From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753116AbbJUBbF (ORCPT ); Tue, 20 Oct 2015 21:31:05 -0400 Received: from mail-am1on0059.outbound.protection.outlook.com ([157.56.112.59]:49012 "EHLO emea01-am1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751621AbbJUBbB (ORCPT ); Tue, 20 Oct 2015 21:31:01 -0400 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=cmetcalf@ezchip.com; Subject: Re: [PATCH v8 06/14] task_isolation: provide strict mode configurable signal To: Steven Rostedt References: <1445373372-6567-1-git-send-email-cmetcalf@ezchip.com> <1445373372-6567-7-git-send-email-cmetcalf@ezchip.com> <20151020205610.51b3d742@grimm.local.home> CC: Gilad Ben Yossef , Ingo Molnar , Peter Zijlstra , Andrew Morton , Rik van Riel , Tejun Heo , Frederic Weisbecker , Thomas Gleixner , "Paul E. McKenney" , Christoph Lameter , Viresh Kumar , Catalin Marinas , Will Deacon , Andy Lutomirski , , , From: Chris Metcalf Message-ID: <5626EABC.9060202@ezchip.com> Date: Tue, 20 Oct 2015 21:30:36 -0400 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <20151020205610.51b3d742@grimm.local.home> Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [173.76.21.154] X-ClientProxiedBy: DM3PR13CA0031.namprd13.prod.outlook.com (25.164.193.41) To HE1PR02MB0777.eurprd02.prod.outlook.com (25.161.118.141) X-Microsoft-Exchange-Diagnostics: 1;HE1PR02MB0777;2:9BRcrW/FxHUE9eUfAyWd0kZvgSUXm5t4DwR7ASUAF63scrkqvbwWGD/yPw04ujNDoVo6nJeKIhc7VndDcec1d4OAwKtfC04rp62KVv2TQ4CUZ91KkUxqmiI6lrSalHxhmpZdpe9yVJo0mGV4bjyCHQb4JWjb705fGBkJ/jwuQiw=;3:39q1R/Wu4XBK3W/ND0epEG/RPM/kR16jio/ik/PvCJpNr6XLWql5r14n3PgEMiRy18ePzOw+Z7s34Camtvs5A0hO88I3nO+8ewhVrnSjIvvF+WGPL5HjJsIWOC45qvJNA/p1TjQq3U319YwC+KO/Og==;25:kYfJ4PIwPiJLJIG3EUabJzDWYeWu+WE7xN5gXvXvR1ggDH0T2qQ4xbNhEU99SYwDvDtizXPXUceuSgCaiTjRuTikMrJ1Vj4FcnGoZQU1erAY9UucNvdM0Gox4ztzU4KbsDy/nkjWj5sSJpUWuEg/tdo8trJTY2nNMBtEpSVXsPjEbkOXfBasmtf3/ruRGQTtC2iDDMVfeD7Akp67H1d2jOrD7M9fLubxf3Nr+1X4yhcgGIKNrMMA+AlcC+4PTOX1;20:4mYZ6zMJP3B1FB5WfMxJKirmGTdg24NfYr37GDZZA0AY9zkP21AL/MQtf3HE6F7I9CqPk9hSqVhUOmb2i1A0bPK8R5UpQHsvlcRYLS3qdslIUHn0PZZdFEs/UaJOK/kiXq0JKH07aSLUgGJkQU7dB7UEnlMY0qin1BKHQTfAXgY= X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:HE1PR02MB0777; X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(121898900299872); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(601004)(2401047)(520078)(5005006)(8121501046)(3002001);SRVR:HE1PR02MB0777;BCL:0;PCL:0;RULEID:;SRVR:HE1PR02MB0777; X-Microsoft-Exchange-Diagnostics: 1;HE1PR02MB0777;4:QmD5UUF2e0ONh+cN1WV7LQkj/RRcvBJonI9JOpMmV9oLh7t7/CqshPTq3Txz6Pi8u7mreNnWegfGaNkJmxY4Q0iexIOIfCgpKnOFOF3n8yiQbpNJobi65jDS51UqzT676IwHLKyhKrVSb0oe3a8a4kF4EUTJQcxfcIe/xro0jmytYJOxqyP1mywinnIIQ7EbQZ+Z3cQkKO6RP0LXw/DFIrJMMcnntd7WfZ8leuqCeVL4eCFhkRLXDLT/kw3w4puh5BTl/BcaAemyFfPDzNekeRSJmXPI23PgFI4iGqjeOlnI3ztIRIhg8XuKjwRy7qd+3AJmdvA8FvboOmxfrv65ipmUiUwS6/WzmSPEAtCD1ig= X-Forefront-PRVS: 073631BD3D X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(6049001)(6009001)(189002)(24454002)(199003)(479174004)(377454003)(40100003)(42186005)(4001350100001)(54356999)(15975445007)(83506001)(64706001)(117156001)(65806001)(50986999)(66066001)(81156007)(65816999)(86362001)(87976001)(97736004)(65956001)(92566002)(5008740100001)(87266999)(47776003)(5001960100002)(33656002)(59896002)(122386002)(80316001)(77096005)(19580405001)(110136002)(19580395003)(46102003)(76176999)(64126003)(5004730100002)(50466002)(23746002)(105586002)(106356001)(101416001)(36756003)(5007970100001)(2950100001)(189998001)(18886065003);DIR:OUT;SFP:1101;SCL:1;SRVR:HE1PR02MB0777;H:[192.168.1.165];FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?Windows-1252?Q?1;HE1PR02MB0777;23:zq+u4Cia3BBM0wLLbttCj5/U3GsScvGHglI38?