From: Peter Zijlstra <peterz@infradead.org>
To: Steven Rostedt <rostedt@goodmis.org>
Cc: Chris Mason <clm@meta.com>, Mark Rutland <mark.rutland@arm.com>,
Alexei Starovoitov <alexei.starovoitov@gmail.com>,
Florent Revest <revest@chromium.org>, bpf <bpf@vger.kernel.org>,
Alexei Starovoitov <ast@kernel.org>,
Daniel Borkmann <daniel@iogearbox.net>,
Andrii Nakryiko <andrii@kernel.org>,
KP Singh <kpsingh@kernel.org>,
Brendan Jackman <jackmanb@google.com>,
markowsky@google.com, Masami Hiramatsu <mhiramat@kernel.org>,
Xu Kuohai <xukuohai@huawei.com>,
LKML <linux-kernel@vger.kernel.org>,
Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
Linus Torvalds <torvalds@linux-foundation.org>,
Christoph Hellwig <hch@infradead.org>
Subject: Re: [RFC 0/1] BPF tracing for arm64 using fprobe
Date: Mon, 21 Nov 2022 11:09:21 +0100 [thread overview]
Message-ID: <Y3tOUcOjEDJrm7w6@hirez.programming.kicks-ass.net> (raw)
In-Reply-To: <20221118130608.5ba89bd8@gandalf.local.home>
On Fri, Nov 18, 2022 at 01:06:08PM -0500, Steven Rostedt wrote:
> How do I know that a function return was modified by BPF? If I'm debugging
> something, is it obvious to the developer that is debugging an issue
> (perhaps unaware of what BPF programs are loaded on the users machine),
> that the return of a function was tweaked by BPF and that could be the
> source of the bug?
Have it taint the kernel if something is overridden ;-) Then we can all
ignore the report until it comes back without taint.
next prev parent reply other threads:[~2022-11-21 10:10 UTC|newest]
Thread overview: 28+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-11-08 22:06 [RFC 0/1] BPF tracing for arm64 using fprobe Florent Revest
2022-11-08 22:06 ` [RFC 1/1] bpf: Invoke tracing progs using fprobe on archs without direct call Florent Revest
2022-11-17 2:41 ` [RFC 0/1] BPF tracing for arm64 using fprobe Alexei Starovoitov
2022-11-17 13:33 ` Masami Hiramatsu
2022-11-17 16:50 ` Alexei Starovoitov
2022-11-18 16:26 ` Mark Rutland
2022-11-17 17:16 ` Steven Rostedt
2022-11-17 21:55 ` Chris Mason
2022-11-17 22:40 ` Steven Rostedt
2022-11-18 16:34 ` Mark Rutland
2022-11-18 16:45 ` Steven Rostedt
2022-11-18 17:44 ` Chris Mason
2022-11-18 18:06 ` Steven Rostedt
2022-11-18 18:52 ` Chris Mason
2022-11-21 13:47 ` KP Singh
2022-11-21 14:16 ` Peter Zijlstra
2022-11-21 14:23 ` KP Singh
2022-11-21 15:15 ` Steven Rostedt
2022-11-21 15:29 ` KP Singh
2022-11-21 15:39 ` Steven Rostedt
2022-11-21 16:16 ` Jiri Kosina
2022-11-21 15:40 ` Alexei Starovoitov
2022-11-21 15:45 ` Steven Rostedt
2022-11-21 15:55 ` Borislav Petkov
2022-11-21 10:09 ` Peter Zijlstra [this message]
2022-11-21 14:40 ` Masami Hiramatsu
2022-11-18 16:18 ` Mark Rutland
2022-11-17 13:16 ` Masami Hiramatsu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Y3tOUcOjEDJrm7w6@hirez.programming.kicks-ass.net \
--to=peterz@infradead.org \
--cc=alexei.starovoitov@gmail.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=clm@meta.com \
--cc=daniel@iogearbox.net \
--cc=gregkh@linuxfoundation.org \
--cc=hch@infradead.org \
--cc=jackmanb@google.com \
--cc=kpsingh@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mark.rutland@arm.com \
--cc=markowsky@google.com \
--cc=mhiramat@kernel.org \
--cc=revest@chromium.org \
--cc=rostedt@goodmis.org \
--cc=torvalds@linux-foundation.org \
--cc=xukuohai@huawei.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.