diff options
| author | huangshaobo <[email protected]> | 2022-05-09 18:20:51 -0700 |
|---|---|---|
| committer | Andrew Morton <[email protected]> | 2022-05-13 07:20:06 -0700 |
| commit | 3c81b3bb0a33e2b555edb8d7eb99a7ae4f17d8bb (patch) | |
| tree | 355df5684528463a9b24b1f8d9c3c7c460bd43d1 /tools/perf/scripts/python/stackcollapse.py | |
| parent | 4b25f030ae69ba710eff587cabb4c57cb7e7a8a1 (diff) | |
kfence: enable check kfence canary on panic via boot param
Out-of-bounds accesses that aren't caught by a guard page will result in
corruption of canary memory. In pathological cases, where an object has
certain alignment requirements, an out-of-bounds access might never be
caught by the guard page. Such corruptions, however, are only detected on
kfree() normally. If the bug causes the kernel to panic before kfree(),
KFENCE has no opportunity to report the issue. Such corruptions may also
indicate failing memory or other faults.
To provide some more information in such cases, add the option to check
canary bytes on panic. This might help narrow the search for the panic
cause; but, due to only having the allocation stack trace, such reports
are difficult to use to diagnose an issue alone. In most cases, such
reports are inactionable, and is therefore an opt-in feature (disabled by
default).
[[email protected]: add __read_mostly, per Marco]
Link: https://lkml.kernel.org/r/[email protected]
Signed-off-by: huangshaobo <[email protected]>
Suggested-by: chenzefeng <[email protected]>
Reviewed-by: Marco Elver <[email protected]>
Cc: Alexander Potapenko <[email protected]>
Cc: Dmitry Vyukov <[email protected]>
Cc: Xiaoming Ni <[email protected]>
Cc: Wangbing <[email protected]>
Cc: Jubin Zhong <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/stackcollapse.py')
0 files changed, 0 insertions, 0 deletions