Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753949AbcKAS7N (ORCPT ); Tue, 1 Nov 2016 14:59:13 -0400 Received: from mail-db5eur01on0105.outbound.protection.outlook.com ([104.47.2.105]:28320 "EHLO EUR01-DB5-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751152AbcKAS7L (ORCPT ); Tue, 1 Nov 2016 14:59:11 -0400 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=dsafonov@virtuozzo.com; From: Dmitry Safonov To: CC: <0x7f454c46@gmail.com>, Dmitry Safonov , "Kevin Brodsky" , Christopher Covington , Andy Lutomirski , Oleg Nesterov , Russell King , Will Deacon , , , Cyrill Gorcunov , Pavel Emelyanov Subject: [PATCH] arm/vdso: introduce vdso_mremap hook Date: Tue, 1 Nov 2016 20:22:14 +0300 Message-ID: <20161101172214.2938-1-dsafonov@virtuozzo.com> X-Mailer: git-send-email 2.10.2 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [195.214.232.10] X-ClientProxiedBy: HE1PR01CA0074.eurprd01.prod.exchangelabs.com (10.165.170.170) To VI1PR0801MB1741.eurprd08.prod.outlook.com (10.168.67.19) X-MS-Office365-Filtering-Correlation-Id: 0ae52758-364d-48b6-3537-08d4027c1b0d X-Microsoft-Exchange-Diagnostics: 1;VI1PR0801MB1741;2:GuUj27XpeoLR1Jfa9PsaHXCvrVtkwJ1fCT4JtpyLCvcIYYOZuVN6O/fbciQ0AD1ZHTxGspU46DfzKa7nayoC8MbKtcTF6lNlwx/oiJNgciyIpAyhq39HXtc+4a+97G6T9iO3jFa1ThzAkcj4nBpcSeqIl2XnhrsAv03s/lOk/9ghUQROu20qb49S+ZYAneRfTdT+z0nRyjhJzcv/lu67XQ==;3:2G7Xv6OkNDzD4itq2d0mpM+24a+V5Q66fBOlbWQv1KAiBQCvzqOPd3YXNNlRajSRf4w6ZSvv86OI90cyCtidF+/axlEHoguvWGBed2Gai6nnBUwZC/2Cvgtzkdgw4COBG+4uNZhO+BGRsnXY9tknvQ==;25:bTU01823soEIRo4tECqmcjuu0JZytKhSh2H7jHYJVGc7JNMdPi1TmMg9F6zQSP8IyTnRaQlYum7wZ/0mc/hWIa2xrJxwvosc24+CouDHoZw1JNdmtfqu/4HwxRgEjxAt71U3vhyelXsjJgpyo0E0GtGgxukvj1WtkN4AMxijf/JTIKNxihAAxPSwkNmU1/OzRdhKWKWEwMXH4hvP/DJ/N03TKGkvVSn+XlHc35+FVyF4DRPO+GPNmqjIhmdZoMmXGZcrwe4jV9HU8s52Tnz77ztsoZsjCjQj8jVxoDwL5Z1sCjTpaodz0Xi8voTSpRhTftiuIoRO8U7nogLEv47p70x0qBLHfhE0bvZmErdvmxC0NQzjgjlUjZ2TuhBWk/DGm1+jS6+RE9V84zIi+YuQWD6Bn6RmSzl8Xm6nzdCtK0o= X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:VI1PR0801MB1741; X-Microsoft-Exchange-Diagnostics: 1;VI1PR0801MB1741;31:W4GDOhjjAmFWHnwlsfAWtsNpmarayY+XRrLUSdB8jmTAWds9l2tOStgQiMHE61S0MopfVRqjYgzjDiNgqgVuaWS4tPXpf99rnRcNl9KX5psILuKg3wUxoA32NO3CP4G/SbE8lUYdyjIx2fvQsNzs1aIhklBQuPaNqPTsdYZHx+Q/0j8+Va1SXv/wm1/4cfDgeFvjwkQoRU0LPkKoV8rPrBOWDr/FZmewalwioF65cClMncp4GhDb1FOLepb9b29p;4:JQTRQL+wUvw2PyqfonMepNM0uixFOY1XOGs7znVcjYuGsXAzikrzrZGhdbRG4jvhD5JoMG1mlqt5D3mJKoFE36IC5wWnfKtWsKz8hB0oujhGAccJRDMDDmEICF6yxlzg+hHp1nB3SpFaeFtW2KPxSHH3mfWukG/E6XlmRi/t00gXO59WcynddGG2NBu4nkzkSiILIklrTAQxiIXPeqbwiQ1olSIDQDkEsm57CY1wpP+E/BRYm3uBINaJxsBwXIZrlsbgVmhP/5GFkNbvfDL3XCIR3s/QFtOhTMLO8UXajz4TzpyxIIODEsBfYfD/6lDnXiRkXUf/PdemCr+Cnw97L50iKBPSUVNl86/e8WDm4qeMWpl+qx3zXbYDzl0xCcCTKRDuaJUU9gN7BZGE4658ONC1n7+7bgQPpG1LBYAlccmBNDGd8fQpY23jjcRXqkCW7cbObVba385SD0ioBWsE9ExpA8p5zDv8dYxQWwJ4cmYwHpailTSbgbbPaLaoq3APMHnOc0VQaNVjD0R6gR2YGBoaC1T3rb2vrkDxNAtCORbIgpFSFGl2dNzNTkVDQZi9 