From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.2 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8E50EC433DF for ; Thu, 14 May 2020 19:54:11 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 71F222065D for ; Thu, 14 May 2020 19:54:11 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728482AbgENTyL (ORCPT ); Thu, 14 May 2020 15:54:11 -0400 Received: from www62.your-server.de ([213.133.104.62]:43170 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727815AbgENTyL (ORCPT ); Thu, 14 May 2020 15:54:11 -0400 Received: from sslproxy01.your-server.de ([78.46.139.224]) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89_1) (envelope-from ) id 1jZJvj-0003vO-Nv; Thu, 14 May 2020 21:54:08 +0200 Received: from [178.196.57.75] (helo=pc-9.home) by sslproxy01.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1jZJvj-000TFI-Bo; Thu, 14 May 2020 21:54:07 +0200 Subject: Re: [PATCH bpf 0/3] Restrict bpf_probe_read{,str}() and bpf_trace_printk()'s %s To: Christoph Hellwig Cc: ast@kernel.org, bpf@vger.kernel.org, netdev@vger.kernel.org, torvalds@linux-foundation.org, mhiramat@kernel.org, brendan.d.gregg@gmail.com, john.fastabend@gmail.com, yhs@fb.com References: <20200514161607.9212-1-daniel@iogearbox.net> <20200514165802.GA3059@lst.de> From: Daniel Borkmann Message-ID: Date: Thu, 14 May 2020 21:54:06 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <20200514165802.GA3059@lst.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.102.2/25812/Thu May 14 14:13:00 2020) Sender: bpf-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org On 5/14/20 6:58 PM, Christoph Hellwig wrote: > On Thu, May 14, 2020 at 06:16:04PM +0200, Daniel Borkmann wrote: >> Small set of fixes in order to restrict BPF helpers for tracing which are >> broken on archs with overlapping address ranges as per discussion in [0]. >> I've targetted this for -bpf tree so they can be routed as fixes. Thanks! > > Does that mean you are targeting them for 5.7? Yes, it would make most sense to me based on the discussion we had in the other thread. If there is concern wrt latency we could route these to DaveM's net tree in a timely manner (e.g. still tonight or so). Thanks, Daniel