[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230411211709.15018-1-beaub@linux.microsoft.com>
Date: Tue, 11 Apr 2023 14:17:06 -0700
From: Beau Belgrave <beaub@...ux.microsoft.com>
To: rostedt@...dmis.org, mhiramat@...nel.org,
mathieu.desnoyers@...icios.com, dcook@...ux.microsoft.com,
alanau@...ux.microsoft.com
Cc: linux-kernel@...r.kernel.org, linux-trace-kernel@...r.kernel.org
Subject: [PATCH 0/3] tracing/user_events: Fixes and improvements for 6.4
Now that user_events is in for-next we broadened our integration of
user_events. During this integration we found a few things that can
help prevent the debugging of issues for user_events when user
processes use the ABI directly.
The most important thing found is an out of bounds fix with the
write index. If it is negative, an out of bounds access is attempted.
This bug was introduced on one of the very first user_events patches
and remained unseen for a long time. Apologies for not catching that
sooner.
We think users will expect the kernel to always clear the registered
bit when events are unregistered, even if the event is still enabled
in a kernel tracer. The user process could do this after unregistering,
but it seems appropriate for the kernel side to attempt this. We also
discussed if it makes sense for the kernel to allow user processes
to tie multiple events to the same value and bit. While this doesn't
cause any issues on the kernel side, it leads to very undefined
behavior for the user process. Depending on which event gets enabled
when, the bit will vary.
Beau Belgrave (3):
tracing/user_events: Ensure write index cannot be negative
tracing/user_events: Ensure bit is cleared on unregister
tracing/user_events: Prevent same address and bit per process
kernel/trace/trace_events_user.c | 77 +++++++++++++++++++
.../testing/selftests/user_events/abi_test.c | 9 ++-
.../selftests/user_events/ftrace_test.c | 14 +++-
3 files changed, 96 insertions(+), 4 deletions(-)
base-commit: 88fe1ec75fcb296579e05eaf3807da3ee83137e4
--
2.25.1
Powered by blists - more mailing lists