Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp6338731rwb; Tue, 22 Nov 2022 11:56:12 -0800 (PST) X-Google-Smtp-Source: AA0mqf5dGeFqIcCw5QdNcrn/gppQB5MePlPvD/zBu60kq0bed478WDRuY1j6NWkP2snXFy35eJ6h X-Received: by 2002:a63:110d:0:b0:46e:bcc1:28df with SMTP id g13-20020a63110d000000b0046ebcc128dfmr5877431pgl.187.1669146972293; Tue, 22 Nov 2022 11:56:12 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1669146972; cv=pass; d=google.com; s=arc-20160816; b=Ge1uzsIzpFpp3r111aH8CvzNHJgmb9y9AHkB73yppl4tkezXI8bCbV8+sH4ED6NgLc cQO21z1E+mV2h+btgVAhLS6KhcXZkOhdtjZhYFufgMvMTMi41le0dQt4hEZyye4CU6rD rZ1hVnmzrGJjxOg4zQSQrBXfL9GRXlFJL40lZG2IxctN4dmH8/O+h36SqiSUe1QKP/u0 Zp2pe7vD90a2il79qzJzzYchDxvWIPGgndZUQ0L5OOodANBhCmhwEHHqmCm/JwCF9Bc9 ERP4PCa7a3IZDCTYA/ls1kFd5hGSfn5Ml93xXPd/aD5nl2PTYMJ0jiXFrC/3FsXjFQ2J 40SQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :in-reply-to:from:references:cc:to:content-language:subject :user-agent:date:message-id:dkim-signature; bh=k2f6VSi1vGbIKsp7xpXH9yg+6wgHzluYrTBZDFLdjmc=; b=jIN3JZ+iFuJZrs4zs76t1TrVl+F01boEc9cq6+UH6GBJTv4JYDJkqFZeqCCZ6IXFCt oirovTrgrMpncVrBH6oLuPBtJtcPvNescfWdEt0lC9CAbj6mvPufj3HGs9TMveIOA+VE XB4gpOBX3MhoK7SRR/nLMjutuD9bjmjQv6shgVAyBbkxMkLeA4u4mDB7hFATWdcEvN59 uY31ADg+gk2Yva9NKpc+9/h5Ji4WdXadQ+kWkG0RvxrwGS2yMmqfPAN/vMLMX1HTryXw Bl3BTrF5aTt+eRWTAFLcV/H0LsZXvissHE6i46+5mbs4mnTgFs6khtBA16vK8ZN2A7FP bs8g== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@meta.com header.s=s2048-2021-q4 header.b=e74YTJD0; arc=pass (i=1 spf=pass spfdomain=meta.com dkim=pass dkdomain=meta.com dmarc=pass fromdomain=meta.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=meta.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id jb13-20020a170903258d00b0017f93ef47e5si13460870plb.370.2022.11.22.11.56.01; Tue, 22 Nov 2022 11:56:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@meta.com header.s=s2048-2021-q4 header.b=e74YTJD0; arc=pass (i=1 spf=pass spfdomain=meta.com dkim=pass dkdomain=meta.com dmarc=pass fromdomain=meta.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=meta.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234027AbiKVTvg (ORCPT + 90 others); Tue, 22 Nov 2022 14:51:36 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38348 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229628AbiKVTvd (ORCPT ); Tue, 22 Nov 2022 14:51:33 -0500 Received: from mx0b-00082601.pphosted.com (mx0b-00082601.pphosted.com [67.231.153.30]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 315DF5B584 for ; Tue, 22 Nov 2022 11:51:32 -0800 (PST) Received: from pps.filterd (m0109332.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 2AMIXtg6004023; Tue, 22 Nov 2022 11:51:13 -0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=meta.com; h=message-id : date : subject : to : cc : references : from : in-reply-to : content-type : content-transfer-encoding : mime-version; s=s2048-2021-q4; bh=k2f6VSi1vGbIKsp7xpXH9yg+6wgHzluYrTBZDFLdjmc=; b=e74YTJD0rl+jrhc7kGwlRErDwOBVtHMYK+ot6cUul7inbLw3hNisdcF5uwTEP48IBtbn +N2GYws3MGLAdsqAvO7cEiAQlF3OdbvnWaAuouZ+RKahTzxDZTspfUqAZbB3D2hLBAmg bRhjxFLRJgeOuHFjTu2B4c5COJqjXCw+nQnj72wgLVaF/9dOOyz6HoMyXbGHlDn4bofK xvydAqU85SnO/qxYDzMBjFBZodTGzbf0NNyh1kEg2Ns4+BjHaE5aE1d44Hc2JBFVo7zT