summaryrefslogtreecommitdiff
path: root/certs
diff options
context:
space:
mode:
authorAndy Lutomirski <luto@kernel.org>2016-05-10 01:48:51 +0300
committerLinus Torvalds <torvalds@linux-foundation.org>2016-05-10 03:57:12 +0300
commit0161028b7c8aebef64194d3d73e43bc3b53b5c66 (patch)
tree6e7ffbfc92345548730fb7b33f8168760f99fa28 /certs
parent5c56b563b4486281bff80658194f0d1da6feba67 (diff)
downloadlinux-0161028b7c8aebef64194d3d73e43bc3b53b5c66.tar.xz
perf/core: Change the default paranoia level to 2
Allowing unprivileged kernel profiling lets any user dump follow kernel control flow and dump kernel registers. This most likely allows trivial kASLR bypassing, and it may allow other mischief as well. (Off the top of my head, the PERF_SAMPLE_REGS_INTR output during /dev/urandom reads could be quite interesting.) Signed-off-by: Andy Lutomirski <luto@kernel.org> Acked-by: Kees Cook <keescook@chromium.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'certs')
0 files changed, 0 insertions, 0 deletions