Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1212883pxa; Thu, 6 Aug 2020 02:21:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzlohVPqiR86/5m21lYwqNH2n8nbIEysX+U+n1+EKHBz+bnvDZGtvHIGlyW87QtFl5CLf+X X-Received: by 2002:a17:906:ce43:: with SMTP id se3mr3302436ejb.403.1596705675491; Thu, 06 Aug 2020 02:21:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596705675; cv=none; d=google.com; s=arc-20160816; b=NGdPL9bzOHnkdP3RmgGaOJwB9u7D/9OwAdCy0D0PUlgR9F3+4fS5UDOz69ILDYpOhY hXA178eVg+d0rC0r2iXyrseC2HYGUZL23k52GXhhziQe0RN63WSyAEil6UrHsf7mSbft Q507FIJO7LCpbh0ZSpXMQ+Hk1/U0yND0J4aJwqrs/QtKpTH/Kvq05k2sLIgpPYI7S9LI ruSxyl7srinwvSKRJsToF3u9DvpiET+wO9YFbxangPoG1l1fTVc+fByGfXQ3gibnE6Wv ltyGxup2Y++J0eJbZRLLjfhBgjfXCof8we0zh6f55DbVeI8KEiYtl1vFQcG6SE4VLGD7 uwJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=HBfnhIZeMcT664G81tfZBhokhfWHpa8MvvKA8GAKnW4=; b=HG4gedJa7VzMStNTsF/YBydnGxyr+O/R/T0B/6+d+FLStM6SDsN+4Ravprhh4IDsP6 gpz26W7n0EW7ZjsT4zbIA/RkCMHLPMBnv/DBhj16wEnn0r8A2SGExpbrCi3SQw8p3Zrs gC1b4pnzuc3MZ67ucOFQjdfiYEhrYNCrVwreAoM0UZLrs9tlULcSoovAM6zgGBg3fzIz 1kTRIjuEQPsX+Prrz8ahaabHsHJXTjDLp3hdFg46YrWzKCJU3SlUaKYJKd29SKL9kJtE kkVfcBfLQIZKwAJuMru3YYmBmxY2DXP6drXTVW0i39UmtvHlcVRuJ4BlsXzG6gTxh1Bb SCqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=casper.20170209 header.b=JdRQpYBX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 91si3515106edy.18.2020.08.06.02.20.52; Thu, 06 Aug 2020 02:21:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=casper.20170209 header.b=JdRQpYBX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729111AbgHFJTo (ORCPT + 99 others); Thu, 6 Aug 2020 05:19:44 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58404 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729074AbgHFJS4 (ORCPT ); Thu, 6 Aug 2020 05:18:56 -0400 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4C8EBC061575 for ; Thu, 6 Aug 2020 02:18:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=HBfnhIZeMcT664G81tfZBhokhfWHpa8MvvKA8GAKnW4=; b=JdRQpYBXtol5csn+jTgJXmQMuC Rs9h+TuA6T61PEr5h3BLllrn0OLlKXAcDPGljedtzehj0V9Ib14nNX+O242NSr+7ppICimAwMl6Cp SElRBKTxlvGzzzm6VjBDBVBSWBB9HBYeaoZ9w3igbe9Gwtx8ldr3+VpIk1FNF2ww0hRoQuIpUZwXT V+SekrLBrpuM8VUhukWogLMMdge1r7Hk3ctdLHjKtcYK4bukzZzHXUOvBTF3yNUoTea5XUQzVkhaC 3q4JIqbp4ahtvWW6/0I77cqPifyI6EOHxPR9UQPBKJtVLXsJ1thFo9iL5rr3Vy2VLyozx5wN17PMu vMTFeTqg==; Received: from j217100.upc-j.chello.nl ([24.132.217.100] helo=noisy.programming.kicks-ass.net) by casper.infradead.org with esmtpsa (Exim 4.92.3 #3 (Red Hat Linux)) id 1k3c2e-0000GO-Ej; Thu, 06 Aug 2020 09:18:28 +0000 Received: from hirez.programming.kicks-ass.net (hirez.programming.kicks-ass.net [192.168.1.