diff options
author | Thomas Garnier <thgarnie@google.com> | 2017-09-07 08:30:44 -0700 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2017-09-17 19:45:32 +0200 |
commit | bf29ed1567b67854dc13504f685c45a2ea9b2081 (patch) | |
tree | 74bc82cb10d5af8b006ab4b9e06f3f1d6e8a12b8 /arch/arm/kernel | |
parent | 0666f560b71b899cd11a7caf39fd45129e9030fd (diff) |
syscalls: Use CHECK_DATA_CORRUPTION for addr_limit_user_check
Use CHECK_DATA_CORRUPTION instead of BUG_ON to provide more flexibility
on address limit failures. By default, send a SIGKILL signal to kill the
current process preventing exploitation of a bad address limit.
Make the TIF_FSCHECK flag optional so ARM can use this function.
Signed-off-by: Thomas Garnier <thgarnie@google.com>
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Cc: Pratyush Anand <panand@redhat.com>
Cc: Dave Martin <Dave.Martin@arm.com>
Cc: Will Drewry <wad@chromium.org>
Cc: Arnd Bergmann <arnd@arndb.de>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Will Deacon <will.deacon@arm.com>
Cc: Russell King <linux@armlinux.org.uk>
Cc: Andy Lutomirski <luto@amacapital.net>
Cc: David Howells <dhowells@redhat.com>
Cc: Dave Hansen <dave.hansen@intel.com>
Cc: Al Viro <viro@zeniv.linux.org.uk>
Cc: linux-api@vger.kernel.org
Cc: Yonghong Song <yhs@fb.com>
Cc: linux-arm-kernel@lists.infradead.org
Link: http://lkml.kernel.org/r/1504798247-48833-2-git-send-email-keescook@chromium.org
Diffstat (limited to 'arch/arm/kernel')
0 files changed, 0 insertions, 0 deletions