From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id DB00AC433FE for ; Mon, 21 Nov 2022 10:10:02 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230210AbiKUKJ7 (ORCPT ); Mon, 21 Nov 2022 05:09:59 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47690 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231253AbiKUKJz (ORCPT ); Mon, 21 Nov 2022 05:09:55 -0500 Received: from desiato.infradead.org (desiato.infradead.org [IPv6:2001:8b0:10b:1:d65d:64ff:fe57:4e05]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C2982C67; Mon, 21 Nov 2022 02:09:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=desiato.20200630; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=/aiZzvyQ2GY8KI94llazD/tfmZ49/mZuXgZkC4dcxLY=; b=NZpSrhocPOpVEIzvEEu1r4IaU0 A1L9Xa2NdSCU+3XTGRM2PMPbA7wJpAY+EoXEVzWaUPzmj0R/NNxyLFRqxZCzAw3DSg1FGn23mInX0 UNKvxqzGNOqk5Z7gqutCPwBDR1ymYgiw4UDZ0j+Z8KX40M6hD/6iYckEM+LogGB0Y3HJ/bunEybZi SlEITeLvwmU1jfka5ilUxkFujg4o7QEHhji1ygTRCqxyaQDwXx3af6uRHCFaIFzDj8kWNlSQ56BR5 2hcX2Kgbn1R3iUm1Tup890mQ+FlNJk3tHN6mW215hG8LU3P0RhV6r+gZ0nKj9CzSGZH7rn360zJ3h qwt3wRig==; Received: from j130084.upc-j.chello.nl ([24.132.130.84] helo=noisy.programming.kicks-ass.net) by desiato.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux)) id 1ox3jw-0034mk-UW; Mon, 21 Nov 2022 10:09:25 +0000 Received: from hirez.programming.kicks-ass.net (hirez.programming.kicks-ass.net [192.168.1.225]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by noisy.programming.kicks-ass.net (Postfix) with ESMTPS id 4FC4830022D; Mon, 21 Nov 2022 11:09:22 +0100 (CET) Received: by hirez.programming.kicks-ass.net (Postfix, from userid 1000) id 0DBBC203A8986; Mon, 21 Nov 2022 11:09:22 +0100 (CET) Date: Mon, 21 Nov 2022 11:09:21 +0100 From: Peter Zijlstra To: Steven Rostedt Cc: Chris Mason , Mark Rutland , Alexei Starovoitov , Florent Revest , bpf , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , KP Singh , Brendan Jackman , markowsky@google.com, Masami Hiramatsu , Xu Kuohai , LKML , Greg Kroah-Hartman , Linus Torvalds , Christoph Hellwig Subject: Re: [RFC 0/1] BPF tracing for arm64 using fprobe Message-ID: References: <20221108220651.24492-1-revest@chromium.org> <20221117121617.4e1529d3@gandalf.local.home> <20221117174030.0170cd36@gandalf.local.home> <20221118114519.2711d890@gandalf.local.home> <43d5d1f5-c01d-c0db-b421-386331c2b8c1@meta.com> <20221118130608.5ba89bd8@gandalf.local.home> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221118130608.5ba89bd8@gandalf.local.home> Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org On Fri, Nov 18, 2022 at 01:06:08PM -0500, Steven Rostedt wrote: > How do I know that a function return was modified by BPF? If I'm debugging > something, is it obvious to the developer that is debugging an issue > (perhaps unaware of what BPF programs are loaded on the users machine), > that the return of a function was tweaked by BPF and that could be the > source of the bug? Have it taint the kernel if something is overridden ;-) Then we can all ignore the report until it comes back without taint.