kmg2nvncrQ34peITcoIesUzne4+r/dxgG9WpTGU3e6cy1JsteCsODuB5WtIVn1jJ7ktq OQ== Received: from nam12-bn8-obe.outbound.protection.outlook.com (mail-bn8nam12lp2170.outbound.protection.outlook.com [104.47.55.170]) by mx0a-00082601.pphosted.com (PPS) with ESMTPS id 3m13tb0jby-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 22 Nov 2022 11:51:13 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MxmoHHO8T13zQGbKBJZySXXeQ/rOhKET/uqMisn3lUQPicYURodjRZE9EZ2bx5o6Tyx9sAnk0E+uOrq0WJ2PaHhbPComKHgDYM4+hIa1DhCrhGIOeZ9GQrwgVZELZ+UT24sw4YUX15W8YrIqv6AD8HgzHrD9ovlcWZmAxVK20H5r87k1gM9EPAbGY7xzBTOAWNPOC+Zf9/9v+rEYq0wn3wPoftwWVxFZfacept/OwX0ELEON4lYnEpoT+CZ0/OiyuQ8sF5MpXNh8xyCEHkVBrsg1Lpb8q8hVA3di6zTRA3votnDwG/FXg7ifyDUz0vK79xh4UJmMNbKPMfiUHHt3vg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=k2f6VSi1vGbIKsp7xpXH9yg+6wgHzluYrTBZDFLdjmc=; b=OGjuRp+C+KLjaspMdh4jrdAujMGEs0cAJveJsJqtGpQCkpYRrvvqlqaUmf8Qhaw2eRW66ppUAzks62ws1/+EJPV4NUJuFR8T7ipCBLMg5vFY21HnXM6vltNT7miWk5V3OxoYA724sFYLETyFFx3ZxhcgTnbWvdtrxggaMe7VuDDteLtwHAaPej4mhWQ1hO/++X7PARIcXOdeDt8dWyixZ9eqcYutXcFhaQ4fTMdiL518fUYp67kKuQuqXRd4ys6Pm7pMtwGnnoGhp5yyeyelvSzS4fZPON0GFZ0xGB7i4fMkBM9ejxtzFoHiGMgtKEF5kl/mgWB8OLv8fMIrR/kKsw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=meta.com; dmarc=pass action=none header.from=meta.com; dkim=pass header.d=meta.com; arc=none Received: from MN2PR15MB4287.namprd15.prod.outlook.com (2603:10b6:208:1b6::13) by BYAPR15MB4136.namprd15.prod.outlook.com (2603:10b6:a03:96::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.18; Tue, 22 Nov 2022 19:51:10 +0000 Received: from MN2PR15MB4287.namprd15.prod.outlook.com ([fe80::563a:dd91:dd5:6a8f]) by MN2PR15MB4287.namprd15.prod.outlook.com ([fe80::563a:dd91:dd5:6a8f%7]) with mapi id 15.20.5834.009; Tue, 22 Nov 2022 19:51:10 +0000 Message-ID: Date: Tue, 22 Nov 2022 14:51:08 -0500 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.5.0 Subject: Re: [PATCH] error-injection: Add prompt for function error injection Content-Language: en-US To: Steven Rostedt Cc: Borislav Petkov , Alexei Starovoitov , LKML , Linus Torvalds , Masami Hiramatsu , Andrew Morton , Peter Zijlstra , Kees Cook , Josh Poimboeuf , KP Singh , Mark Rutland , Florent Revest , Greg Kroah-Hartman , Christoph Hellwig References: <20221121104403.1545f9b5@gandalf.local.home> <3fa8ec60-dd96-c41f-ea46-8856bf855949@meta.com> <20221122132905.12a8d5ad@gandalf.local.home> From: Chris Mason In-Reply-To: <20221122132905.12a8d5ad@gandalf.local.home> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-ClientProxiedBy: BL1PR13CA0174.namprd13.prod.outlook.com (2603:10b6:208:2bd::29) To MN2PR15MB4287.namprd15.prod.outlook.com (2603:10b6:208:1b6::13) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR15MB4287:EE_|BYAPR15MB4136:EE_ X-MS-Office365-Filtering-Correlation-Id: bd7a527f-3cfa-4677-7650-08daccc2e753 X-FB-Source: Internal X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: oS/giULTeQ+RWy+WoLYSfnvOytKOwWX530y7hY4o1gxIlP3rBYgWQUhUmt/l6upGPxvImzvVV5BmZIVvADkrEGaVDffujeozNxwtKC82yegmHTi84mGpp7iGAkowLpr6alMSiP1nVOC3IDlkIZeUo+kzCrR1m3KbgngVlbUgNfesDXh63PZnGWwM3adG95/0R+ZVZj9BLPZfUdzQaG85K7t8NFwoVhrBDvAmb8XpjWG6v57UNwSKcsTC4wAS/eitYx4sKgJslijQXbHluKihVFloylnV6VUhcnmlaFEOf+9RMhUYYIJeoyNVAM0TniGzR4IcV4hfcQ1rdwE8v4dYpv3kgsohkyzpwQ4OQ1w35aV0L/bIs126csvvPZrBgGZUF6WWNlCDxQFco7ALeHcigbRDFp2UFALC5Po3SIb2SrVQDhdHCEf11FPsHpUBE6RJyEYIivBdnK8LkemrCW4fBtwsM0NFHjK5mgc9pZE3luQLjvImRvKEgvFqOKuetRDkFEp4cCLUYmCXKDqRHtZCazbincIORHrkZHw83jmFAOcGxefTY0MaOm1xYBQyeYKtTSv/mHfdMMNXuDWPRj6axvO9vssvDRCfaUk1tMjrG0e//CTTU1NBljMEuO/D523YHqF1VLpdW8x1tmRDI71FhLE2tD7/KBQ9xY9I8v60pgQi9vhLfpA4rhlv+0grIquGu8KgItTHnDReINGrn/Z1AccCpKYoIQ32ZrYeQ64I7WI= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR15MB4287.namprd15.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(4636009)(366004)(346002)(136003)(39860400002)(376002)(396003)(451199015)(6512007)(36756003)(54906003)(31686004)(86362001)(31696002)(2616005)(6506007)(2906002)(83380400001)(5660300002)(186003)(26005)(53546011)(66946007)(7416002)(41300700001)(38100700002)(66556008)(6916009)(316002)(66476007)(8936002)(4326008)(478600001)(8676002)(6486002)(45980500001)(43740500002);DIR:OUT;SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?OXpSekV5VEVyTURjYVgwNmNLRVc2TkpBa2tsZWFWYXc5YWlob0phbHM4Wncr?= =?utf-8?B?VmwxWDA5V3lxMWxYUm9ZS2dySzFUQyt6djhqTm9EdGprWk5Lc1JQMWxJZVVv?= =?utf-8?B?S1ZEczNUNXh3TmRNbUpJNTFOR0lXY1JVL0QwZWZZcHZUNWRZOHNyMytqV3Nx?= =?utf-8?B?UU40QzJQSEdoVVhQcG9NZnNBcEtTZ0dvNC85RGgzVCtvQ3Noajl5MG56R0ov?= =?utf-8?B?cmdPNVlOYUtleHNMUVpJa1hvLzlXeDhhelp3bnlCcnRtTlNQZU4rUFNUZTNK?= =?utf-8?B?ckZqTzlMSnJScXVjdlY3dG90MFNZM1pIYWVzVUZ2b2V6bWlHNGJkS0srT29p?= =?utf-8?B?YlROdk9SMk9MeittVDhqc0Z6c0R0TUgzUnFRWDBlOHVFZ2xVTnpzQmNLYlU1?= =?utf-8?B?anpXZFNLSXFaV21uS28rMUlEN2hGdmkwbGF2d29LcHo1VzV1czNNcm1kTkRa?= =?utf-8?B?T1psSTlrOG1zbkcwNjJ3eVhKYTBuYm1UaUNHbk9nU2ZwWWR1Z1hyb1krWVBt?= =?utf-8?B?SWIrUDU2WFFXeExUc2E4aXo3QWhmKzUxZXJQNG1pQm5ySU4wUHl2cjlPMUZo?= =?utf-8?B?dnR0TzJOMmg2RFBNdkFNRmNyd08wT3NRS25lOVBGUDJlWU9WdjdyWmQrM0tW?= =?utf-8?B?K1ZjV3RDaVM1UXEzMTVGNU1JUXZ1SG0rL0lWUXdXVm9haUlPRWlqMDdhOHhZ?= =?utf-8?B?WXlEVERkRlNxeUd0MFJTek5rRERmdnlDdk5nZ2xJNGtIYXBMSXY4L2Z2WXFY?= =?utf-8?B?dm40WkE3aklvcUxpRVM4WVZHSFFlajBLR3MvQ2p4d09rNlNCVnhqL0liMWJi?= =?utf-8?B?VmxxSmlna2FzUXFVVS9LazhMU3dNNC9WOGkrTFlVNDJZQTd5ZXFucHM1RjBp?= =?utf-8?B?ZnppdnlCZHYyT1VKUkxDOE05cVdLMzBGNndBT2E5S0U5VGNnWHVJeXlJcTJG?= =?utf-8?B?UnZRdE5pQTVyRVV4NlNIN2pyWWZnUmVPVzJVZTRpQktmYzIreGMwK3dRUElO?= =?utf-8?B?ZXVzcno0YzhpMHZjbjdtRmRFa3VYUHlZSWIvZWpDOHF3M0V4Z09Ja2lTWEhV?= =?utf-8?B?NlVXTUFJZU04dGEzeFliQUVKeWxSMVovVmpFZGpPRzVndnBoQlJlNXhUYmFi?= =?utf-8?B?UE1wVGQzQVlEdzlKY2tjOUx5eHFsM2pRUExCOVcrYVJNZVRBV2JRNmI2emU2?= =?utf-8?B?cXlXOWlQVUUyMzRjaFB5VlFkczY1MjE2OUc3d3pEV3VpWEVWMUZDQ0I1T2RG?= =?utf-8?B?ZFpQcVc3TUdqZUN4ZTJGNVJ1SUY5b2NTTkMvYWZaQlJMSmZGNUdpZDVzQ0l4?= =?utf-8?B?aVRnWFFlN1dseW4vWWNRZG5seDNnTFpOOE1IL3JmN3Z6dUdyVG54bEhwYThI?= =?utf-8?B?MGxCSDRaZms2cnlaUEYxOVpOd1FvSS9kTWFsQnBPbXVMTTh5QWljMlptTTUz?= =?utf-8?B?YVlGQVJUblE0RTBYOEtKUFBjNU52SzNxeEJWY1c3TEF6ZURoYk4wSHdJVDdE?= =?utf-8?B?UCs5ZmlxcjM0aFhPQk5Jdll4d3p4RjgrUng4MG1YOHJ1UFVhRjFtNC84Q0NT?= =?utf-8?B?T21ENmZRbFEyaDBia1hRbFQ2cTF2WSt6MDJISTFOOXphMzRyNmNiUnVDanI2?= =?utf-8?B?bWt1WE1DWFI1UVVJeHM4SEJQSnV5WENPV3VTLzhibzA3OXZxaVBFbWZkdWo3?= =?utf-8?B?YUNrOGhmRlMyTVNWQkVVUHF6a2QreC9WR2VGMjhYRlVia0VFKzF3MlNlTyty?= =?utf-8?B?NnZIeXhzbHBxT2JadmdrMWZJUnBMUGNTdVE5cU9HR3lRNnlUUldCVDczK3kv?