|
Message-ID: <20211112162433.3ebbd7c7@gandalf.local.home> Date: Fri, 12 Nov 2021 16:24:33 -0500 From: Steven Rostedt <rostedt@...dmis.org> To: Alexander Popov <alex.popov@...ux.com> Cc: Jonathan Corbet <corbet@....net>, Linus Torvalds <torvalds@...ux-foundation.org>, Paul McKenney <paulmck@...nel.org>, Andrew Morton <akpm@...ux-foundation.org>, Thomas Gleixner <tglx@...utronix.de>, Peter Zijlstra <peterz@...radead.org>, Joerg Roedel <jroedel@...e.de>, Maciej Rozycki <macro@...am.me.uk>, Muchun Song <songmuchun@...edance.com>, Viresh Kumar <viresh.kumar@...aro.org>, Robin Murphy <robin.murphy@....com>, Randy Dunlap <rdunlap@...radead.org>, Lu Baolu <baolu.lu@...ux.intel.com>, Petr Mladek <pmladek@...e.com>, Kees Cook <keescook@...omium.org>, Luis Chamberlain <mcgrof@...nel.org>, Wei Liu <wl@....org>, John Ogness <john.ogness@...utronix.de>, Andy Shevchenko <andriy.shevchenko@...ux.intel.com>, Alexey Kardashevskiy <aik@...abs.ru>, Christophe Leroy <christophe.leroy@...roup.eu>, Jann Horn <jannh@...gle.com>, Greg Kroah-Hartman <gregkh@...uxfoundation.org>, Mark Rutland <mark.rutland@....com>, Andy Lutomirski <luto@...nel.org>, Dave Hansen <dave.hansen@...ux.intel.com>, Will Deacon <will@...nel.org>, Ard Biesheuvel <ardb@...nel.org>, Laura Abbott <labbott@...nel.org>, David S Miller <davem@...emloft.net>, Borislav Petkov <bp@...en8.de>, Arnd Bergmann <arnd@...db.de>, Andrew Scull <ascull@...gle.com>, Marc Zyngier <maz@...nel.org>, Jessica Yu <jeyu@...nel.org>, Iurii Zaikin <yzaikin@...gle.com>, Rasmus Villemoes <linux@...musvillemoes.dk>, Wang Qing <wangqing@...o.com>, Mel Gorman <mgorman@...e.de>, Mauro Carvalho Chehab <mchehab+huawei@...nel.org>, Andrew Klychkov <andrew.a.klychkov@...il.com>, Mathieu Chouquet-Stringer <me@...hieu.digital>, Daniel Borkmann <daniel@...earbox.net>, Stephen Kitt <steve@....org>, Stephen Boyd <sboyd@...nel.org>, Thomas Bogendoerfer <tsbogend@...ha.franken.de>, Mike Rapoport <rppt@...nel.org>, Bjorn Andersson <bjorn.andersson@...aro.org>, kernel-hardening@...ts.openwall.com, linux-hardening@...r.kernel.org, linux-doc@...r.kernel.org, linux-arch@...r.kernel.org, linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org, notify@...nel.org Subject: Re: [PATCH v2 2/2] sysctl: introduce kernel.pkill_on_warn On Thu, 28 Oct 2021 02:32:15 +0300 Alexander Popov <alex.popov@...ux.com> wrote: > Signed-off-by: Alexander Popov <alex.popov@...ux.com> > --- > Documentation/admin-guide/sysctl/kernel.rst | 14 +++++++++++++ > include/asm-generic/bug.h | 12 ++++++++--- > include/linux/panic.h | 3 +++ > kernel/panic.c | 22 ++++++++++++++++++++- > kernel/sysctl.c | 9 +++++++++ > lib/bug.c | 3 +++ > 6 files changed, 59 insertions(+), 4 deletions(-) > > diff --git a/Documentation/admin-guide/sysctl/kernel.rst b/Documentation/admin-guide/sysctl/kernel.rst > index 426162009ce9..5faf395fdf8f 100644 > --- a/Documentation/admin-guide/sysctl/kernel.rst > +++ b/Documentation/admin-guide/sysctl/kernel.rst > @@ -921,6 +921,20 @@ lives in) pid namespace. When selecting a pid for a next task on fork > kernel tries to allocate a number starting from this one. > > > +pkill_on_warn > +============= > + > +Kills all threads in a process that provoked a kernel warning. > +That allows the kernel to stop the process when the first signs > +of wrong behavior are detected. > + > += ===================================================================== > +0 Allows a process to proceed execution after hitting a kernel warning, > + this is the default behavior. > +1 Kills all threads in a process that provoked a kernel warning. > += ===================================================================== > + > + > powersave-nap (PPC only) > ======================== > > diff --git a/include/asm-generic/bug.h b/include/asm-generic/bug.h > index 881aeaf5a2d5..959000b5856a 100644 > --- a/include/asm-generic/bug.h > +++ b/include/asm-generic/bug.h > @@ -94,8 +94,10 @@ void warn_slowpath_fmt(const char *file, const int line, unsigned taint, > #ifndef WARN_ON_ONCE > #define WARN_ON_ONCE(condition) ({ \ > int __ret_warn_on = !!