[PATCH 0/2] tracing: Fix filtering on string pointers

From: Steven Rostedt
Date: Fri Jan 07 2022 - 17:58:44 EST


If filtering on an event's string pointer that happens to point into
user space, then the pointer could cause a page fault and crash the
kernel.

Also, have system call events use the temp buffer when filtering.


Steven Rostedt (2):
tracing: Have syscall trace events use trace_event_buffer_lock_reserve()
tracing: Add test for user space strings when filtering on string pointers

----
kernel/trace/trace_events_filter.c | 79 +++++++++++++++++++++++++++++++++++++-
kernel/trace/trace_syscalls.c | 6 +--
2 files changed, 79 insertions(+), 6 deletions(-)