= =?utf-8?B?UTd2S2QrU2pneEhITmE2MW8xeG5QZXVoSk5IZ0NOdURVQ1hQbGVBcHIwd0dU?= =?utf-8?B?M1JBNkoyR1V1TWlIYWhCc0V0NHQ5K0VlbTI3d0duYUtLdHpaNWF5bll5aUhl?= =?utf-8?B?dGhVNjFEdWFsVVBGb2NkbHc3enpPVmFnQmRjdytuMElQVHA3SXI2T1IyVUZ0?= =?utf-8?B?c2QvcUFMT3ZWYWpjVitTeUNId1k0azZ0Q29pRzYwYlU4N0ozc29NTWIxQU5l?= =?utf-8?B?UVZHbmljaXExOGdickJEa2ZyeTZUOFJQOVp3TXJpSnJISlh6WlUvSWIzTGJI?= =?utf-8?Q?BvDY=3D?= X-OriginatorOrg: meta.com X-MS-Exchange-CrossTenant-Network-Message-Id: bd7a527f-3cfa-4677-7650-08daccc2e753 X-MS-Exchange-CrossTenant-AuthSource: MN2PR15MB4287.namprd15.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Nov 2022 19:51:10.4949 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 8ae927fe-1255-47a7-a2af-5f3a069daaa2 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: oF9SZWfKC4yKvJLpQU3H4EiBCI4iheXVuoVX+XclEJ9t4/uN9e4mT2rpSQntRyI/ X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR15MB4136 X-Proofpoint-ORIG-GUID: AxTuKf1Bp88dkRVYsdl7ms78o5QfYpQy X-Proofpoint-GUID: AxTuKf1Bp88dkRVYsdl7ms78o5QfYpQy X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-11-22_11,2022-11-18_01,2022-06-22_01 X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/22/22 1:29 PM, Steven Rostedt wrote: > On Tue, 22 Nov 2022 12:42:33 -0500 > Chris Mason wrote: > >> On 11/22/22 5:39 AM, Borislav Petkov wrote: >>> On Mon, Nov 21, 2022 at 03:36:08PM -0800, Alexei Starovoitov wrote: >>>> The commit log is bogus and the lack of understanding what >>> >>> You mean that: >>> >>> Documentation/fault-injection/fault-injection.rst >>> >>> ? >>> >>> I don't want any of that possible in production setups. And until you >>> give me a sane argument why it is good to have in production setups >>> generically, this is end of story. >>> >> >> I think there are a few different sides to this: >> >> - it makes total sense that we all have wildly different ideas about >> which tools should be available in prod. Making this decision more fine >> grained seems reasonable. >> >> - fault injection for testing: we have a stage of qualification that >> does error injection against the prod kernel. It helps to have this >> against the debug kernel too, but that misses some races etc. I always >> just assumed distros and partners did some fault injection tests against >> the prod kernel builds? >> >> - fault injection for debugging: it doesn't happen often but at some >> point we run out of ideas and start making different functions fail in >> prod to figure out why we're not prodding. > > As you have stated, we have different ideas for production. Your POV is > cloud based (as is with other parts of my company). But my POV is > Chromebooks where production means what's on a user's device. There's no > reason to ever have fault injection enabled in such cases. I would assume > that distributions are the same. But having kprobes for visibility can also > be useful for debugging purposes, even in the field. > Yeah, I definitely don't have opinions on the right way to build a chromebook, and replying to Boris, only slightly better at distros. Josef's original intent was this be easy to turn off. >> >> - overriding return values for security fixes: also not a common thing, >> but it's a tool we've used. There are usually better