[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230915123605.3732345-1-ruanjinjie@huawei.com>
Date: Fri, 15 Sep 2023 20:36:03 +0800
From: Jinjie Ruan <ruanjinjie@...wei.com>
To: <peterz@...radead.org>, <tglx@...utronix.de>,
<rostedt@...dmis.org>, <mingo@...nel.org>, <jpoimboe@...nel.org>,
<christophe.leroy@...roup.eu>, <linux-kernel@...r.kernel.org>
CC: <ruanjinjie@...wei.com>
Subject: [PATCH v2 0/2] static_call: Fix two wild-memory-access bugs in static_call_del_module()
In __static_call_init(), any one of the kzalloc fails will cause
wild-memory-access when traverse the site and subsequent sites in
static_call_del_module().
Changes in v2:
- Add a new patch which fix a a similar problem.
- Update the commit message and simplify error stack for the first.
Jinjie Ruan (2):
static_call: Fix a wild-memory-access bug in static_call_del_module()
static_call: Fix a wild-memory-access bug when
static_call_key_sites(key) is true
kernel/static_call_inline.c | 11 ++++++++---
1 file changed, 8 insertions(+), 3 deletions(-)
--
2.34.1
Powered by blists - more mailing lists