From: Steven Rostedt <rostedt@goodmis.org>
To: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Andy Lutomirski <luto@amacapital.net>,
LKML <linux-kernel@vger.kernel.org>,
Thomas Gleixner <tglx@linutronix.de>,
Peter Zijlstra <peterz@infradead.org>,
Ingo Molnar <mingo@kernel.org>, "H. Peter Anvin" <hpa@zytor.com>,
Josh Poimboeuf <jpoimboe@redhat.com>
Subject: Re: [RFC][PATCH] x86: ptrace: Add function argument access API
Date: Wed, 17 Oct 2018 22:34:47 -0400 [thread overview]
Message-ID: <20181017223447.0cdcd422@vmware.local.home> (raw)
In-Reply-To: <20181015235646.2cbb7dc9bc4b7b54f900e0fb@kernel.org>
On Mon, 15 Oct 2018 23:56:46 +0900
Masami Hiramatsu <mhiramat@kernel.org> wrote:
> On Fri, 12 Oct 2018 15:54:39 -0400
> Steven Rostedt <rostedt@goodmis.org> wrote:
>
> > On Fri, 12 Oct 2018 11:21:28 -0700
> > Andy Lutomirski <luto@amacapital.net> wrote:
> >
> > > On Fri, Oct 12, 2018 at 9:26 AM Steven Rostedt <rostedt@goodmis.org> wrote:
> > > >
> > > >
> > > > Anyone have any issues with this patch?
> > > >
> > >
> > > I'm conceptually okay with it. That being said,
> > > regs_within_kernel_stack(), which you're indirectly using, is
> > > off-by-a-few. And updating it to use probe_kernel_read() might be
> > > nice for robustness.
> > >
> >
> > Something like this?
> >
> > -- Steve
> >
> > From: "Steven Rostedt (VMware)" <rostedt@goodmis.org>
> > Date: Fri, 12 Oct 2018 15:44:20 -0400
> > Subject: [PATCH] x86: ptrace.h: Add regs_get_kernel_stack_nth_safe() function
> >
> > Andy had some concerns about using regs_get_kernel_stack_nth() in a new
> > function regs_get_kernel_argument() as if there's any error in the stack
> > code, it could cause a bad memory access. Instead, add a new function called
> > regs_get_kernel_stack_nth_safe() that does a probe_kernel_read() on the
> > stack address to be extra careful in accessing the memory. To share the
> > code, regs_get_kernel_stack_nth_addr() was added to just return the stack
> > address (or NULL if not on the stack), that both regs_get_kernel_stack_nth()
> > and the _safe() version can use.
>
> This patch looks good to me.
> But if the concern is real, all regs_get_kernel_stack_nth() user must move
> onto _safe() version, at least all tracers code.
>
> Reviewed-by: Masami Hiramatsu <mhiramat@kernel.org>
>
Hi Masami,
Can you review my v2 version which implements what you suggest.
Thanks,
-- Steve
next prev parent reply other threads:[~2018-10-18 2:34 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-10-12 3:00 [RFC][PATCH] x86: ptrace: Add function argument access API Steven Rostedt
2018-10-12 3:01 ` Steven Rostedt
2018-10-12 16:26 ` Steven Rostedt
2018-10-12 18:21 ` Andy Lutomirski
2018-10-12 18:22 ` Steven Rostedt
2018-10-12 19:54 ` Steven Rostedt
2018-10-15 14:56 ` Masami Hiramatsu
2018-10-16 18:59 ` Steven Rostedt
2018-10-18 2:34 ` Steven Rostedt [this message]
2018-10-27 14:58 ` Steven Rostedt
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20181017223447.0cdcd422@vmware.local.home \
--to=rostedt@goodmis.org \
--cc=hpa@zytor.com \
--cc=jpoimboe@redhat.com \
--cc=linux-kernel@vger.kernel.org \
--cc=luto@amacapital.net \
--cc=mhiramat@kernel.org \
--cc=mingo@kernel.org \
--cc=peterz@infradead.org \
--cc=tglx@linutronix.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox