From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1760306AbaKAUck (ORCPT ); Sat, 1 Nov 2014 16:32:40 -0400 Received: from mail-la0-f42.google.com ([209.85.215.42]:62107 "EHLO mail-la0-f42.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758848AbaKAUci (ORCPT ); Sat, 1 Nov 2014 16:32:38 -0400 MIME-Version: 1.0 In-Reply-To: References: <266afcba1d1f91ea5501e4e16e94bbbc1a9339b6.1414190806.git.luto@amacapital.net> From: Andy Lutomirski Date: Sat, 1 Nov 2014 13:32:16 -0700 Message-ID: Subject: Re: [PATCH v2 5/8] perf: Add pmu callbacks to track event mapping and unmapping To: Thomas Gleixner Cc: Peter Zijlstra , Valdis Kletnieks , "linux-kernel@vger.kernel.org" , Paul Mackerras , Arnaldo Carvalho de Melo , Ingo Molnar , Kees Cook , Andrea Arcangeli , Vince Weaver , "hillf.zj" , X86 ML Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Nov 1, 2014 at 12:59 PM, Thomas Gleixner wrote: > On Fri, 24 Oct 2014, Andy Lutomirski wrote: > > I'm probably missing something. > > Why is this tied to the mmap? If I just open a counter then I should > be able to read the counter from user space w/o mmapping something in > the first place. You can read it with read(2), which this patch shouldn't affect. If you want to read it with rdpmc, then you need to know what rdpmc index to use, and the API for that is to mmap the event, check the userpage's cap_user_rdpmc, and then rdpmc on ->idx - 1 (assuming that ->idx != 0). You can't safely make any assumptions about which rdpmc index it will be without explicitly checking, because perf reserves the right to change the index whenever it wants. There's plenty of room to tighten up the restrictions further, but this is, I think, a decent first step, and it solves the problem of information leaking into seccomp sandboxes. Does that help? I tested this with the only reasonable test case I could find, which was Andi Kleen's "self" program. It still worked. --Andy