On 2019/06/15 5:31, Steven Rostedt wrote:
...
>
>>
>> Fixes: 4a9bd3f134dec ("tracing: Have dynamic size event stack traces")
>
> Actually it fixes:
>
> 4285f2fcef80 ("tracing: Remove the ULONG_MAX stack trace hackery")
>
> Because before that, a ULONG_MAX was inserted into the buffer.
>
>
On Mon, 10 Jun 2019 13:00:16 +0900
Eiichi Tsukata wrote:
> Puts range check before dereferencing the pointer.
>
> Reproducer:
>
> # echo stacktrace > trace_options
> # echo 1 > events/enable
> # cat trace > /dev/null
>
>
Thanks I applied this.
>
> Fixes: 4a9bd3f134dec ("tracing: Have
Puts range check before dereferencing the pointer.
Reproducer:
# echo stacktrace > trace_options
# echo 1 > events/enable
# cat trace > /dev/null
KASAN report:
==
BUG: KASAN: use-after-free in trace_stack_print+0x26b/0x2c
3 matches
Mail list logo