Date: Thu, 9 Nov 2023 14:34:17 +0100 From: Solar Designer <solar@...nwall.com> To: Hsin-Wei Hung <hsinweih@....edu> Cc: Alexei Starovoitov <alexei.starovoitov@...il.com>, Daniel Borkmann <daniel@...earbox.net>, oss-security@...ts.openwall.com, Alexei Starovoitov <ast@...nel.org> Subject: Re: Linux: BPF: issues with copy_from_user_nofault() On Wed, Nov 08, 2023 at 08:06:49PM -0800, Hsin-Wei Hung wrote: > On Wed, Nov 8, 2023 at 10:05???AM Alexei Starovoitov <alexei.starovoitov@...il.com> wrote: > > Essentially perf (without any bpf) is broken on arm64 and others. > > arch_perf_out_copy_user() might deadlock with CONFIG_HARDENED_USERCOPY. > > Hey, > > > Sorry to put everyone in a tough situation. I can post it to > oss-security if Alexei agrees. I can also try to pick up the 2nd part > of the patch from where it is next week. > https://lore.kernel.org/bpf/CAADnVQJRd3r84yLcqH1Z-BYU76SRYuDMOCWRcvBfapsXs_wemail@example.com/ Thank you Alexei and Hsin-Wei for the replies. This very thread is already on oss-security since I brought it here on Nov 5. I'm confused as to what was (not) merged to where yet, but my suggestion is that this be taken care of on the proper Linux lists and then a summary brought to oss-security again (e.g., saying that the issue is finally fully fixed, and where exactly). Thanks again, Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.