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(180628864354917)(166708455590820)(258649278758335); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040176)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001)(6042046)(6043046);SRVR:VI1PR0801MB1741;BCL:0;PCL:0;RULEID:;SRVR:VI1PR0801MB1741; X-Forefront-PRVS: 01136D2D90 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10019020)(4630300001)(6009001)(7916002)(199003)(189002)(5660300001)(77096005)(101416001)(50226002)(92566002)(36756003)(15975445007)(47776003)(68736007)(6916009)(42186005)(4001430100002)(53416004)(110136003)(7416002)(86362001)(586003)(105586002)(33646002)(2351001)(66066001)(229853001)(5003940100001)(19580395003)(81166006)(81156014)(305945005)(106356001)(19580405001)(50466002)(107886002)(6116002)(7846002)(7736002)(50986999)(48376002)(69596002)(8676002)(189998001)(97736004)(1076002)(2906002)(3846002)(6666003)(4326007)(6606295002);DIR:OUT;SFP:1102;SCL:1;SRVR:VI1PR0801MB1741;H:dsafonov.sw.ru;FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1;VI1PR0801MB1741;23:rwFosx4Dvi9nvphDuVfD2AJuQC2aJd+WXFcg4tM?= =?us-ascii?Q?MncelPNkJNY7PsY+MpPRt3j71PLHuUxrPpy57NhRTtSHJzEnkCco1Rpb3gxv?= =?us-ascii?Q?fYnBOfFlEK4QoqtC0YrZXOGbYCCpODnA0OxorNvB1G5C8Xlui+Nk5SXd2Hi2?= =?us-ascii?Q?l3OACBEuEiIIHJQf0B/dylkPXiwtdVBjvGv1CQauDNCgdSuXzcgQkMSmvHj6?= =?us-ascii?Q?/PfHXaiC6PKr80UitF5rd1u36NwvJgpMqVxv05lCKk8g3JHYOeDfMWU2zzjI?= =?us-ascii?Q?wiu37mziSECKUthOirxxomqzHOy1Iq4lNdRFd30/jtNK8X75pJEA/qF4Al7Q?= =?us-ascii?Q?yjKCT3jaSjwT5piUxUT6/VcJUcyKDD/QC83vNd0q+QYrXh84oXs1uyNo8ZwB?= =?us-ascii?Q?EMXrR8V0+/abfEcfJIdlb9PDmqTjqoSga60i3PnR8nzX42RM9fg1Fp2CK8aq?= =?us-ascii?Q?lfW/Lst7rgUikMxqoScKA+vagKOrLYhg1jaotCsmdvBaJv8Ci+d5m6HfO3pC?= =?us-ascii?Q?5+K7yp/d+dPbRokACgUjC7BTAvWG2GisSv/WsvnvBb/B5LbnJ5SLTtFx6zD9?= =?us-ascii?Q?l0SFi0lmURfnNu5X7OaDvrPjEVKILmZ/WKRNb9zbJiEkwfjSJC5hVxlDrhnl?= =?us-ascii?Q?R6Kqtwgj9EIqM+jjpAEqB1VwxXByTgl6mH9rGTxzGC/631R+8yYEKvaKcfNm?= =?us-ascii?Q?G+MBVqMbPu9zVzBoXlddHIGSFxBuxe2vKkyAwy+gUIow4zBGMXLb9DpI+Fc4?= =?us-ascii?Q?4WxTffBQVgY3zt7IRHP7r2TXoQSYBIOPSD4y3xRdJYV4pHWtjxOSvXEURffE?= =?us-ascii?Q?sIBwU2pT9A42xUszKF49PoL8SdTJSy+JrIXvH7u1ZOY55Lzmvs1gWKbWevvm?