Re: [RFC 0/1] BPF tracing for arm64 using fprobe
From: Steven Rostedt
Date: Fri Nov 18 2022 - 11:45:34 EST
On Fri, 18 Nov 2022 16:34:50 +0000
Mark Rutland <mark.rutland@xxxxxxx> wrote:
> > Not alarmist, but concern as being able to modify what a kernel function can
> > do is not something I take lightly.
>
> FWIW, given that the aim here seems to be to expose all kernel internals to be
> overridden arbitrarily, I'm also concerned that there's a huge surface area for
> issues with maintainability, robustness/correctness, and security.
>
> I really don't want to be stuck in a position where someone argues that all
> kernel internal functions are ABI and need to stay around as-is to be hooked by
> eBPF, and I hope that we all agree that there are no guarantees on that front.
My biggest concern is changing functionality of arbitrary functions by BPF.
I would much rather limit what functions BPF could change with some
annotation.
int __bpf_modify foo()
{
...
}
That way if somethings not working, you can see directly in the code that
the function could be modified by a BPF program, instead of getting some
random bug report because a function returned an unexpected result that the
code of that function could never produce.
-- Steve