Received: by 2002:ac0:b08d:0:0:0:0:0 with SMTP id l13csp1813312imc; Fri, 22 Feb 2019 11:40:22 -0800 (PST) X-Google-Smtp-Source: AHgI3IZi1FwClVUrfz4y6c/BRKmTS1m9pccibyOcaHKUJ/XHgrP6FdIP5PDY06tXKIgXNuoc1pmj X-Received: by 2002:a62:444b:: with SMTP id r72mr5904359pfa.184.1550864422056; Fri, 22 Feb 2019 11:40:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550864422; cv=none; d=google.com; s=arc-20160816; b=XVclGz+Zby0chRQMCdr87Ppwlj6yKQbftqzctZs5z3FKgXuVhWtuJLZoSHJEq4rrK0 amSST5eYNw67GE01OfcLNrxDFbiq4hND58I0xV8tfO95VacmJAI2RA82fqw+zGZ/DG5o 9BccEV0Z41q5JMgYrqRFfWh6/u0rEr8IVu2ksZlfazKkoAd8NEf9lsscetgFXqbGh3Zp SWICy0+Y6K1UxqiVAyplOlEfR8/v4egOC7nW44cJf+KDYDXSvQzMYL2I8izgwY9ODIWO 5C6blhc6nZfBL5DO2za1CpGjfpY/iYPQX8YWvu7cUeft4ht61TbMd66sajo8qHLYA/ce zkHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=oB/NeLhUdqcQxLz+rTKbanu1k0y9OfWFvRJbuE7WC8w=; b=yqPwO/T55l5M6X1wJoNHUx+45jXy8TGFVd8NQpCZl8/RZBzO1ufBFyMuyBXSi7nKUL OLhMRvseOyU6Fel7RCQ9QxIm/R54IAE5tHKims+h3ZPi0Kv2l68t1ANf4loVObnuL/kQ D0MT/m1WKbEkqay86kQVLc2uAaDQOWWj82w9J2dStYzOuTJtXlE5pHAhmi+MMN+pH+mR 2RWOUXNu7i/E78a0SR5vQYiGDefjCO/02rhtrABMQAPtZO25i4RxVor+AkcXbYb0xmU9 CLet14Q5wxgaPB8DLSYKnIlZcS8uotyN4ab3c14KCtQaC9PtmxOFrWc9i63YIJBNtAX4 lv1g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a11si2125349pla.20.2019.02.22.11.40.06; Fri, 22 Feb 2019 11:40:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726626AbfBVTjd (ORCPT + 99 others); Fri, 22 Feb 2019 14:39:33 -0500 Received: from mail.kernel.org ([198.145.29.99]:34956 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726086AbfBVTjc (ORCPT ); Fri, 22 Feb 2019 14:39:32 -0500 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DCA3F20700; Fri, 22 Feb 2019 19:39:30 +0000 (UTC) Date: Fri, 22 Feb 2019 14:39:29 -0500 From: Steven Rostedt To: Alexei Starovoitov Cc: Linus Torvalds , Masami Hiramatsu , Andy Lutomirski , Linux List Kernel Mailing , Ingo Molnar , Andrew Morton , stable , Changbin Du , Jann Horn , Kees Cook , Andy Lutomirski , daniel@iogearbox.net, netdev@vger.kernel.org, bpf@vger.kernel.org Subject: Re: [PATCH 1/2 v2] kprobe: Do not use uaccess functions to access kernel memory that can fault Message-ID: <20190222143911.617604af@gandalf.local.home> In-Reply-To: <20190222193456.5vqppubzrcx5wsul@ast-mbp.dhcp.thefacebook.com> References: <20190219111802.1d6dbaa3@gandalf.local.home> <20190219140330.5dd9e876@gandalf.local.home> <20190220171019.5e81a4946b56982f324f7c45@kernel.org> <20190220094926.0ab575b3@gandalf.local.home> <20190222172745.2c7205d62003c0a858e33278@kernel.org> <20190222173509.88489b7c5d1bf0e2ec2382ee@kernel.org> <20190222192703.epvgxghwybte7gxs@ast-mbp.dhcp.thefacebook.com> <20190222143026.17d6f0f6@gandalf.local.home> <20190222193456.5vqppubzrcx5wsul@ast-mbp.dhcp.thefacebook.com> X-Mailer: Claws Mail 3.16.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 22 Feb 2019 11:34:58 -0800 Alexei Starovoitov wrote: > so you're saying you will break existing kprobe scripts? Yes we may. > I don't think it's a good idea. > It's not acceptable to break bpf_probe_read uapi. Then you may need to add more code to determine if the address is user space or not in the kernel, and then go the appropriate route, before calling probe_kernel_read(). -- Steve