Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp3949044ybg; Fri, 25 Oct 2019 11:09:20 -0700 (PDT) X-Google-Smtp-Source: APXvYqzQBtdOtuf+J28L9tZiNGatB5+8+FIqIYYgtu96U/xIzML56XRmiwRicjDFP8C4AEx2RoNd X-Received: by 2002:a17:906:1c97:: with SMTP id g23mr4866242ejh.66.1572026960318; Fri, 25 Oct 2019 11:09:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572026960; cv=none; d=google.com; s=arc-20160816; b=otScGSDfdF+w24f2nkJcyz2v2r4trEPHyqLd3JhcORJk35DRyGHPckE/uJx/ftu17b oo7/xLPXhz4bRHOEdCcjDYAYQRV3k5UPA1N68FisnGWaOWDDtOcbqwWfW776uL8YQWY9 OgJxCjYcaWGlUowZS2hCUCnRf6eM8QQ4lPIcX+AAjR8G7E0sXLPgVtqoZIere2JWnMRr JhfaRKBY61VG56tcsYvlJcRDyndDDy35C5usNrfr5p7byoyfQOdSG9vyQMPKzBbOFug/ PjhOSyG3/6hbf4+rwkxOa24YoFq50JsdxWXh4R/IdF3SYvpwra9KNNX94kKU7DE7k5J+ rMDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition :content-transfer-encoding:user-agent:in-reply-to:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=T2ExiigEByCtsmRRvNsGaGfhM9mM9F5zlr4YhPOUDug=; b=gVqswSLtHP7+4NR0yjAbuHH19AnYmA2/gryagZ7a1gA6VzQU9HyV84jUytNKAwhiRf YMd94ofubsKw6zqFWsmDAb2RX27KoPd61f/oIu1ZYyFQoFABDNgWTiZssRnVuftDoCDs HEjK+GwM92pzOxDEOLM5Qa9qjvBajGHiZ+c33LtodWXdj+IlBhk/KxvybozXuth5RuHF FA1bZpXmyICHAbVi0uPGa1X5Do37TYEcZyZegVkYFX4SRwpcqH3TabKuh6JVv6Au5GWy FPLpu1ON3njUfcYwXyZXX+tuD5BvBsN3Zf/zwnGwInv8uDgK2TLR9slKjSC8ywyZg0ty bXcA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Slhwk2iV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p8si1785328ejf.305.2019.10.25.11.08.57; Fri, 25 Oct 2019 11:09:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Slhwk2iV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2503411AbfJXPy7 (ORCPT + 99 others); Thu, 24 Oct 2019 11:54:59 -0400 Received: from us-smtp-1.mimecast.com ([205.139.110.61]:57013 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2503392AbfJXPy5 (ORCPT ); Thu, 24 Oct 2019 11:54:57 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1571932496; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=T2ExiigEByCtsmRRvNsGaGfhM9mM9F5zlr4YhPOUDug=; b=Slhwk2iVkogSau2UovSoFzTFDf8kgcKFe2LUv/K41U/tRIYekv/IZrhEgLwINFL1mD14yc Uy2QdBHLm3vqFWsU+L2vfmuYarNV2CmSKFHwUtLEZzn0VzG3QUCx50rep1/RwXiu2YhQQ9 JlWZcMPU/YmcwbDO0COLhph1QDQ5O+8= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-74-gGkffQx-MgiQBUn_hUtQng-1; Thu, 24 Oct 2019 11:54:52 -0400 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 5A6E885EE90; Thu, 24 Oct 2019 15:10:55 +0000 (UTC) Received: from mail (ovpn-123-192.rdu2.redhat.com [10.10.123.192]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 25B35196B2; Thu, 24 Oct 2019 15:10:55 +0000 (UTC) Date: Thu, 24 Oct 2019 11:10:54 -0400 From: Andrea Arcangeli To: Mike Rapoport Cc: Andy Lutomirski , Jann Horn , Daniel Colascione , Linus Torvalds , Pavel Emelyanov , Lokesh Gidra , Nick Kralevich , Nosh Minwalla , Tim Murray , Mike Rapoport , Linux API , LKML Subject: Re: [PATCH 3/7] Add a UFFD_SECURE flag to the userfaultfd API. Message-ID: <20191024151054.GJ9902@redhat.com> References: <20191012191602.45649-1-dancol@google.com> <20191012191602.45649-4-dancol@google.com> <20191023190959.GA9902@redhat.com> <20191024090258.GA9802@linux.ibm.com> MIME-Version: 1.0 In-Reply-To: <20191024090258.GA9802@linux.ibm.com> User-Agent: Mutt/1.12.2 (2019-09-21) X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-MC-Unique: gGkffQx-MgiQBUn_hUtQng-1 X-Mimecast-Spam-Score: 0 Content-Type: text/plain; charset=WINDOWS-1252 Content-Transfer-Encoding: quoted-printable Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, On Thu, Oct 24, 2019 at 12:02:59PM +0300, Mike Rapoport wrote: > That's no the reason that UFFD_FEATURE_EVENT_FORK does not show up in > Debian code search, CRIU simply is not there. Debian packages CRIU only i= n > experimental and I believe that's not indexed by the code search. >=20 > As for the limitations, the races were fixed, I just forgot to update the > wiki. As for the supported memory types and COW pages, these only affect > efficiency of post-copy, but not the correctness. That's what I was hoping for. If the wiki information is stale and there are no races it is totally plausible that it's being actively used in production so we need to fix the kernel bug. I was just checking because I wasn't sure anymore of the status after I read the wiki. If the CRIU initialization code that issues the uffd syscall runs as global root the ABI breaking permission check from Andy sounds the simplest for a short term fix, because it will be unnoticed by any production usage with CIRU --lazy-pages. Then later we could add a UFFD_FEATURE_EVENT_FORK2 that will not require root permission. Thanks, Andrea