On 2/28/19 6:29 PM, Masami Hiramatsu wrote:
> Hi Yonghong,
>
> On Thu, 28 Feb 2019 22:49:43 +
> Yonghong Song wrote:
>
>>
>>
>> On 2/28/19 8:03 AM, Masami Hiramatsu wrote:
>>> Add probe_user_read(), strncpy_from_unsafe_user() and
>>> strnlen_unsafe_user() which allows caller to access user
Hi Yonghong,
On Thu, 28 Feb 2019 22:49:43 +
Yonghong Song wrote:
>
>
> On 2/28/19 8:03 AM, Masami Hiramatsu wrote:
> > Add probe_user_read(), strncpy_from_unsafe_user() and
> > strnlen_unsafe_user() which allows caller to access user-space
> > in IRQ context.
> >
> > Current probe_kernel_
On 2/28/19 8:03 AM, Masami Hiramatsu wrote:
> Add probe_user_read(), strncpy_from_unsafe_user() and
> strnlen_unsafe_user() which allows caller to access user-space
> in IRQ context.
>
> Current probe_kernel_read() and strncpy_from_unsafe() are
> not available for user-space memory, because it s
Add probe_user_read(), strncpy_from_unsafe_user() and
strnlen_unsafe_user() which allows caller to access user-space
in IRQ context.
Current probe_kernel_read() and strncpy_from_unsafe() are
not available for user-space memory, because it sets
KERNEL_DS while accessing data. On some arch, user add
4 matches
Mail list logo