summaryrefslogtreecommitdiff
path: root/AK/kmalloc.cpp
diff options
context:
space:
mode:
authorAndreas Kling <kling@serenityos.org>2021-12-19 16:38:46 +0100
committerAndreas Kling <kling@serenityos.org>2021-12-19 18:18:38 +0100
commit8ef9b003adb7922d9154793b745b1127f418b483 (patch)
tree4896be30da16357a3c17d240f42c75493b2eea48 /AK/kmalloc.cpp
parentd82c91ac2c83b68d9ac41b1d32436a2eb9535ab6 (diff)
downloadserenity-8ef9b003adb7922d9154793b745b1127f418b483.zip
Kernel: Stop perf event stack walk on bogus userspace->kernel traversal
When walking the stack to generate a perf_event sample, we now check if a userspace stack frame points back into kernel memory. It was possible to use this as an arbitrary kernel memory read. :^)
Diffstat (limited to 'AK/kmalloc.cpp')
0 files changed, 0 insertions, 0 deletions