= =?us-ascii?Q?ioAvmuQgD+H+so+L+AijHE59Hx5kJ2hd5nLFQu6cXlGmvoUgdLg4vvS70Msp?= =?us-ascii?Q?LI0Sgvv9aUqRcybTXX858XlIdqG70AEoI3ygpdoqznzHnpKVUJSzONrEEv6f?= =?us-ascii?Q?5P3ixkRu+VN+/gpnq/o2P9Zxb2snmSENOKB/7WoEr9rPUZQceJ0DuiJ5eg0Q?= =?us-ascii?Q?7E6HxYl8zVq1KI6rrzzIQ9IyiisSrYy46In91D+3PYcM8xWjROe9fEPMwIX+?= =?us-ascii?Q?dyiujf6KoYxlQT2JD8gj568kMb/wPhU0aHqiUqSobKZH1xEeANl2wYyNPvFi?= =?us-ascii?Q?TCqal9+g+033nOffUoiKeSFnrUGWlkTzEtS/sWlLlVc3ReH7dqLWiQWeGyMY?= =?us-ascii?Q?Vl2jyKaAVCxK03Hy6XBNDIVZ/VGGb6zdckbsl0ZHc?= X-Microsoft-Exchange-Diagnostics: 1;VI1PR0801MB1741;6:qMIfcYyoHHOb23ZJpJpYTXow0Uf7FNZ41mEPSo8Wk8xESITvIi3Q6m50S9USj/xUeZ1gv3xpYQ3EgMISRXlFMnVbMCZCAblazpFrMNZLncwTErClb9knMwk4ezsJG/+UiQSb9KWFGPJafbm6fDhGKRHLi0UXrJq2d9nmkSNkeMm8BYYNM5S3Th+mZ0M4+MQa5iStK60CqO5fmnLKWXiXDag2SqoWX8Rk8twk5CcmtZfksAkEihopWdpwiULXOxuHrgu22FWrIQH0bDZOcdwCKG4J+YjWW5JhhJ3cjKSzFx6bJQMGoao3iWiTPyWIJu7rBYP9oiTAtMn5uBJde0NFIg==;5:YK3R2M7FkQm9geQO8TZ2qpPwDWIcTHcAnLIfDmBf/97KPIgKSW+bXLASjL7EPb2XJTVzupilc7H1wi34Be5iNryRSawRI7ZatC/nnzmvCD4rtIJyZYonXBMZlrjH0gQPDIHSJuCBREo7zxNGZ40SmuaRHnuQB4GGwvZzABnJbnw=;24:Bvp/HIZ8Kbh4nNy/viDVUKAyAdK2lQ1Fgz1DowzU2Vgh0G/Z6HZ6PFF8eQROAASkzdLRR+wIwIo0pBdnSMxFPl873qzQ6suq+6no+jGYwHE= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;VI1PR0801MB1741;7:xRDDuz6+nW4765rJCn9bcdqb1/uyWjfpTGjErCakLJEhHGtqv7UXYepXKW/JYnRtfPtrF2DqbxPj24EalAZq3oOk3ay+l3RvFXkDN/eQnz/eJKr6PB7lvW2UnfGqtLiiL4UYBFBprwdLUELW1sk+R/N/ksS6/0XYgOYaZto9yjbrRC757N9CFCLFsAXXF4SjcUzVSmpBpbsoExmlq3ulmQf3wCHOCCVdH2dTk26cEbXLEQ53zbywADS+wO22TKF058S8jK8sebV9ibsLRFuDLrDmzefRs/wj3sN2ziRY8B8cQIBWONoWPvN4zb14bmWoAPkecWaf/ia6XaVLI5IMEbie1gRb13IsoaQAXrE4hIQ=;20:/kciKMmx2Hh4Z1wZswJSt5JHNrSAHfncmdpf0h+jWjudhi3bM+b4MVYbwHc/k5jGf42p5ryraBHXjZ8Ibr2zTFwrxsq8ckKQHY2LOrWFhuv2X4TzYH1fAEn9Ffw/Sn8c/yo2FU2PoNCY0eaE3RGxm07YEYdUotRD3Rks4vsjYzI= X-OriginatorOrg: virtuozzo.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Nov 2016 17:25:40.1838 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1741 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3333 Lines: 86 Add vdso_mremap hook which will fix context.vdso pointer after mremap() on vDSO vma. This is needed for correct landing after syscall execution. Primary goal of this is for CRIU on arm - we need to restore vDSO image at the exactly same place where the vma was in dumped application. With the help of this hook we'll move vDSO at the new position. The CRIU code handles situations like when vDSO of dumped application was different from vDSO on restoring system. This usally happens when some new symbols are being added to