![]() This commit adds minimal support for compiler-instrumentation based memory access sanitization. Currently we only support detection of kmalloc redzone accesses, and kmalloc use-after-free accesses. Support for inline checks (for improved performance), and for stack use-after-return and use-after-return detection is left for future PRs. |
||
---|---|---|
.. | ||
Bus | ||
DeviceIdentifiers | ||
Devices | ||
Firmware | ||
Kernel |