Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20200702152142.GA6742@pi3.com.pl>
Date: Thu, 2 Jul 2020 17:21:42 +0200
From: Adam Zabrocki <pi3@....com.pl>
To: lkrg-users@...ts.openwall.com
Subject: Re: use miss check, lead to null pointer crash

Hi,

We do not support kernels compiled with CLANG. Our stack walk algorithm is 
designed for default GCC case.
If you verify pointer against NULL, you just mask the problem (and most likely 
generate False Possitives). CLANG stack-walk would need to be rewritten. 
However, as I mentioned we do not support such case.

For now you can completely disable pCFI.

Thanks,
Adam

On Thu, Jul 02, 2020 at 05:36:24PM +0800, youyan wrote:
> Hi lkrg team:
>      In function p_ed_enforce_pcfi(),fellow code  miss check before use :
>       p_frame.fp = *(unsigned long *)(p_fp - 12);
>       p_frame.sp = *(unsigned long *)(p_fp - 8);
>       p_frame.pc = *(unsigned long *)(p_fp - 4);
>     above code will lead to null pointer crash.  This null pointer situation  exist LKRG complie by clang 8.0.

-- 
pi3 (pi3ki31ny) - pi3 (at) itsec pl
http://pi3.com.pl

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.