vDSO. In these situations CRIU inserts jump trampolines from old vDSO blob to new vDSO on restore. By that reason even if on restore vDSO blob lies on the same address as blob in dumped application - we still need to move it if it differs. There was previously attempt to add this functionality for arm64 by arch_mremap hook [1], while this patch introduces this with minimal effort - the same way I've added it to x86: commit b059a453b1cf ("x86/vdso: Add mremap hook to vm_special_mapping") At this moment, vdso restoring code is disabled for arm/arm64 arch in CRIU [2], so C/R is only working for !CONFIG_VDSO kernels. This patch is aimed to fix that. The same hook may be introduced for arm64 kernel, but at this moment arm64 vdso code is actively reworked by Kevin, so we can do it on top. Separately, I've refactored arch_remap hook out from ppc64 [3]. [1]: https://marc.info/?i=1448455781-26660-1-git-send-email-cov@codeaurora.org [2]: https://github.com/xemul/criu/blob/master/Makefile#L39 [3]: https://marc.info/?i=20161027170948.8279-1-dsafonov@virtuozzo.com Cc: Kevin Brodsky Cc: Christopher Covington Cc: Andy Lutomirski Cc: Oleg Nesterov Cc: Russell King Cc: Will Deacon Cc: linux-arm-kernel@lists.infradead.org Cc: linux-mm@kvack.org Cc: Cyrill Gorcunov Cc: Pavel Emelyanov Signed-off-by: Dmitry Safonov --- arch/arm/kernel/vdso.c | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/arch/arm/kernel/vdso.c b/arch/arm/kernel/vdso.c index 53cf86cf2d1a..d1001f87c2f6 100644 --- a/arch/arm/kernel/vdso.c +++ b/arch/arm/kernel/vdso.c @@ -54,8 +54,11 @@ static const struct vm_special_mapping vdso_data_mapping = { .pages = &vdso_data_page, }; +static int vdso_mremap(const struct vm_special_mapping *sm, + struct vm_area_struct *new_vma); static struct vm_special_mapping vdso_text_mapping __ro_after_init = { .name = "[vdso]", + .mremap = vdso_mremap, }; struct elfinfo { @@ -254,6 +257,24 @@ void arm_install_vdso(struct mm_struct *mm, unsigned long addr) mm->context.vdso = addr; } +static int vdso_mremap(const struct vm_special_mapping *sm, + struct vm_area_struct *new_vma) +{ + unsigned long new_size = new_vma->vm_end - new_vma->vm_start; + unsigned long vdso_size = (vdso_total_pages - 1) << PAGE_SHIFT; + + /* Disallow partial vDSO blob remap */ + if (vdso_size != new_size) + return -EINVAL; + + if (WARN_ON_ONCE(current->mm != new_vma->vm_mm)) + return -EFAULT; + + current->mm->context.vdso = new_vma->vm_start; + + return 0; +} + static void vdso_write_begin(struct vdso_data *vdata) { ++vdso_data->seq_count; -- 2.10.2