Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp5000249yba; Wed, 8 May 2019 06:27:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqy42xT+sk/AdTpLJGU/5qTt+KuhvWxnkqHdOBZf1qUvFyRK+ur7XzsuY4EXzMj3Q83RPZ/E X-Received: by 2002:a62:5994:: with SMTP id k20mr48096499pfj.150.1557322020585; Wed, 08 May 2019 06:27:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557322020; cv=none; d=google.com; s=arc-20160816; b=eLOpuCXmmBbAubxb3vzcXR8iALHBCITUsxrCopIYJ8kA/W/HIVldDa1q7kj2JMSmmx X0hNhvhzBeLlH3uT0A2JVb/DzxDv2O9V5+SRVCZxW6WidOTcQgDlDAz5wJnqFCIRqdUF ag/eHvEPz0OqY7urM84WVFxyYGLxxstwYZ4VhE3jfqDDui9BpHGueisJJb/FDVo/tm9x ZZAiN8Hi7lXNtsEnL7R2KCqBvstTyZB/PDmnS43TvEngn6Dr65w8293nkQPkngHqiL/j dDF91gjAqqaTEW+OkcDOGKg4hg+vKNhjw0h5uF/tzPh/IMSI4R4+Ngvjo5R8tEdWtnTM RWwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=VdHUC/yd04crkENLhP8lCDvMptH26K0/a3mrnxWRl6s=; b=0aDPV/dGLN6EFX7Y5WpFx8S1nwy7AN+RKXsPuRxPPnRSIiu61NsHdgLvI1CdRBuI+o PRiLrs1e8Enp5w/f0VsBcp34/h+czewBD8ao8zqnsTtMje1OlDTh4KbUB/wcHuh0jitK GMvMK/QO+1vcngvA/yrQCe92aamoiNuWmuUO7W9759GJI8huGClF6LXWpboZJQaPNm+s 5YdW9hBW0lOBwotvOn+p+xT/lS6vW/EETGPDmnJyWg1fQmi16I74onMd1sgmyR+eGvgq ORvQ1rCOJFIUhvRzPhbzM8OejJA9L7zaNd4GmESx/hiQ2S+hoLl4ilAT3hspK2Cgo7pA HYtA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="L/ky04aw"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a9si22888754pls.395.2019.05.08.06.26.44; Wed, 08 May 2019 06:27:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="L/ky04aw"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728574AbfEHMjP (ORCPT + 99 others); Wed, 8 May 2019 08:39:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:60706 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726515AbfEHMjP (ORCPT ); Wed, 8 May 2019 08:39:15 -0400 Received: from devnote2 (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 825AA20449; Wed, 8 May 2019 12:39:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1557319153; bh=xHZf/Oqd/MfTgtCGtWa0Of8XqjVMhgHhLXQ/RCWa0og=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=L/ky04awj3OM+92XX8sXAgkelTdwQo/U/SDn3fARJQ6sYWScqhXesM7NDiQBQDLI2 tfcmuucvGs56FoQoEpl8qWxdJUevBICFgaw+3pqJ++cFqnJK2bAa9HfvmoHUjkpJHN iII7ONJSfXINxuYMH6KOD8bm+DsPDeq/RoVtg+fY= Date: Wed, 8 May 2019 21:39:04 +0900 From: Masami Hiramatsu To: Daniel Borkmann Cc: Joel Fernandes , linux-kernel@vger.kernel.org, Michal Gregorczyk , Adrian Ratiu , Mohammad Husain , Qais Yousef , Srinivas Ramana , duyuchao , Manjo Raja Rao , Karim Yaghmour , Tamir Carmeli , Yonghong Song , Alexei Starovoitov , Brendan Gregg , Masami Hiramatsu , Peter Ziljstra , Andrii Nakryiko , Steven Rostedt , Kees Cook , kernel-team@android.com, bpf@vger.kernel.org, Ingo Molnar , Martin KaFai Lau , netdev@vger.kernel.org, Song Liu Subject: Re: [PATCH v2 1/4] bpf: Add support for reading user pointers Message-Id: <20190508213904.44de50870a54167cc924034e@kernel.org> In-Reply-To: <7e0d07af-79ad-5ff3-74ce-c12b0b9b78cd@iogearbox.net> References: <20190506183116.33014-1-joel@joelfernandes.org> <3c6b312c-5763-0d9c-7c2c-436ee41f9be1@iogearbox.net> <20190506195711.GA48323@google.com> <7e0d07af-79ad-5ff3-74ce-c12b0b9b78cd@iogearbox.net> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 7 May 2019 01:10:45 +0200 Daniel Borkmann wrote: > On 05/06/2019 09:57 PM, Joel Fernandes wrote: > > On Mon, May 06, 2019 at 09:11:19PM +0200, Daniel Borkmann wrote: > >> On 05/06/2019 08:31 PM, Joel Fernandes (Google) wrote: > >>> The eBPF based opensnoop tool fails to read the file path string passed > >>> to the do_sys_open function. This is because it is a pointer to > >>> userspace address and causes an -EFAULT when read with > >>> probe_kernel_read. This is not an issue when running the tool on x86 but > >>> is an issue on arm64. This patch adds a new bpf function call based > >>> which calls the recently proposed probe_user_read function [1]. > >>> Using this function call from opensnoop fixes the issue on arm64. > >>> > >>> [1] https://lore.kernel.org/patchwork/patch/1051588/ > >>> > >>> Cc: Michal Gregorczyk > >>> Cc: Adrian Ratiu > >>> Cc: Mohammad Husain > >>> Cc: Qais Yousef > >>> Cc: Srinivas Ramana > >>> Cc: duyuchao > >>> Cc: Manjo Raja Rao > >>> Cc: Karim Yaghmour > >>> Cc: Tamir Carmeli > >>> Cc: Yonghong Song > >>> Cc: Alexei Starovoitov > >>> Cc: Brendan Gregg > >>> Cc: Masami Hiramatsu > >>> Cc: Peter Ziljstra > >>> Cc: Andrii Nakryiko > >>> Cc: Steven Rostedt > >>> Cc: Kees Cook > >>> Cc: kernel-team@android.com > >>> Signed-off-by: Joel Fernandes (Google) > >>> --- > >>> Masami, could you carry these patches in the series where are you add > >>> probe_user_read function? > >>> > >>> Previous submissions is here: > >>> https://lore.kernel.org/patchwork/patch/1069552/ > >>> v1->v2: split tools uapi sync into separate commit, added deprecation > >>> warning for old bpf_probe_read function. > >> > >> Please properly submit this series to bpf tree once the base > >> infrastructure from Masami is upstream. > > > > Could you clarify what do you mean by "properly submit this series to bpf > > tree" mean? bpf@vger.kernel.org is CC'd. > > Yeah, send the BPF series to bpf@vger.kernel.org once Masami's patches have > hit mainline, and we'll then route yours as fixes the usual path through > bpf tree. OK, then I focus on my series. Keep this series separated. Thank you! > > >> This series here should > >> also fix up all current probe read usage under samples/bpf/ and > >> tools/testing/selftests/bpf/. > > > > Ok. Agreed, will do that. > > Great, thanks! > Daniel -- Masami Hiramatsu