On Sun, Jan 31, 2021 at 09:24:41AM -0800, Andy Lutomirski wrote:
> A SMAP-violating kernel access is not a recoverable condition. Imagine
> kernel code that, outside of a uaccess region, dereferences a pointer to
> the user range by accident. If SMAP is on, this will reliably generate
> as an
A SMAP-violating kernel access is not a recoverable condition. Imagine
kernel code that, outside of a uaccess region, dereferences a pointer to
the user range by accident. If SMAP is on, this will reliably generate
as an intentional user access. This makes it easy for bugs to be
overlooked if
2 matches
Mail list logo