stackcollapse-report
parentx86/fault: Don't look for extable entries for SMEP violations (diff)
downloadlinux-ca247283781d754216395a41c5e8be8ec79a5f1c.tar.gz
linux-ca247283781d754216395a41c5e8be8ec79a5f1c.zip
x86/fault: Don't run fixups for SMAP violations
A SMAP-violating kernel access is not a recoverable condition. Imagine kernel code that, outside of a uaccess region, dereferences a pointer to the user range by accident. If SMAP is on, this will reliably generate as an intentional user access. This makes it easy for bugs to be overlooked if code is inadequately tested both with and without SMAP. This was discovered because BPF can generate invalid accesses to user memory, but those warnings only got printed if SMAP was off. Make it so that this type of error will be discovered with SMAP on as well. [ bp: Massage commit message. ] Signed-off-by: Andy Lutomirski <luto@kernel.org> Signed-off-by: Borislav Petkov <bp@suse.de> Link: https://lkml.kernel.org/r/66a02343624b1ff46f02a838c497fc05c1a871b3.1612924255.git.luto@kernel.org
Diffstat (limited to 'tools/perf/scripts/python/bin/stackcollapse-report')
0 files changed, 0 insertions, 0 deletions
4fd123a3d15223d26994f2fe1b95d8&follow=1'>crypto: drbg - Use Kconfig to ensure at least one RNG option is setHerbert Xu3-16/+10 2014-07-04crypto: drbg - use of kernel linked listStephan Mueller2-112/+128 2014-07-04crypto: drbg - fix memory corruption for AES192Stephan Mueller1-3/+11 2014-07-03crypto: ux500 - make interrupt mode plausibleArnd Bergmann1-13/+12 2014-07-03crypto: tcrypt - print cra driver name in tcrypt tests outputLuca Clementi1-11/+20