[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20210529135558.7ec54cb7@oasis.local.home>
Date: Sat, 29 May 2021 13:55:58 -0400
From: Steven Rostedt <rostedt@...dmis.org>
To: Pavel Begunkov <asml.silence@...il.com>
Cc: Olivier Langlois <olivier@...llion01.com>,
Stefan Metzmacher <metze@...ba.org>,
Jens Axboe <axboe@...nel.dk>, Ingo Molnar <mingo@...hat.com>,
io-uring@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] io_uring: Add to traces the req pointer when available
On Sat, 29 May 2021 13:30:31 +0100
Pavel Begunkov <asml.silence@...il.com> wrote:
> io_uring offers all different operations and has internal request/memory
> recycling, so it may be an easy vector of attack in case of some
> vulnerabilities found, but nothing special. As that's the status quo,
> I wouldn't care, let's put aside my concerns and print them raw.
There's a lot of information that the tracing subsystem gives that would
help several vectors of attack without the need for pointers. That's
why there's a lockdown method to disable all tracing. But the tracing
system is also good at finding out if your system has been compromised ;-)
-- Steve
Powered by blists - more mailing lists