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by noisy.programming.kicks-ass.net (Postfix) with ESMTPS id 92C25300446; Thu, 6 Aug 2020 11:18:27 +0200 (CEST) Received: by hirez.programming.kicks-ass.net (Postfix, from userid 1000) id 7A50D220F91BB; Thu, 6 Aug 2020 11:18:27 +0200 (CEST) Date: Thu, 6 Aug 2020 11:18:27 +0200 From: peterz@infradead.org To: "Jin, Yao" Cc: mingo@redhat.com, oleg@redhat.com, acme@kernel.org, jolsa@kernel.org, Linux-kernel@vger.kernel.org, ak@linux.intel.com, kan.liang@intel.com, yao.jin@intel.com, alexander.shishkin@linux.intel.com, mark.rutland@arm.com Subject: Re: [PATCH v1 2/2] perf/core: Fake regs for leaked kernel samples Message-ID: <20200806091827.GY2674@hirez.programming.kicks-ass.net> References: <20200731025617.16243-1-yao.jin@linux.intel.com> <20200731025617.16243-2-yao.jin@linux.intel.com> <20200804114900.GI2657@hirez.programming.kicks-ass.net> <4c958d61-11a7-9f3e-9e7d-d733270144a1@linux.intel.com> <20200805124454.GP2657@hirez.programming.kicks-ass.net> <797aa4de-c618-f340-ad7b-cef38c96b035@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <797aa4de-c618-f340-ad7b-cef38c96b035@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Aug 06, 2020 at 10:26:29AM +0800, Jin, Yao wrote: > > +static struct pt_regs *sanitize_sample_regs(struct perf_event *event, struct pt_regs *regs) > > +{ > > + struct pt_regs *sample_regs = regs; > > + > > + /* user only */ > > + if (!event->attr.exclude_kernel || !event->attr.exclude_hv || > > + !event->attr.exclude_host || !event->attr.exclude_guest) > > + return sample_regs; > > + > > Is this condition correct? > > Say counting user event on host, exclude_kernel = 1 and exclude_host = 0. It > will go "return sample_regs" path. I'm not sure, I'm terminally confused on virt stuff. Suppose we have nested virt: L0-hv | G0/L1-hv | G1 And we're running in G0, then: - 'exclude_hv' would exclude L0 events - 'exclude_host' would ... exclude L1-hv events? - 'exclude_guest' would ... exclude G1 events? Then the next question is, if G0 is a host, does the L1-hv run in G0 userspace or G0 kernel space? I was assuming G0 userspace would not include anything L1 (kvm is a kernel module after all), but what do I know. > > @@ -11609,7 +11636,8 @@ SYSCALL_DEFINE5(perf_event_open, > > if (err) > > return err; > > - if (!attr.exclude_kernel) { > > + if (!attr.exclude_kernel || !attr.exclude_callchain_kernel || > > + !attr.exclude_hv || !attr.exclude_host || !attr.exclude_guest) { > > err = perf_allow_kernel(&attr); > > if (err) > > return err; > > > > I can understand the conditions "!attr.exclude_kernel || !attr.exclude_callchain_kernel". > > But I'm not very sure about the "!attr.exclude_hv || !attr.exclude_host || !attr.exclude_guest". Well, I'm very sure G0 userspace should never see L0 or G1 state, so exclude_hv and exclude_guest had better be true. > On host, exclude_hv = 1, exclude_guest = 1 and exclude_host = 0, right? Same as above, is G0 host state G0 userspace? > So even exclude_kernel = 1 but exclude_host = 0, we will still go > perf_allow_kernel path. Please correct me if my understanding is wrong. Yes, because with those permission checks in place it means you have permission to see kernel bits.