Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1989840pxb; Fri, 29 Jan 2021 10:04:31 -0800 (PST) X-Google-Smtp-Source: ABdhPJxSYBntj1V1X4EUaqQiWNmMXNN3w9h81EJWkMJ4XaQBNBFM2Zwe7oe5LGNUGCQYlBTN3Xxt X-Received: by 2002:aa7:cfc3:: with SMTP id r3mr6523929edy.125.1611943471334; Fri, 29 Jan 2021 10:04:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611943471; cv=none; d=google.com; s=arc-20160816; b=f3DyQz/uTIKFiKQ3pLf4B9eK4TO+Dmj+zxsCueI1skeAzDC41mA5fFmI1RiNAw54ow DIm/GC0FN6JNlJJ5RA+YM1QGLICrfc3X7pb6KseePZ3DZS9JBji37Oqi3wnqf+FiNlSN KxExr9LHQFjNgTj75x9ZEDZjKIKXDJP0zaKEbNmMUkZoMfxXqJfJ57xMBz5iWb8VIEGl NnDV5543E9P6S/q+qlYUgo5I4BGwz4a+FJpA7vhYhdp33x7/E3HugBDkP5HtWst4JqpT 1rXMj2OkDh2tysvHHk6WFvlOdqVtUseEJDJw5tUrlreweKipShtgIHRLo0RyzzZ8QQ9Q Pz6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=PdDq2cdufJEB2VDwv/X3w5XT/JWi/Zx1Ja9u2w6DFT8=; b=YUzzn26IATnO8a568qi6w+9MK8Zb3xfpQpvHhvRKSgq4Q6aJzf7KvaOOimq5yVpeE8 IgmUHDt+olaDbO+MDRyVsUJZkGg3256A42JGxFsHsKQPMccL4hK4iSk6DBRp6tnmudNf VpEiNezib+Jldo1vLGyM7zhKMwqeGepa26fdhz2+ijwZmrxvynCoOJjq8eVr6augOaWT kKIirUz8h51dGNEDSkbrvq/LmWH65ZxZkXae1uc9OGwpIfBORotebct2IG54IwwAWhkb hT60+JWh1NyB7mN9875h0SO1imXeEVJsxngu9kld/BeGUkfHuidZ/WAOcMEMXtck6jXD FoQA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=Zq2r76xB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hb10si4986660ejc.84.2021.01.29.10.04.06; Fri, 29 Jan 2021 10:04:31 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=Zq2r76xB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232456AbhA2SAj (ORCPT + 99 others); Fri, 29 Jan 2021 13:00:39 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57956 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231408AbhA2SAg (ORCPT ); Fri, 29 Jan 2021 13:00:36 -0500 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C5A0FC061573; Fri, 29 Jan 2021 09:59:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=PdDq2cdufJEB2VDwv/X3w5XT/JWi/Zx1Ja9u2w6DFT8=; b=Zq2r76xBQPM2w4sz8F1Ic9JdIr K4xDJquC8I8HblnYYrFJxCVsxWYhQYBKY5xyfjJu3C9bJTgiDowyAe/hALM4vu0T5AFbGtyvibPnT V1WjUa2Pn21M8EVbtcefCM7kHNZYCEj164cD3ga0tfq0TMjqoKdQndG4iTUgFH4IqKPjWE8wLmpex JgcQMLE9gpZ+C6ZfT+8z34TIzyz5aW1dPbMC5pXHzpC3CtuQNHrT6ikxivsdjdKChEke8lLPu8Owv zwllq5bNlNS4cH+LjL5DbAvow9XUi3pBeVmHHVx1QMJMxMzNwf7+H6JVhgFBSPlsPWXNoey77/f5h 1MlSYgkg==; Received: from j217100.upc-j.chello.nl ([24.132.217.100] helo=worktop.programming.kicks-ass.net) by casper.infradead.org with esmtpsa (Exim 4.94 #2 (Red Hat Linux)) id 1l5Y3b-00A7Kv-MQ; Fri, 29 Jan 2021 17:59:44 +0000 Received: by worktop.programming.kicks-ass.net (Postfix, from userid 1000) id 51EA4981210; Fri, 29 Jan 2021 18:59:43 +0100 (CET) Date: Fri, 29 Jan 2021 18:59:43 +0100 From: Peter Zijlstra To: Alexei Starovoitov Cc: Steven Rostedt , Masami Hiramatsu , Nikolay Borisov , LKML , Alexei Starovoitov , bpf , Josh Poimboeuf Subject: Re: kprobes broken since 0d00449c7a28 ("x86: Replace ist_enter() with nmi_enter()") Message-ID: <20210129175943.GH8912@worktop.programming.kicks-ass.net> References: <20210128123842.c9e33949e62f504b84bfadf5@gmail.com> <20210129013452.njuh3fomws62m4rc@ast-mbp.dhcp.thefacebook.com> <20210129224011.81bcdb3eba1227c414e69e1f@kernel.org> <20210129105952.74dc8464@gandalf.local.home> <20210129162438.GC8912@worktop.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 29, 2021 at 09:45:48AM -0800, Alexei Starovoitov wrote: > Same things apply to bpf side. We can statically prove safety for > ftrace and kprobe attaching whereas to deal with NMI situation we > have to use run-time checks for recursion prevention, etc. I have no idea what you're saying. You can attach to functions that are called with random locks held, you can create kprobes in some very sensitive places. What can you staticlly prove about that?