Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp607168yba; Thu, 16 May 2019 06:16:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqwOqTJJD+h6OsH8JZLDdVn82CekqNyJO23+WHaG6CqR0BqHntJMJiaBP4rt3ykIUTF8wb5K X-Received: by 2002:aa7:8296:: with SMTP id s22mr55108376pfm.52.1558012579075; Thu, 16 May 2019 06:16:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558012579; cv=none; d=google.com; s=arc-20160816; b=Tn4gfICJK1I4pkJEYyKpSfLe+BYQ4XKj6zylG90U6UyET8vbX1aTtt8X3F1nCYORK7 g/jj8C5WpD7G6xf5SLG+BhD4edbpt50kSvo6Xfm/2rUI5tPtq7kYQ1vZU1FCMX+5c3wy Ng6/hD5wZlZ0n4eZUZ14z3KhEvEdaW8Lagk76sB8bcG9zM7+UECF1DFPaJkpIt5I2e8U KO4fOOwbhwCxgz0GBtvShNUba3715z1CBVAbwWJqtAOxE38R1pZXZdZ0+661Pwva8M3w VSzaSMIQcs/ARzK4BNMUTaXXdOH0e36anDSn0YdhGQfdTAqRSebJPjLR2wfx7ST+gxqD sjlg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=ROaA0wXtesoRLV9jmYQxe8dOtv7TkiCY5hrIvCy7dF4=; b=cAlILuTODR3Qmmj4LRNxUFSiE9UnI3bYaoovDNK4hnzjvfFQGhGO4UO/jHt3lFyZfA rO8a+HmJXMvMs6r6Y8JKjHTv+wiYgB9oWq3ubw7yFcmcS/Xo9atW5hGKnqQUvqXC/Bae w41GeA+iOCW/6b34gqVZt2g4UmdKRdLuLp3we0r8Pd3HcxHNBZwREhqlec27rHzszSGI 9qtV5pYg0JeabzCoX/JZh92zMW6BEcdJxJ0ILMntgeCqz5q1vNyPF9wPjsm7SMUdOP4W vYVnx8Djjs9lL77lZN+MbCnnu9GyJYbaajJQ74j14jFTuCSwF7OvhzCjqsNPEGY3n3sc pVWw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=fReDa0z9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z18si4803131pgu.169.2019.05.16.06.16.02; Thu, 16 May 2019 06:16:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=fReDa0z9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727235AbfEPNOg (ORCPT + 99 others); Thu, 16 May 2019 09:14:36 -0400 Received: from mail-ot1-f66.google.com ([209.85.210.66]:43198 "EHLO mail-ot1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726427AbfEPNOf (ORCPT ); Thu, 16 May 2019 09:14:35 -0400 Received: by mail-ot1-f66.google.com with SMTP id i8so3326129oth.10 for ; Thu, 16 May 2019 06:14:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ROaA0wXtesoRLV9jmYQxe8dOtv7TkiCY5hrIvCy7dF4=; b=fReDa0z9uHf+JdOnFb05L1Sb2NczVkeE/wfdtsKJtVRJdlu/Fy7TPQQlZVllJGEfVI RGg7FWvRbo8E6AVP8MLFTeXB72jglZuZienY2l/zowEbQoOpIBaa/+jFnlle3GzGFc3X xNigM0FnR9XrDOEY5QID9N8l7rr1SPmrT5PfodS5GKNfnFOfOth2NQIDjT3rgcY+M3vB Cfuq7MjGvfW0ty3Bhj2YvrKqrFz97mPOyFCFMPTS0hiLi4mZ+3MOlRoB3Jehl3WmsUD2 iBrqKjQNY+qEgbDG40juKK/o/hmnoDNXWF12m1KsESJx4v2wbFNzxs5C0nwXyl5NB/mP /Q/Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ROaA0wXtesoRLV9jmYQxe8dOtv7TkiCY5hrIvCy7dF4=; b=hRepLT395rGfcvY4f/4TSLnlFBHX0sIgscdJ5gEsX/h3rdmm64z2K6RxGip7+o6PrX DDTRyuFgLneblt0+AXzGj/zopHqsa9hwrLG997H9x3HtYZVrvUTbSZ5ttLGmxaeBavxH 7kmGG5ore3JSNEIrpYjffIdVhRPNlaS54bYiQekr3ZH5BT9+kXTA1z8O9W3XHKH/4+HC igfCbWYSVMJSaHBBIdCfpDkf1YwJdkxRgElUE+B6upXRMOB+VSfEQjKcB5Y3kQr9Yu86 IuAAe/c2KQGYaMrX7tdtXCB5ZLjltqyk9K2w8q5VhHIKAJp2NlDFHc3NkE9RxHrgAbW0 MZag== X-Gm-Message-State: APjAAAUKTB59/qtqKVK0KyNiGzxOVdyMazTwyRGctEGRpWc17Amv6qKI DZaT71UVrXZEQwkSVokKoeRPUHjch5A+bWQhvfzL7g== X-Received: by 2002:a9d:6954:: with SMTP id p20mr8910155oto.337.1558012474998; Thu, 16 May 2019 06:14:34 -0700 (PDT) MIME-Version: 1.0 References: <155793276388.13922.18064660723547377633.stgit@localhost.localdomain> <456c7367-0656-933b-986d-febdcc5ab98e@virtuozzo.com> In-Reply-To: <456c7367-0656-933b-986d-febdcc5ab98e@virtuozzo.com> From: Jann Horn Date: Thu, 16 May 2019 15:14:08 +0200 Message-ID: Subject: Re: [PATCH RFC 0/5] mm: process_vm_mmap() -- syscall for duplication a process mapping To: Kirill Tkhai Cc: Andrew Morton , Dan Williams , Michal Hocko , keith.busch@intel.com, "Kirill A . Shutemov" , pasha.tatashin@oracle.com, Alexander Duyck , ira.weiny@intel.com, Andrey Konovalov , arunks@codeaurora.org, Vlastimil Babka , Christoph Lameter , Rik van Riel , Kees Cook , hannes@cmpxchg.org, npiggin@gmail.com, Mathieu Desnoyers , Shakeel Butt , Roman Gushchin , Andrea Arcangeli , Hugh Dickins , Jerome Glisse , Mel Gorman , daniel.m.jordan@oracle.com, kernel list , Linux-MM Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 16, 2019 at 3:03 PM Kirill Tkhai wrote: > On 15.05.2019 21:46, Jann Horn wrote: > > On Wed, May 15, 2019 at 5:11 PM Kirill Tkhai wrote: > >> This patchset adds a new syscall, which makes possible > >> to clone a mapping from a process to another process. > >> The syscall supplements the functionality provided > >> by process_vm_writev() and process_vm_readv() syscalls, > >> and it may be useful in many situation. > >> > >> For example, it allows to make a zero copy of data, > >> when process_vm_writev() was previously used: > > [...] > >> This syscall may be used for page servers like in example > >> above, for migration (I assume, even virtual machines may > >> want something like this), for zero-copy desiring users > >> of process_vm_writev() and process_vm_readv(), for debug > >> purposes, etc. It requires the same permittions like > >> existing proc_vm_xxx() syscalls have. > > > > Have you considered using userfaultfd instead? userfaultfd has > > interfaces (UFFDIO_COPY and UFFDIO_ZERO) for directly shoving pages > > into the VMAs of other processes. This works without the churn of > > creating and merging VMAs all the time. userfaultfd is the interface > > that was written to support virtual machine migration (and it supports > > live migration, too). > > I know about userfaultfd, but it does solve the discussed problem. > It allocates new pages to make UFFDIO_COPY (see mcopy_atomic_pte()), > and it accumulates all the disadvantages, the example from [0/5] > message has. Sorry, right, I misremembered that.