long term fixes, >> but it happens. >> >> Stepping back to the big picture of debugging systems with bpf in use, I >> love hearing (and telling) stories of debugging difficult problems. As >> far as I know, BPF telling lies hasn't really been a problem for us, so >> even though it's a huge tangent, if you have specific examples of >> problems you've seen, I'm really interested in hearing more. >> >> When I talk about production, both overall stability and validating new >> kernels, if I compare the BPF subsystem with MM, filesystems, cgroups, >> the scheduler, networking, and all things Jens, the systems BPF >> developers put in place are working really well for me. >> >> If I expand the discussion to the BPF programs themselves, there have >> been rare issues. Still completely on par with the rest of the kernel >> subsystems and within the noise in comparison with hardware failures. >> >> In other words, I really do care about the concerns you're expressing >> here, and I'm usually first in line to complain when random people make >> my job harder. I'm just not seeing these issues with BPF, and I see >> them actively trying to increase safety over time. > > I'm sure you are not seeing theses issues with BPF, as the main developers > and you have the same focus areas. > > I have no problem with the concept of BPF. My concern is mostly the > development side of it. As you can basically attach functionality to > arbitrary points in the kernel via BPF programs, the perception is that > anything that is available is fair game. BPF tends to expand features > beyond their intended usage. Heck, look at the name itself. "extended > Berkeley Packet Filter", were eBPF has nothing to do with packet filtering > anymore. Perhaps it should be renamed to CUST (Compiled Use Space > Trampoline) ;-) Developers in general tend to stretch interfaces a lot. At some point the friction of using the interface is worse than the friction of changing it, and things get redone. At the end of the day, BPF developers are still kernel developers and we end up with relatively sane feedback loops. > > Alexei said it's "sad" about my expression of BPF and error injection. If > it has to do with security, then I would like to see more collaboration > with the security folks and perhaps have BPF integrate with their > infrastructure. Now is a great time to grab KP and hear all about BPF LSM. > But the usual response is "that's not fast enough for me" > and then something is done from scratch without working with that > subsystem to make it fast enough. Yes, it takes more time to collaborate > than just doing it on your own. But that's the nature of an open source > *community*. One of the awkward and wonderful parts of our community is that none of us have the same goals or needs. Going back to the original thread, ARM has either one or two different live patching subsystems in use in the industry, and neither is upstream. One reason you end up having these arguments often with BPF is because they stick around and work with the community to upstream their work. The tradeoffs, compromises and decisions aren't always what you want, but we all show up every day and keep engaging. -chris