= =?Windows-1252?Q?q+xNoEFpwizoBSLb4BHLxrS26A4X6kbD512WmJl2mYR1Uth+D08BbMpt?= =?Windows-1252?Q?BOaL7t70q5ne3avjmj7eeG2vaF1BAvhDcr/Z0dg4tMW1shcgRinLcj/o?= =?Windows-1252?Q?8lPF4f6aWamXYj5whwzTO2LTtV82K/oQh+GAvPMU/BdGCbwW5LqgdANh?= =?Windows-1252?Q?KoXvHzqjllDZ/JR91Uzz+67WF+4jxq1ZoJf1t6oafvYUc8xHR5Ez0FoR?= =?Windows-1252?Q?wVU2RKuTPETolSjd6mfrIvsK3gUqdTCECsyrkFTnhornAnc/xQZqA6e5?= =?Windows-1252?Q?+NKXzU+3au+ns6jo8ZegF1k5rg2IcLtM5z+0rcqtKjwP0NzwaA0V4XV6?= =?Windows-1252?Q?WFzYECy1c+4irtZHZy8xWgBct6ytaF1pOQAJ52rxfNl1LHW9isu+6x6W?= =?Windows-1252?Q?ulCqFd++DdrdvzTAYtKiTpPaUTxkRqfFOhjaVMAh6MKSuWcRb6e1dGCB?= =?Windows-1252?Q?u+B/QtGrBMcMh7dtjILQbHWhv743IVAaasJljGrAWuJlmamhxTewx88k?= =?Windows-1252?Q?q6nSO9pRiGWne7xI09Ag/wMZ8MVX2f92uPXiwGntY6wsuMrtakv4tkmA?= =?Windows-1252?Q?/Cb1U5QnclXwl6phxoLLBmqZkijUdrpMbKLXpIWNTFcXBXtOjmqQrdIk?= =?Windows-1252?Q?D31C/Ks6sp+Tsbvtb9mMQZU06ZsiIHRjS/zMuQg/Hfr1TVGzOzbMJ1J3?= =?Windows-1252?Q?kj/1ZmvDfhsHZhuO4R66OOAJKa/cegfaScyWI2IQ/tmp2sYNIm0ubQHm?= =?Windows-1252?Q?PuF/BAKq1WHB08eQ7TH5HIrj9451DVOgWa1EyiPjlO4ug88V/TNfgdEh?= =?Windows-1252?Q?f9OGTV029VNdSs6nMEXIWVwnWUomHqdeRnwd8S16hLv+EB4GuOopzzp2?= =?Windows-1252?Q?53bykyJF/h5Zv6vMclk9F0rx4DuaGAWvos4r3BdbvM1EOFfldq3HU5SJ?= =?Windows-1252?Q?XpWxbf+VcnowlOwo6FikovClTaO8N3Wcp6HRYpwLyW33Dxt+QPBZpbyS?= =?Windows-1252?Q?SxMAhppsNlo4mVrMmb+UiMMtQyVxYHimW2+gwQ159D2s0ohqM3pUSfzO?= =?Windows-1252?Q?jipRlyTDkp4VTLaaWWbPTTtUF1F7W2L2+gNEFlvy0GA0I6qmH3DkOY7e?= =?Windows-1252?Q?yps/LX7jdbmcd+HvD+z6VClaBCiCnVWDPgawVHc8UO+EJw+NwUTiavC0?= =?Windows-1252?Q?te3VZpnENPaifrYQ61txizGxWKWgb1stzzhSTjdGq+skY0JLfVme7YUF?= =?Windows-1252?Q?5VyV9v7onPhIDLnJC+f3BPvaqa8VMeQxd9plidw0qixsgnwSz/snIXVJ?= =?Windows-1252?Q?iw32eTYv7+bSVm6VOJBBOPxMOxCYs6XuEFz8on5sMLExujvCl90HxIQa?= =?Windows-1252?Q?HHeVTXXtAR6amZFAzyp?= X-Microsoft-Exchange-Diagnostics: 1;HE1PR02MB0777;5:pyNA2HBwLu0AiKXEmIGyKIUpyUN3/G2tCm2KczBs8PEfTxOQh7tIwamScXWRvzsY5I+ugumEtQWKBugjUdOvzOVHtJSNJhgDAgFqh1ReHlJ/dCP9nFwuy0MGAjiPG9ZcM++1SaJEjKn1xfCuaRiCFg==;24:OE4Nb/2O45xiRipq/L7V9V94zORvJBYMQbTC4ca937oAYxwwPOlVjAYozY/BmzrrOXunbcZoKz1w/6VV6SeFEYGvefshm9xayITybfRmzuI=;20:5UMrwAe1CgohBvHDWb0ZbJo+z850kL44zuCKEZztvj9d2uAcfxR5Vi/1MkKucc6MiWYDW2PSZ+nTVzqxKUdnsw== SpamDiagnosticOutput: 1:23 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: ezchip.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Oct 2015 01:30:53.7302 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR02MB0777 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/20/2015 8:56 PM, Steven Rostedt wrote: > On Tue, 20 Oct 2015 16:36:04 -0400 > Chris Metcalf wrote: > >> Allow userspace to override the default SIGKILL delivered >> when a task_isolation process in STRICT mode does a syscall >> or otherwise synchronously enters the kernel. >> > Is this really a good idea? This means that there's no way to terminate > a task in this mode, even if it goes astray. It doesn't map SIGKILL to some other signal unconditionally. It just allows the "hey, you broke the STRICT contract and entered the kernel" signal to be something besides the default SIGKILL. -- Chris Metcalf, EZChip Semiconductor http://www.ezchip.com