From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752219AbcGYNRE (ORCPT ); Mon, 25 Jul 2016 09:17:04 -0400 Received: from www62.your-server.de ([213.133.104.62]:56194 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751202AbcGYNQ6 (ORCPT ); Mon, 25 Jul 2016 09:16:58 -0400 Message-ID: <57961147.3090101@iogearbox.net> Date: Mon, 25 Jul 2016 15:16:55 +0200 From: Daniel Borkmann User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0 MIME-Version: 1.0 To: Sargun Dhillon , linux-kernel@vger.kernel.org, netdev@vger.kernel.org CC: alexei.starovoitov@gmail.com Subject: Re: [PATCH net-next v7 1/2] bpf: Add bpf_probe_write_user BPF helper to be called in tracers References: <20160725125444.GA15051@ircssh.c.rugged-nimbus-611.internal> In-Reply-To: <20160725125444.GA15051@ircssh.c.rugged-nimbus-611.internal> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 07/25/2016 02:54 PM, Sargun Dhillon wrote: > This allows user memory to be written to during the course of a kprobe. > It shouldn't be used to implement any kind of security mechanism > because of TOC-TOU attacks, but rather to debug, divert, and > manipulate execution of semi-cooperative processes. > [...] v7 looks good to me now as well, thanks a bunch Sargun!