linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH 0/3] tracing/filter: make filter_pred_pchar() survive the access to user space
@ 2022-01-07  4:49 Pingfan Liu
  2022-01-07  4:49 ` [PATCH 1/3] tracing/filter: degrade addr in filter_pred_string() from double pointer to pointer Pingfan Liu
                   ` (2 more replies)
  0 siblings, 3 replies; 9+ messages in thread
From: Pingfan Liu @ 2022-01-07  4:49 UTC (permalink / raw)
  To: linux-kernel; +Cc: Pingfan Liu, Steven Rostedt, Ingo Molnar

When
  echo "filename ~ \"cpu\"" > events/syscalls/sys_enter_openat/filter
  echo 1 > events/syscalls/sys_enter_at/enable
    
The kernel will run into a #PF (see [3/3].
This series resorts to copy_from_user() to cope with the access to user
space.

Cc: Steven Rostedt <rostedt@goodmis.org>
Cc: Ingo Molnar <mingo@redhat.com>
To: linux-kernel@vger.kernel.org


Pingfan Liu (3):
  tracing/filter: degrade addr in filter_pred_string() from double
    pointer to pointer
  tracing/filter: harden the prototype of predicate_parse()
  tracing/filter: make filter_pred_pchar() survive the access to user
    space

 kernel/trace/trace.h               |  1 +
 kernel/trace/trace_events_filter.c | 38 ++++++++++++++++++++++++------
 2 files changed, 32 insertions(+), 7 deletions(-)

-- 
2.31.1


^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2022-01-10  2:58 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-01-07  4:49 [PATCH 0/3] tracing/filter: make filter_pred_pchar() survive the access to user space Pingfan Liu
2022-01-07  4:49 ` [PATCH 1/3] tracing/filter: degrade addr in filter_pred_string() from double pointer to pointer Pingfan Liu
2022-01-07 17:18   ` Steven Rostedt
2022-01-10  2:58     ` Pingfan Liu
2022-01-07  4:49 ` [PATCH 2/3] tracing/filter: harden the prototype of predicate_parse() Pingfan Liu
2022-01-07  4:49 ` [PATCH 3/3] tracing/filter: make filter_pred_pchar() survive the access to user space Pingfan Liu
2022-01-07 22:25   ` Steven Rostedt
2022-01-08  6:49   ` kernel test robot
2022-01-08  8:20   ` kernel test robot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).