diff options
author | Andreas Kling <kling@serenityos.org> | 2021-12-19 16:38:46 +0100 |
---|---|---|
committer | Andreas Kling <kling@serenityos.org> | 2021-12-19 18:18:38 +0100 |
commit | 8ef9b003adb7922d9154793b745b1127f418b483 (patch) | |
tree | 4896be30da16357a3c17d240f42c75493b2eea48 /AK/kmalloc.cpp | |
parent | d82c91ac2c83b68d9ac41b1d32436a2eb9535ab6 (diff) | |
download | serenity-8ef9b003adb7922d9154793b745b1127f418b483.zip |
Kernel: Stop perf event stack walk on bogus userspace->kernel traversal
When walking the stack to generate a perf_event sample, we now check
if a userspace stack frame points back into kernel memory.
It was possible to use this as an arbitrary kernel memory read. :^)
Diffstat (limited to 'AK/kmalloc.cpp')
0 files changed, 0 insertions, 0 deletions