| 概要 | In the Linux kernel, the following vulnerability has been resolved: x86/kexec: Disable KCOV instrumentation after load_segments() The load_segments() function changes segment registers, invalidating GS base To reproduce the problem, it's sufficient to do kexec on a KCOV-instrumented $ kexec -l /boot/otherKernel The real-world context for this problem is enabling crash dump collection in Adding safeguards directly to the KCOV fast-path (__sanitizer_cov_trace_pc()) Disabling instrumentation for the individual functions would be too fragile, The problem is not relevant for 32 bit kernels as CONFIG_KCOV is not supported [ bp: Space out comment for better readability. ] |
|---|---|
| 公表日 | 2026年5月8日23:16 |
| 登録日 | 2026年5月9日4:13 |
| 最終更新日 | 2026年5月8日23:16 |