diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2024-12-20 19:13:26 +0100 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2024-12-20 19:13:26 +0100 |
commit | 5b83bcdea521534f370cd2b24bc8cbd76c8a6f32 (patch) | |
tree | 7a594fe552f6c7aa3dd1d4bbf0def74af9035486 /MAINTAINERS | |
parent | Merge tag 'net-6.13-rc4' of git://git.kernel.org/pub/scm/linux/kernel/git/net... (diff) | |
parent | trace/ring-buffer: Do not use TP_printk() formatting for boot mapped buffers (diff) | |
download | linux-5b83bcdea521534f370cd2b24bc8cbd76c8a6f32.tar.xz linux-5b83bcdea521534f370cd2b24bc8cbd76c8a6f32.zip |
Merge tag 'trace-ringbuffer-v6.13-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace
Pull ring-buffer fixes from Steven Rostedt:
- Fix possible overflow of mmapped ring buffer with bad offset
If the mmap() to the ring buffer passes in a start address that is
passed the end of the mmapped file, it is not caught and a
slab-out-of-bounds is triggered.
Add a check to make sure the start address is within the bounds
- Do not use TP_printk() to boot mapped ring buffers
As a boot mapped ring buffer's data may have pointers that map to the
previous boot's memory map, it is unsafe to allow the TP_printk() to
be used to read the boot mapped buffer's events. If a TP_printk()
points to a static string from within the kernel it will not match
the current kernel mapping if KASLR is active, and it can fault.
Have it simply print out the raw fields.
* tag 'trace-ringbuffer-v6.13-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace:
trace/ring-buffer: Do not use TP_printk() formatting for boot mapped buffers
ring-buffer: Fix overflow in __rb_map_vma
Diffstat (limited to 'MAINTAINERS')
0 files changed, 0 insertions, 0 deletions