On Thu, 27 Mar 2025 11:32:23 -0700
Libo Chen <libo.c...@oracle.com> wrote:

> On 3/27/25 08:49, Steven Rostedt wrote:
> > From: Steven Rostedt <rost...@goodmis.org>
> > 
> > The trace event verifier checks the formats of trace events to make sure
> > that they do not point at memory that is not in the trace event itself or
> > in data that will never be freed. If an event references data that was
> > allocated when the event triggered and that same data is freed before the
> > event is read, then the kernel can crash by reading freed memory.
> > 
> > The verifier runs at boot up (or module load) and scans the print formats
> > of the events and checks their arguments to make sure that dereferenced
> > pointers are safe. If the format uses "%*p.." the verifier will ignore it,
> > and that could be dangerous. Cover this case as well.
> > 
> > Also add to the sample code a use case of "%*pbl".
> > 
> > Link: 
> > https://urldefense.com/v3/__https://lore.kernel.org/all/bcba4d76-2c3f-4d11-baf0-02905db95...@oracle.com/__;!!ACWV5N9M2RV99hQ!LTIVO1_O9wY2hBAnpNF5zcB1EFlC77zOnu4oVcM4DoD77p5ZO_m1LFZdPVJPj4spzye4JntXHOqOVxirPQ$
> >  
> >   
> Thanks Steve, a minor style issue below, otherwise LGTM. I have tested it, it 
> works. 
> 
> Reviewed-by: Libo Chen <libo.c...@oracle.com>
> Tested-by: Libo Chen <libo.c...@oracle.com>

Thanks for testing.

> >  /*
> >   * Notice here the use of some helper functions. This includes:
> > @@ -370,7 +371,10 @@ TRACE_EVENT(foo_bar,
> >  
> >               __get_str(str), __get_str(lstr),
> >               __get_bitmask(cpus), __get_cpumask(cpum),
> > -             __get_str(vstr))
> > +             __get_str(vstr),
> > +            __get_dynamic_array_len(cpus),
> > +            __get_dynamic_array_len(cpus),
> > +            __get_dynamic_array(cpus))  
> 
> __get_dynamic_array_len() calls don't seem to be aligned with the ones above
> 

Ah yeah. I'll update. Note, this isn't going to go into the kernel until at
least 6.16.

-- Steve

Reply via email to