lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 21 Oct 2015 15:49:51 +0200 From: Peter Zijlstra <peterz@...radead.org> To: "Wangnan (F)" <wangnan0@...wei.com> Cc: Alexei Starovoitov <ast@...mgrid.com>, xiakaixu <xiakaixu@...wei.com>, davem@...emloft.net, acme@...nel.org, mingo@...hat.com, masami.hiramatsu.pt@...achi.com, jolsa@...nel.org, daniel@...earbox.net, linux-kernel@...r.kernel.org, pi3orama@....com, hekuang@...wei.com, netdev@...r.kernel.org Subject: Re: [PATCH V5 1/1] bpf: control events stored in PERF_EVENT_ARRAY maps trace data output when perf sampling On Wed, Oct 21, 2015 at 09:42:12PM +0800, Wangnan (F) wrote: > How can an eBPF program access a !local event: > > when creating perf event array we don't care which perf event > is for which CPU, so perf program can access any perf event in > that array. So what is stopping the eBPF thing from calling perf_event_read_local() on a !local event and triggering a kernel splat? -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists