|
Message-ID: <20200702152142.GA6742@pi3.com.pl> Date: Thu, 2 Jul 2020 17:21:42 +0200 From: Adam Zabrocki <pi3@....com.pl> To: lkrg-users@...ts.openwall.com Subject: Re: use miss check, lead to null pointer crash Hi, We do not support kernels compiled with CLANG. Our stack walk algorithm is designed for default GCC case. If you verify pointer against NULL, you just mask the problem (and most likely generate False Possitives). CLANG stack-walk would need to be rewritten. However, as I mentioned we do not support such case. For now you can completely disable pCFI. Thanks, Adam On Thu, Jul 02, 2020 at 05:36:24PM +0800, youyan wrote: > Hi lkrg team: > In function p_ed_enforce_pcfi(),fellow code miss check before use : > p_frame.fp = *(unsigned long *)(p_fp - 12); > p_frame.sp = *(unsigned long *)(p_fp - 8); > p_frame.pc = *(unsigned long *)(p_fp - 4); > above code will lead to null pointer crash. This null pointer situation exist LKRG complie by clang 8.0. -- pi3 (pi3ki31ny) - pi3 (at) itsec pl http://pi3.com.pl
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.