Hi Peter and Ingo, This is a respin to address Ingo's comments: I replaced the awkward address comparison against PAGE_OFFSET with a kernel_ip() in the first patch and amended the wording in the second. The original story follows.
Due to imprecise IP sampling, BTS may (and often does) leak kernel addresses when kernel tracing is not even enabled, which results in mostly syscall entry points and page_fault handler addresses being exposed. This might be a security concern for the address randomization, and it also makes life harder for gdb that makes use of bts samples. This patchset works around the old (DS) driver and disables the new (intel_bts) for the unprivileged users on systems where perf paranoia level prohibits kernel tracing. Not sure if these should be treated as bugfixes. Alexander Shishkin (2): perf/x86/intel/ds: Work around BTS leaking kernel addresses perf/x86/intel/bts: Disallow use by unprivileged users on paranoid systems arch/x86/kernel/cpu/perf_event_intel_bts.c | 13 ++++++++++ arch/x86/kernel/cpu/perf_event_intel_ds.c | 40 +++++++++++++++++++++++++----- 2 files changed, 47 insertions(+), 6 deletions(-) -- 2.5.0 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/