(condition); \ > - if (unlikely(__ret_warn_on)) \ > + if (unlikely(__ret_warn_on)) { \ > DO_ONCE_LITE(__WARN_printf, TAINT_WARN, NULL); \ > + do_pkill_on_warn(); \ Should this be a config option so that those that do not want this do not need to have the added overhead of a function call embedded at every WARN*() in their code? That is, do_pkill_on_warn() should be defined as do { } while (0), and not add any I$ overhead when compiled out? > + } \ > unlikely(__ret_warn_on); \ > }) > #endif > @@ -151,15 +153,19 @@ void __warn(const char *file, int line, void *caller, unsigned taint, > > #define WARN_ONCE(condition, format...) ({ \ > int __ret_warn_on = !!(condition); \ > - if (unlikely(__ret_warn_on)) \ > + if (unlikely(__ret_warn_on)) { \ > DO_ONCE_LITE(__WARN_printf, TAINT_WARN, format); \ > + do_pkill_on_warn(); \ > + } \ > unlikely(__ret_warn_on); \ > }) > > #define WARN_TAINT_ONCE(condition, taint, format...) ({ \ > int __ret_warn_on = !!(condition); \ > - if (unlikely(__ret_warn_on)) \ > + if (unlikely(__ret_warn_on)) { \ > DO_ONCE_LITE(__WARN_printf, taint, format); \ > + do_pkill_on_warn(); \ > + } \ > unlikely(__ret_warn_on); \ > }) > > diff --git a/include/linux/panic.h b/include/linux/panic.h > index f5844908a089..f79c69279859 100644 > --- a/include/linux/panic.h > +++ b/include/linux/panic.h > @@ -27,6 +27,9 @@ extern int panic_on_oops; > extern int panic_on_unrecovered_nmi; > extern int panic_on_io_nmi; > extern int panic_on_warn; > +extern int pkill_on_warn; > + > +extern void do_pkill_on_warn(void); > > extern unsigned long panic_on_taint; > extern bool panic_on_taint_nousertaint; > diff --git a/kernel/panic.c b/kernel/panic.c > index cefd7d82366f..1323c9e2630f 100644 > --- a/kernel/panic.c > +++ b/kernel/panic.c > @@ -53,6 +53,7 @@ static int pause_on_oops_flag; > static DEFINE_SPINLOCK(pause_on_oops_lock); > bool crash_kexec_post_notifiers; > int panic_on_warn __read_mostly; > +int pkill_on_warn __read_mostly; > unsigned long panic_on_taint; > bool panic_on_taint_nousertaint = false; > > @@ -625,13 +626,16 @@ void warn_slowpath_fmt(const char *file, int line, unsigned taint, > if (!fmt) { > __warn(file, line, __builtin_return_address(0), taint, > NULL, NULL); > - return; > + goto out; > } > > args.fmt = fmt; > va_start(args.args, fmt); > __warn(file, line, __builtin_return_address(0), taint, NULL, &args); > va_end(args.args); > + > +out: > + do_pkill_on_warn(); > } > EXPORT_SYMBOL(warn_slowpath_fmt); > #else > @@ -732,3 +736,19 @@ static int __init panic_on_taint_setup(char *s) > return 0; > } > early_param("panic_on_taint", panic_on_taint_setup); > + > +void do_pkill_on_warn(void) > +{ > + if (!pkill_on_warn) > + return; > + > + if (is_global_init(current)) > + return; > + > + if (current->flags & PF_KTHREAD) > + return; > + > + if (system_state >= SYSTEM_RUNNING) > + do_send_sig_info(SIGKILL, SEND_SIG_PRIV, current, PIDTYPE_TGID); I believe this was mentioned before. I'm not sure how safe it is to call do_send_sig_info() in random areas of the kernel, as that could possibly cause a deadlock with the locking that is taken. Best to use irq_work() and have a irq_work interrupt handle the do_sig_info, because then you know you are safe to call this. Of course, then you need some way to pass the task to the handler. Could do some kind of clever trick, where we add a PF_KILL_ME flag to the task, and the irq worker just loops over all the tasks kill all those with it set? > +} > +EXPORT_SYMBOL(do_pkill_on_warn); > diff --git a/kernel/sysctl.c b/kernel/sysctl.c > index 083be6af29d7..7fe6f0aaad2b 100644 > --- a/kernel/sysctl.c > +++ b/kernel/sysctl.c > @@ -2656,6 +2656,15 @@ static struct ctl_table kern_table[] = { > .extra1 = SYSCTL_ZERO, > .extra2 = SYSCTL_ONE, > }, > + { extra tab? -- Steve > + .procname = "pkill_on_warn", > + .data = &pkill_on_warn, > + .maxlen = sizeof(int), > + .mode = 0644, > + .proc_handler = proc_dointvec_minmax, > + .extra1 = SYSCTL_ZERO, > + .extra2 = SYSCTL_ONE, > + }, > #if defined(CONFIG_SMP) && defined(CONFIG_NO_HZ_COMMON) > { > .procname = "timer_migration", > diff --git a/lib/bug.c b/lib/bug.c > index 1a91f01412b8..28cc8a5b2ee0 100644 > --- a/lib/bug.c > +++ b/lib/bug.c > @@ -214,6 +214,9 @@ enum bug_trap_type report_bug(unsigned long bugaddr, struct pt_regs *regs) > bug_type = BUG_TRAP_TYPE_BUG; > > out: > + if (bug_type == BUG_TRAP_TYPE_WARN) > + do_pkill_on_warn(); > + > return bug_type; > } >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.