Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp23384imm; Wed, 5 Sep 2018 13:04:41 -0700 (PDT) X-Google-Smtp-Source: ANB0VdY9yu470WELNYgH30IEoeL/E0feqrvle5ML10wGMjcRP6+wBl3XDivrhzcZTVSUK5NOWFZ4 X-Received: by 2002:a17:902:b089:: with SMTP id p9-v6mr39778865plr.254.1536177881364; Wed, 05 Sep 2018 13:04:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536177881; cv=none; d=google.com; s=arc-20160816; b=D1Azr4B4gRr+Pe5Gs1f5W3bG1TNvkrDg2oD6yT1W0rWX94JB5/OHK0lFTZ1duvQ9tg M1IbJ5F7BFCZ+QFzSbJr8iyxMGAhIPlwCzV2UQ0xI43U9XIOy8cs6ltBg//N2O+M5TXA 4JcZvMFepJeoLPUsHZduNHTE6zJq07e6fEJy3YdicC7W68FS9ibrm03DQcVxi6Djb7Y6 Ol8wtC4sVuZe3BykiqxMFGCUHRvVFHKasfM4ZU44gO/U/Cvu7PV3nlPhb9R3dWt+OWuh kYAA4jnGiQw1HA+opQjcdlRFilMHsssQzQEWfzr+2UXpJ5dbLRWD9IyopWWbK8JhjRR+ 118w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=soLo8XBAs6+Qh37Zz1SBiKExqtgTYdlHt2EXxT/Brso=; b=zXGTmozb3W7109NFcHqgv9Px+a0/4OpYPXm0VuD8vODYnsUKUuMeI58+aSlhi5Ws/V RL0AjoEd/HDMrYo/jdkuJouh4jQc1zn9u+dtJV3UGURn4tWj3nTtnoOg9HhixJc7PHol Xm57pX2TKdovxj2meoOOh120gyolrzJn5s8Lexvc4Ldp1/knsv4iJKg9nRXPCqMtJs+o ZO3A0rZAEOst7ZARJnMqrxC7WbzTXVfqMKhNhopayUDCShHy0/GtSj08ZcUzESkmWOQT mh3PpYewELpZeh5tILVfGg9k+kDEWJGhjhbrkP/gvhByXlb57GU5jWjEZ3dlRcZFb/mk GNPg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u29-v6si2848827pga.29.2018.09.05.13.04.04; Wed, 05 Sep 2018 13:04:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727818AbeIFAe2 (ORCPT + 99 others); Wed, 5 Sep 2018 20:34:28 -0400 Received: from mx2.suse.de ([195.135.220.15]:35758 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727254AbeIFAe1 (ORCPT ); Wed, 5 Sep 2018 20:34:27 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id D0E65AE46; Wed, 5 Sep 2018 20:02:41 +0000 (UTC) Date: Wed, 5 Sep 2018 22:02:40 +0200 (CEST) From: Jiri Kosina To: Andrea Arcangeli cc: Andi Kleen , Tim Chen , "Schaufler, Casey" , Thomas Gleixner , Ingo Molnar , Peter Zijlstra , Josh Poimboeuf , "Woodhouse, David" , Oleg Nesterov , "linux-kernel@vger.kernel.org" , "x86@kernel.org" Subject: Re: [PATCH v3 1/3] ptrace: Provide ___ptrace_may_access() that can be applied on arbitrary tasks In-Reply-To: <20180905184018.GC11625@redhat.com> Message-ID: References: <31436186-88da-324e-88a0-8fdca7bf60ac@linux.intel.com> <99FC4B6EFCEFD44486C35F4C281DC67321447094@ORSMSX107.amr.corp.intel.com> <3f24e8c8-eab8-66c2-9a8d-957e30cac809@linux.intel.com> <20180905155823.GL27886@tassilo.jf.intel.com> <20180905180459.GB11625@redhat.com> <20180905184018.GC11625@redhat.com> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 5 Sep 2018, Andrea Arcangeli wrote: > [ 1838.621010] Kernel panic - not syncing: Watchdog detected hard LOCKUP on cpu 6 > [ 1838.629070] CPU: 6 PID: 0 Comm: swapper/6 Not tainted 3.10.0-327.62.4.el7.x86_64 #1 > [ 1838.637610] Hardware name: Dell Inc. PowerEdge R430/0CN7X8, BIOS 2.4.2 01/09/2017 > [ 1838.645954] Call Trace: > [ 1838.648680] [] dump_stack+0x19/0x1b > [ 1838.655113] [] panic+0xd8/0x1e7 > [ 1838.660460] [] ? restart_watchdog_hrtimer+0x50/0x50 > [ 1838.667742] [] watchdog_overflow_callback+0xc2/0xd0 > [ 1838.675024] [] __perf_event_overflow+0xa1/0x250 > [ 1838.681920] [] perf_event_overflow+0x14/0x20 > [ 1838.688526] [] intel_pmu_handle_irq+0x1e8/0x470 > [ 1838.695423] [] ? ioremap_page_range+0x24c/0x330 > [ 1838.702320] [] ? unmap_kernel_range_noflush+0x11/0x20 > [ 1838.709797] [] ? ghes_copy_tofrom_phys+0x124/0x210 > [ 1838.716984] [] ? ghes_read_estatus+0xa0/0x190 > [ 1838.723687] [] perf_event_nmi_handler+0x2b/0x50 > [ 1838.730582] [] nmi_handle.isra.0+0x69/0xb0 > [ 1838.736992] [] do_nmi+0x169/0x340 > [ 1838.742532] [] end_repeat_nmi+0x1e/0x7e > [ 1838.748653] [] ? _raw_spin_lock_irqsave+0x3d/0x60 > [ 1838.755742] [] ? _raw_spin_lock_irqsave+0x3d/0x60 > [ 1838.762831] [] ? _raw_spin_lock_irqsave+0x3d/0x60 > [ 1838.769917] <> [] avc_compute_av+0x126/0x1b5 > [ 1838.777125] [] ? walk_tg_tree_from+0xbe/0x110 > [ 1838.783828] [] avc_has_perm_noaudit+0xc4/0x110 > [ 1838.790628] [] cred_has_capability+0x6b/0x120 > [ 1838.797331] [] ? ktime_get+0x4c/0xd0 > [ 1838.803160] [] ? clockevents_program_event+0x6b/0xf0 > [ 1838.810532] [] selinux_capable+0x2e/0x40 > [ 1838.816748] [] security_capable_noaudit+0x15/0x20 > [ 1838.823829] [] has_ns_capability_noaudit+0x15/0x20 > [ 1838.831014] [] ptrace_has_cap+0x35/0x40 > [ 1838.837126] [] ___ptrace_may_access+0xa7/0x1e0 > [ 1838.843925] [] __schedule+0x26e/0xa00 > [ 1838.849855] [] schedule_preempt_disabled+0x29/0x70 > [ 1838.857041] [] cpu_startup_entry+0x184/0x290 > [ 1838.863637] [] start_secondary+0x1da/0x250 So yeah, current Linus' tree needs the same treatment -- we have to avoid calling out to ptrace_has_cap() in PTRACE_MODE_NOACCESS_CHK cases. I have updated the patch for v4. Thanks again, -- Jiri Kosina SUSE Labs