lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20240528081044.aa2ad32fbec8e15e2144d5f4@kernel.org>
Date: Tue, 28 May 2024 08:10:44 +0900
From: Masami Hiramatsu (Google) <mhiramat@...nel.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Andrii Nakryiko <andrii@...nel.org>, Carlos López
 <clopez@...e.de>, Steven Rostedt <rostedt@...dmis.org>, Masami Hiramatsu
 <mhiramat@...nel.org>, linux-kernel@...r.kernel.org
Subject: [GIT PULL] probes: Fixes for v6.10-rc1

Hi Linus,

Probes fixes for v6.10-rc1:

- uprobes: prevent mutex_lock() under rcu_read_lock(). Recent changes moves
  uprobe_cpu_buffer preparation which involves mutex_lock(), under
  __uprobe_trace_func() which is called inside rcu_read_lock(). Fix it
  by moving uprobe_cpu_buffer preparation outside of __uprobe_trace_func().

- kprobe-events: Fix to handle the error case of btf_find_struct_member().


Please pull the latest probes-fixes-v6.10-rc1 tree, which can be found at:


  git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace.git
probes-fixes-v6.10-rc1

Tag SHA1: bb80683f3a93708ce63bae89b6c712a1a8ff1c43
Head SHA1: e569eb34970281438e2b48a3ef11c87459fcfbcb


Andrii Nakryiko (1):
      uprobes: prevent mutex_lock() under rcu_read_lock()

Carlos López (1):
      tracing/probes: fix error check in parse_btf_field()

----
 kernel/trace/trace_probe.c  |  4 ++++
 kernel/trace/trace_uprobe.c | 14 +++++++++-----
 2 files changed, 13 insertions(+), 5 deletions(-)

-- 
Masami Hiramatsu (Google) <mhiramat@...nel.org>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