Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756756Ab3H3Pwr (ORCPT ); Fri, 30 Aug 2013 11:52:47 -0400 Received: from mail-wi0-f177.google.com ([209.85.212.177]:51765 "EHLO mail-wi0-f177.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756539Ab3H3Pwq (ORCPT ); Fri, 30 Aug 2013 11:52:46 -0400 Date: Fri, 30 Aug 2013 17:52:43 +0200 From: Frederic Weisbecker To: Peter Zijlstra Cc: Steven Rostedt , Dave Jones , paulmck@linux.vnet.ibm.com, Linux Kernel , Ingo Molnar , Jiri Olsa Subject: Re: suspicious RCU usage (perf) Message-ID: <20130830155242.GB10875@somewhere> References: <20130826145838.GA8377@redhat.com> <20130826162928.GQ3871@linux.vnet.ibm.com> <20130826133041.3d750b1b@gandalf.local.home> <20130826175012.GA25202@redhat.com> <20130826141814.54dcaa89@gandalf.local.home> <20130826182907.GB25202@redhat.com> <20130826150304.090a1025@gandalf.local.home> <20130827121629.GE10002@twins.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20130827121629.GE10002@twins.programming.kicks-ass.net> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1227 Lines: 34 On Tue, Aug 27, 2013 at 02:16:29PM +0200, Peter Zijlstra wrote: > On Mon, Aug 26, 2013 at 03:03:04PM -0400, Steven Rostedt wrote: > > > Is there some path through sys_perf_open_event that might be > > > missing a capability check perhaps ? > > > > > > > That's a question for Ingo, Peter or Jiri. > > Its not something I've looked at recently, git blames Jiri and fweisbec > for most of that code. > > Permission checks appear to live in > kernel/trace/trace_event_perf.c:perf_trace_event_perm(). Actually the following condition is weird: /* The ftrace function trace is allowed only for root. */ if (ftrace_event_is_function(tp_event) && perf_paranoid_kernel() && !capable(CAP_SYS_ADMIN)) return -EPERM; We probably intended to do: /* The ftrace function trace is allowed only for root. */ if (ftrace_event_is_function(tp_event) || perf_paranoid_kernel() && !capable(CAP_SYS_ADMIN)) return -EPERM; Can somebody confirm? -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/