Skip to content
This repository was archived by the owner on Aug 5, 2022. It is now read-only.

Conversation

@staroselskii
Copy link

@staroselskii staroselskii commented Feb 13, 2017

I ran into issues while running lsof. Everytime it ran, it yielded a lot of kernel stack traces. The hunt produced a fix over here.

Later I came across that there's already a fix introduced in 3.10.99. As it seems like Intel has abandoned this repository and community is still stuck using non-updated LTS kernels, everyone should see the patch and apply it if need be. It'd be better just to rebase Intel's branch onto 3.10.104 (the latest tag at the time of writing this PR message) in this stable kernel tree rather than cherry-picking commits, though.

Modify mm_access() calls in fs/proc/task_mmu.c and fs/proc/task_nommu.c to
have the mode include PTRACE_MODE_FSCREDS so accessing /proc/pid/maps and
/proc/pid/pagemap is not denied to all users.

In backporting upstream commit caaee62 to pre-3.18 kernel versions it was
overlooked that mm_access() is used in fs/proc/task_*mmu.c as those calls
were removed in 3.18 (by upstream commit 29a40ac) and did not exist at the
time of the original commit.

Signed-off-by: Corey Wright <undefined@pobox.com>
Acked-by: Jann Horn <jann@thejh.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
@staroselskii
Copy link
Author

I suggest anyone who bumps into this issue to use the newer Yocto and kernel.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants