Received: by 2002:ac0:8c9a:0:0:0:0:0 with SMTP id r26csp165606ima; Fri, 1 Feb 2019 01:12:27 -0800 (PST) X-Google-Smtp-Source: ALg8bN6pRd5j3BSFXxAS2lZvPDkprwMWmc3mEgOwo6S08lZXISzzUWMkNIcX0Xr2fUtA27hY7qUG X-Received: by 2002:a62:62c5:: with SMTP id w188mr38758364pfb.160.1549012347758; Fri, 01 Feb 2019 01:12:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549012347; cv=none; d=google.com; s=arc-20160816; b=kyn4JXLEQqf7Z29A33VTuTpilFynvoV8oRqzIGeXpEvQQquavLKqx84qePsl49RLwi ibYF464bs55ODJ7fsN4mzZbOTGkkK7KKB8U+k29wy8OS0lA015gKvbDNwFMIDlfqpXqb ePwTk15neBoIUJMicEYlUX3bMz6ZyDJ8LJ6aUG65xvoDO0b+NJJU1RgVT54QTyzknOBY w2j77eU/ZM6dfvmfZgpaKNsHXeW+4e1IZ6L2mW2fWC9RdOckmqXZjmVeCaytacKCPXGk rvPEfUtX4iEKrcwOULV3MkZnM435JpJ+65Mqu6VAGxzUpQbn6kBQZMNN+nXL2UIuFui2 jqgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=+FAcYsuEaZcyqmBNTLPZO8QNr4gjsGW0dSoOPRfKHlA=; b=SzmLv3VAZd8sZKb5duqx2rFNpnvoI5MxGllxlRhvF+l0o0UydcqnQQPouVNmL93nem XtQ1Poqzd+qnlb1cwODjzpan/PslED8tlwyW4UIEVWAhddP4v5JI1xz4bowHYaRuWtcE dmDMGq8OlzycCxGWSBdnwJn82KkrMbDVtsAhowMYAWmE/jnwPVP0a1U2uZBHm6myfMGl 8UojI1f6xX/DGK3++O66LIfi7vZM4qOiTWGrcSTSpVmpEiiY2NYM/j59woFN1PwP8Rb0 L2cNuKuFu+b0SqcNlHCEDEgwLc+1hkZ/MlqUiFBzNPl5jmLhRwKbb4sgKCUl5YbsiE6C uVzg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v184si2209175pgd.295.2019.02.01.01.12.11; Fri, 01 Feb 2019 01:12:27 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729006AbfBAJL4 (ORCPT + 99 others); Fri, 1 Feb 2019 04:11:56 -0500 Received: from mx2.suse.de ([195.135.220.15]:47782 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727998AbfBAJLz (ORCPT ); Fri, 1 Feb 2019 04:11:55 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 09D1EB047; Fri, 1 Feb 2019 09:11:54 +0000 (UTC) Date: Fri, 1 Feb 2019 10:11:52 +0100 From: Michal Hocko To: Vlastimil Babka Cc: Andrew Morton , Linus Torvalds , linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-api@vger.kernel.org, Peter Zijlstra , Greg KH , Jann Horn , Jiri Kosina , Dominique Martinet , Andy Lutomirski , Dave Chinner , Kevin Easton , Matthew Wilcox , Cyril Hrubis , Tejun Heo , "Kirill A . Shutemov" , Daniel Gruss , Jiri Kosina , Josh Snyder Subject: Re: [PATCH 3/3] mm/mincore: provide mapped status when cached status is not allowed Message-ID: <20190201091152.GG11599@dhcp22.suse.cz> References: <20190130124420.1834-1-vbabka@suse.cz> <20190130124420.1834-4-vbabka@suse.cz> <20190131100907.GS18811@dhcp22.suse.cz> <99ee4d3e-aeb2-0104-22be-b028938e7f88@suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <99ee4d3e-aeb2-0104-22be-b028938e7f88@suse.cz> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 01-02-19 10:04:23, Vlastimil Babka wrote: > The side channel exists anyway as long as process can e.g. check if > its rss shrinked, and I doubt we are going to remove that possibility. Well, but rss update will not tell you that the page has been faulted in which is the most interesting part. You shouldn't be able to sniff on /proc/$vicimt/smaps as an attacker. -- Michal Hocko SUSE Labs