diff options
| author | Marco Elver <[email protected]> | 2024-11-08 11:34:24 +0000 |
|---|---|---|
| committer | Kees Cook <[email protected]> | 2024-12-23 04:28:11 +0000 |
| commit | c38904ebb74b455a44e3b9a679aef320361654ae (patch) | |
| tree | ddf8d449ea3226c63fe5ef3e3dfc7da2279402da /drivers/gpu/drm/amd/amdgpu/amdgpu_object.c | |
| parent | Linux 6.13-rc4 (diff) | |
| download | kernel-c38904ebb74b455a44e3b9a679aef320361654ae.tar.gz kernel-c38904ebb74b455a44e3b9a679aef320361654ae.zip | |
tracing: Add task_prctl_unknown tracepoint
prctl() is a complex syscall which multiplexes its functionality based
on a large set of PR_* options. Currently we count 64 such options. The
return value of unknown options is -EINVAL, and doesn't distinguish from
known options that were passed invalid args that also return -EINVAL.
To understand if programs are attempting to use prctl() options not yet
available on the running kernel, provide the task_prctl_unknown
tracepoint.
Note, this tracepoint is in an unlikely cold path, and would therefore
be suitable for continuous monitoring (e.g. via perf_event_open).
While the above is likely the simplest usecase, additionally this
tracepoint can help unlock some testing scenarios (where probing
sys_enter or sys_exit causes undesirable performance overheads):
a. unprivileged triggering of a test module: test modules may register a
probe to be called back on task_prctl_unknown, and pick a very large
unknown prctl() option upon which they perform a test function for an
unprivileged user;
b. unprivileged triggering of an eBPF program function: similar
as idea (a).
Example trace_pipe output:
test-380 [001] ..... 78.142904: task_prctl_unknown: option=1234 arg2=101 arg3=102 arg4=103 arg5=104
Signed-off-by: Marco Elver <[email protected]>
Reviewed-by: Alexander Potapenko <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Kees Cook <[email protected]>
Diffstat (limited to 'drivers/gpu/drm/amd/amdgpu/amdgpu_object.c')
0 files changed, 0 insertions, 0 deletions
