Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp3630871ybl; Fri, 20 Dec 2019 12:41:00 -0800 (PST) X-Google-Smtp-Source: APXvYqz9dOBLSDRStgqHx+A2GEQ2+XeHFlzq2DRNwIxzUWrv//ucTQPHokvcD5ABWuaJ4tKqQC8S X-Received: by 2002:a9d:27c4:: with SMTP id c62mr17374726otb.292.1576874460152; Fri, 20 Dec 2019 12:41:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576874460; cv=none; d=google.com; s=arc-20160816; b=e58q7M7kyI/ZHbt6MBaZBSRWU5m8TCzCbgfneBjM2RyW3iIQ6RqzT2ExAp2L9siiu+ xDNI9GhhpEtWEPo+6aiUVeYeLahlsfDJCutXD9dSq7l3NHHXR5abZ1di6Cb9aBkj7vrG 4NhhLMG6+hQEcOkluBApPyeuiC0EpyUhpCov6UiyLj9BB05MMkE3PIrBQtmIxy2P0h5P 3PXC2qyjPlTxPqUO1f++rwWsg2VJs0uZ5X/p1iQZTKIr3l8C6rt3h50yFXdUC7tNLdth 8IvD6G2XWWOHFsAyteXOrwZpQYNAQuaCwh4og2e6YGIARkc2pZ7GSIdk8V0hxuT5p8a2 e5HQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:in-reply-to:date :references:subject:cc:to:from; bh=uS7g00p2bv7UjhrD2hZxpAqbHw2140VMA2LKUq3WoqA=; b=wTb+OeCzTaty0SR1xUzmfKMzUON001PbhNufgo8Jmyx5LE+PfKKAhl60BzgZi9CJPX lOXzLXKbwzfdj61mFAPSfCKVuByMrkFcTj44kb0n+F6KeH/nUOJAdK7u4Hq7Pl1YAwkd 5J7Ll059uARdDxF2ijSG5FW4NFoyWUwav2U3BHUzGnLbf/saKPxjNx3tSFvh1W8OYQ6e 29ja0REyBB/vdvPqYeBuQAeWHsJAjv4uRddZPDP0eTLQkb6aeaF/+zTmhh/QbGwQFcFB KdqYj6etj4TjJnyuv/oCzYjBkR9JENeghx0mYPkMPU8FH+iPF0az6hSocV84EjGeDJOr GvDQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g1si2566035otj.115.2019.12.20.12.40.48; Fri, 20 Dec 2019 12:41:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727506AbfLTUiw (ORCPT + 99 others); Fri, 20 Dec 2019 15:38:52 -0500 Received: from albireo.enyo.de ([37.24.231.21]:55826 "EHLO albireo.enyo.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726525AbfLTUiw (ORCPT ); Fri, 20 Dec 2019 15:38:52 -0500 Received: from [172.17.203.2] (helo=deneb.enyo.de) by albireo.enyo.de with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) id 1iiP2t-00038h-Cg; Fri, 20 Dec 2019 20:38:47 +0000 Received: from fw by deneb.enyo.de with local (Exim 4.92) (envelope-from ) id 1iiP27-00038J-SH; Fri, 20 Dec 2019 21:37:59 +0100 From: Florian Weimer To: Mathieu Desnoyers Cc: Thomas Gleixner , linux-kernel@vger.kernel.org, Peter Zijlstra , "Paul E . McKenney" , Boqun Feng , "H . Peter Anvin" , Paul Turner , linux-api@vger.kernel.org, stable@vger.kernel.org, Dmitry Vyukov , Neel Natu Subject: Re: [PATCH for 5.5 1/2] rseq: Fix: Clarify rseq.h UAPI rseq_cs memory reclaim requirements References: <20191220201207.17389-1-mathieu.desnoyers@efficios.com> Date: Fri, 20 Dec 2019 21:37:59 +0100 In-Reply-To: <20191220201207.17389-1-mathieu.desnoyers@efficios.com> (Mathieu Desnoyers's message of "Fri, 20 Dec 2019 15:12:06 -0500") Message-ID: <87imman36g.fsf@mid.deneb.enyo.de> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Mathieu Desnoyers: > diff --git a/include/uapi/linux/rseq.h b/include/uapi/linux/rseq.h > index 9a402fdb60e9..6f26b0b148a6 100644 > --- a/include/uapi/linux/rseq.h > +++ b/include/uapi/linux/rseq.h > @@ -100,7 +100,9 @@ struct rseq { > * instruction sequence block, as well as when the kernel detects that > * it is preempting or delivering a signal outside of the range > * targeted by the rseq_cs. Also needs to be set to NULL by user-space > - * before reclaiming memory that contains the targeted struct rseq_cs. > + * before reclaiming memory that contains the targeted struct rseq_cs > + * or reclaiming memory that contains the code refered to by the > + * start_ip and post_commit_offset fields of struct rseq_cs. Maybe mention that it's good practice to clear rseq_cs before returning from a function that contains a restartable sequence? That will deal with the dlclose issue because even if the function calls dlclose itself, unmapping something on call stack for dlclose is already undefined.