Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1914737imm; Thu, 18 Oct 2018 06:23:17 -0700 (PDT) X-Google-Smtp-Source: ACcGV61Xzcb2MhcpdEaT4YicHum+4MA2rSgASL4vBQ0VfPiLUTVDPqE7HG5mojPQY9yNmf3EMHwn X-Received: by 2002:a17:902:7c84:: with SMTP id y4-v6mr787454pll.221.1539868997616; Thu, 18 Oct 2018 06:23:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539868997; cv=none; d=google.com; s=arc-20160816; b=C0KiOx2adVmaJkjuKY0TZz3oGe36IhUoEKgKmMVCZfK4lr1IGJZJOkZBkA466TBiW+ zDv+UrNMVTBV/0VZBKqTM7egWR9J/xZaPrCihbbeYrwxa/o81eZ47VLPc/MG2Hk6pli9 4lSBuxHLRb6qKJWtJKlZE4d2B3cON3YF1hsxr+KY5dyiCgjq4Pd36BY+S0EUhiZSpDrl 5g6WUeKdWlYk4Dqsq73Yam2mM+GcWdDC6c8X2SPM5pSB0T4bm9qOS4Y7nQ3Rg5lw525N N7TcDArqWwEvwZnJYpEbj91pbDdQGpP68El/Ueqsbznvdze6TpaIYDioli0ZUD5UYgUX WMJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=79MZZX5EFfmlginod+/ALF6oYwaZBK+q+q/bEKP5Qs8=; b=l7VChzGneXSvFcQIWVifsGHZeV8VuJs7bL0JKZ37M9AuXp60llKDQsDYGbrRUiJPim B86LsUIyMMcU0raoR7kKYD0jcxc3LY8cHAn1mCcR25Gicf8goSB4JqiiTlLdIjWk08UU 4EFvg7vjC6vDD1U3kiiLZKNE6ud9rQfi5cnZ+8yR7NeY9zBxx/qXzjPWWA9wIi8jLoU3 jMHggHPqhU6tgFNDloH4caPD88F/+Fg67qQTwNx/z0FNzkvvVJKvUCRuBs0pLdbBILuB cdnQ8eIyAN5CUZR1n6UpYvOfbTYcFj4mlvH/40Fqt56LUMTOgNT9uvyohme0dZy/aMZr MRbg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u135-v6si23864698pfc.79.2018.10.18.06.23.01; Thu, 18 Oct 2018 06:23:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727731AbeJRVWK (ORCPT + 99 others); Thu, 18 Oct 2018 17:22:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:55238 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727199AbeJRVWJ (ORCPT ); Thu, 18 Oct 2018 17:22:09 -0400 Received: from gandalf.local.home (cpe-66-24-56-78.stny.res.rr.com [66.24.56.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 806472145D; Thu, 18 Oct 2018 13:21:07 +0000 (UTC) Date: Thu, 18 Oct 2018 09:21:06 -0400 From: Steven Rostedt To: Masami Hiramatsu Cc: Andy Lutomirski , LKML , Joel Fernandes , Thomas Gleixner , Peter Zijlstra , "H. Peter Anvin" , Ingo Molnar , Josh Poimboeuf , Borislav Petkov Subject: Re: [PATCH v2] x86: ptrace.h: Make regs_get_kernel_stack_nth() not fault on bad stack Message-ID: <20181018092106.5e66b8b8@gandalf.local.home> In-Reply-To: <20181018154846.8d055466316359525b94a87a@kernel.org> References: <20181017165951.09119177@gandalf.local.home> <20181018154846.8d055466316359525b94a87a@kernel.org> X-Mailer: Claws Mail 3.16.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 18 Oct 2018 15:48:46 +0900 Masami Hiramatsu wrote: > On Wed, 17 Oct 2018 16:59:51 -0400 > Steven Rostedt wrote: > > > From: "Steven Rostedt (VMware)" > > > > Andy had some concerns about using regs_get_kernel_stack_nth() in a new > > function regs_get_kernel_argument() as if there's any error in the stack > > code, it could cause a bad memory access. To be on the safe side, call > > probe_kernel_read() on the stack address to be extra careful in accessing > > the memory. A helper function, regs_get_kernel_stack_nth_addr(), was added > > to just return the stack address (or NULL if not on the stack), that will be > > used to find the address (and could be used by other functions) and read the > > address with kernel_probe_read(). > > > > Link: http://lkml.kernel.org/r/CALCETrXn9zKTb9i1LP3qoFcpqZHF34BdkuZ5D3N0uCmRr+VnbA@mail.gmail.com > > Requested-by: Andy Lutomirski > > Signed-off-by: Steven Rostedt (VMware) > > Looks good to me. > > Reviewed-by: Masami Hiramatsu > > Thank you, > Thanks Masami, I plan on posting all the patches later today. They already passed all my tests :-) Well, it hasn't broken anything, as I haven't added tests to test your code yet. -- Steve