Re: [PATCH] tracing: Fix out-of-range read in trace_stack_print()

2019-06-30 Thread Eiichi Tsukata
On 2019/06/15 5:31, Steven Rostedt wrote: ... > >> >> Fixes: 4a9bd3f134dec ("tracing: Have dynamic size event stack traces") > > Actually it fixes: > > 4285f2fcef80 ("tracing: Remove the ULONG_MAX stack trace hackery") > > Because before that, a ULONG_MAX was inserted into the buffer. >

Re: [PATCH] tracing: Fix out-of-range read in trace_stack_print()

2019-06-14 Thread Steven Rostedt
On Mon, 10 Jun 2019 13:00:16 +0900 Eiichi Tsukata wrote: > Puts range check before dereferencing the pointer. > > Reproducer: > > # echo stacktrace > trace_options > # echo 1 > events/enable > # cat trace > /dev/null > > Thanks I applied this. > > Fixes: 4a9bd3f134dec ("tracing: Have

[PATCH] tracing: Fix out-of-range read in trace_stack_print()

2019-06-09 Thread Eiichi Tsukata
Puts range check before dereferencing the pointer. Reproducer: # echo stacktrace > trace_options # echo 1 > events/enable # cat trace > /dev/null KASAN report: == BUG: KASAN: use-after-free in