Received: by 2002:a05:7412:e794:b0:fa:551:50a7 with SMTP id o20csp1236405rdd; Wed, 10 Jan 2024 13:01:31 -0800 (PST) X-Google-Smtp-Source: AGHT+IFG4Z4gXW0kWxLZOmd3e/jU0Wt4frzO8bW7w7UyBgL0LqKVZPKoUB4bz/YpdgztxB69/FlK X-Received: by 2002:a05:6402:cb0:b0:558:14e6:ccac with SMTP id cn16-20020a0564020cb000b0055814e6ccacmr59680edb.20.1704920491576; Wed, 10 Jan 2024 13:01:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704920491; cv=none; d=google.com; s=arc-20160816; b=LcnCygg5+a/+1cPclxllvgfPiOzKLG0FBDFybw+s5qp24fh7aJ663uOxv4n3kwmrpg A9ZtLrIplKxK2LjPRKggFI7/SG2pwF2ripmG+/Q7cOcUAVM/O279WtSjFLyhCCgMk+32 yym6qkLI3pEcnHkAWkhVz0D+pFJRglPlYp4jMtMaAzZInMua/H1XMFSkmpQW0q1xF1XB 1KFHb22SEUF/qe5M+P65YogMwZ+xu3A51/iqGWvMuJRBUPI1NQ8m/ByjTl/JAjBy6qq4 n/yAzkG3nJY30nWrpUVRG7V8+pTFdiRNa5hzkyPU2W9g3gNmWbM5CIP1/svFtd26U5l5 uBbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:subject:from:to:content-language :user-agent:mime-version:list-unsubscribe:list-subscribe:list-id :precedence:date:message-id:dkim-signature; bh=VpKcoHkFT/HCjVEdf99KMsLaGlVxkHWHq/VtkGwMZYQ=; fh=Lw9LIRxkavfzKXyFLj4fw+K9q+tlYcwqDzXbVF/6HMg=; b=Tpd6DUlyladkXiCEUwyPaP3mnbMLNrTBCzUGYh6wQWbxbiTKpc1vdudkxGCfTL87Jt P8FR/lEtjFo4OD/iiv/utTNPeaKgL9MW2jM/cPM+8VgYGjSFSk7QXWnMlVJJYB9z6Yy4 Z9QsYOWLfV2nCjiQUE1j2GfdG+wUWGZ8qjBgh0FF0XUJOF5KxyUSzXsdcBA2ynPsYi8J 0Q6O4lHg3RLe71Wn7gmnQgV45zjneBQEV8pyw85eZwHZq26kGl6tN47hxKgfnJTV/LMk bUG/EmI1zPONoaYN6HxRqpEsoqRW8PoQLamoPOTul1V8ONjH6MLBuBIn4Toye79SVUpE Awzw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@efficios.com header.s=smtpout1 header.b=YjtzUWxR; spf=pass (google.com: domain of linux-kernel+bounces-22790-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-22790-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=efficios.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id u23-20020a509517000000b005549501bc01si2003283eda.650.2024.01.10.13.01.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 10 Jan 2024 13:01:31 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-22790-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@efficios.com header.s=smtpout1 header.b=YjtzUWxR; spf=pass (google.com: domain of linux-kernel+bounces-22790-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-22790-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=efficios.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 4E0D71F292DF for ; Wed, 10 Jan 2024 20:53:58 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id B73714F1F4; Wed, 10 Jan 2024 20:53:51 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=efficios.com header.i=@efficios.com header.b="YjtzUWxR" Received: from smtpout.efficios.com (smtpout.efficios.com [167.114.26.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id F227D4E1C6; Wed, 10 Jan 2024 20:53:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=efficios.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=efficios.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=efficios.com; s=smtpout1; t=1704920027; bh=rBlGuLxYhPO4Q5+DuTMP3udTcgw/RgKOGGYRl4n1514=; h=Date:To:From:Subject:From; b=YjtzUWxRRez+XoxmspiC3XRAaDzLmC/z22Ev4zgL2hJzydWRpAnPOyPE9l6K3jKk3 7LUeEpSUKCLv+7I/NCHET8BkXn63497FAFjJHLjD7guQXBFqwiwEnZBbrbez6Rs/OF +3E3O44ilNeox6QUTv8BM9h3EujC3ysEAo/Jj1k6cLkJT0aob7vKDzSBi/ZoQD8gEF mpzEg/fnx7Sxk4S5cpvlS9e+5JYQdqlatzzG7AxU/vHyfIoQ9xtTEJAo8ceo2kkavJ 2cipI7vblDq2bsGD5DB4tDPYrl9bReryYFTadtTMJA4qCjM++0cECelgFm+bPcqDAJ AhjYFHcARmMnw== Received: from [172.16.0.134] (192-222-143-198.qc.cable.ebox.net [192.222.143.198]) by smtpout.efficios.com (Postfix) with ESMTPSA id 4T9Klb5fFTzKc8; Wed, 10 Jan 2024 15:53:47 -0500 (EST) Message-ID: <3c38a8f7-8323-46b2-a29a-2ca06bc60448@efficios.com> Date: Wed, 10 Jan 2024 15:53:47 -0500 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Content-Language: en-US To: lttng-dev , Diamon discuss , linux-trace-users , linux-kernel From: Mathieu Desnoyers Subject: [RELEASE] LTTng-modules 2.12.15 and 2.13.11 (Linux kernel tracer) Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit The LTTng modules provide Linux kernel tracing capability to the LTTng tracer toolset. * New and noteworthy in these releases: Newer Linux kernels (v6.6 and v6.7) are now supported by LTTng modules 2.13.11. If you need support for recent kernels (v5.18+), you will need to upgrade to a recent LTTng-modules 2.13.x. The "prio" context has been fixed in 2.13.11 to eliminate a crash triggered by calling a NULL pointer address when using the "prio" context (lttng add-context -k -t prio). This issue was introduced when refactoring the prio context code during the 2.13 development. The missing initialization was re-introduced, and the use of the kernel "task_prio()" symbol was entirely replaced by inlining a copy of this trivial function into lttng-modules instead. The "built-in.sh" script which can be used to add a link to lttng-modules within a kernel source tree to built LTTng into a Linux kernel image has been updated to adapt to changes introduced in Linux v6.1. A work-around to ensure that LTTng-modules works fine on CPUs and kernels with IBT support enabled has been integrated: When the Intel IBT feature is enabled, a CPU supporting this feature validates that all indirect jumps/calls land on an ENDBR64 instruction. The kernel seals functions which are not meant to be called indirectly, which means that calling functions indirectly from their address fetched using kallsyms or kprobes trigger a crash. Use the MSR_IA32_S_CET CET_ENDBR_EN MSR bit to temporarily disable ENDBR validation around indirect calls to kernel functions. Considering that the main purpose of this feature is to prevent ROP-style attacks, disabling the ENDBR validation temporarily around the call from a kernel module does not affect the ROP protection. Both 2.13.11 and 2.12.15: - Fix an issue with importing VFS namespace for Android kernels. - Fix build for RHEL 8.8 with linux 4.18.0-477.10.1+ - Fix a hardening OOPS during validation of immediate strings in the bytecode validator when CONFIG_UBSAN_BOUNDS and/or CONFIG_FORTIFY_SOURCE are configured. It boils down to changing 0-len arrays to flexible arrays to let the toolchain know about our intent. - Add Ubuntu Kinetic kernel ranges for jbd2 instrumentation. Project website: https://lttng.org Documentation: https://lttng.org/docs Download link: https://lttng.org/download Detailed change logs: 2024-01-10 (National Houseplant Appreciation Day) LTTng modules 2.13.11 * Fix: Include linux/sched/rt.h for kernels v3.9 to v3.14 * Fix: Disable IBT around indirect function calls * Inline implementation of task_prio() * Fix: prio context NULL pointer exception * Fix: MODULE_IMPORT_NS is introduced in kernel 5.4 * Android: Import VFS namespace for android common kernel * Fix: get_file_rcu is missing in kernels < 4.1 * fix: lookup_fd_rcu replaced by lookup_fdget_rcu in linux 6.7.0-rc1 * fix: mm, vmscan signatures changed in linux 6.7.0-rc1 * fix: phys_proc_id and cpu_core_id moved in linux 6.7.0-rc1 * Fix build for RHEL 8.8 with linux 4.18.0-477.10.1+ * Fix: bytecode validator: oops during validation of immediate string * fix: lttng-probe-kvm-x86-mmu build with linux 6.6 * fix: built-in lttng with kernel >= v6.1 * fix: ubuntu kinetic kernel range for jdb2 2024-01-10 (National Houseplant Appreciation Day) 2.12.15 * Fix: MODULE_IMPORT_NS is introduced in kernel 5.4 * Android: Import VFS namespace for android common kernel * Fix build for RHEL 8.8 with linux 4.18.0-477.10.1+ * Fix: bytecode validator: oops during validation of immediate string * fix: ubuntu kinetic kernel range for jdb2 -- Mathieu Desnoyers EfficiOS Inc. https://www.efficios.com