diff options
| author | Breno Leitao <[email protected]> | 2025-07-04 12:47:07 +0000 |
|---|---|---|
| committer | Will Deacon <[email protected]> | 2025-07-04 13:47:06 +0000 |
| commit | ef8923e6c051a98164c2889db943df9695a39888 (patch) | |
| tree | ea5eee060784a73c7b77ce9564ed597d52a0b58c /rust/helpers/pci.c | |
| parent | arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth() (diff) | |
| download | kernel-ef8923e6c051a98164c2889db943df9695a39888.tar.gz kernel-ef8923e6c051a98164c2889db943df9695a39888.zip | |
arm64: efi: Fix KASAN false positive for EFI runtime stack
KASAN reports invalid accesses during arch_stack_walk() for EFI runtime
services due to vmalloc tagging[1]. The EFI runtime stack must be allocated
with KASAN tags reset to avoid false positives.
This patch uses arch_alloc_vmap_stack() instead of __vmalloc_node() for
EFI stack allocation, which internally calls kasan_reset_tag()
The changes ensure EFI runtime stacks are properly sanitized for KASAN
while maintaining functional consistency.
Link: https://lore.kernel.org/all/[email protected]/ [1]
Suggested-by: Andrey Konovalov <[email protected]>
Suggested-by: Catalin Marinas <[email protected]>
Reviewed-by: Catalin Marinas <[email protected]>
Signed-off-by: Breno Leitao <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Will Deacon <[email protected]>
Diffstat (limited to 'rust/helpers/pci.c')
0 files changed, 0 insertions, 0 deletions
