Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp705651ybt; Wed, 8 Jul 2020 09:39:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxZFKs//tQLfRBO1ibDBr1M3C75B1hFwbcalW/nfNm7+A+/xji5dLMwpTJ35F3sGtXtRAgE X-Received: by 2002:a17:906:a459:: with SMTP id cb25mr52006066ejb.234.1594226380349; Wed, 08 Jul 2020 09:39:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594226380; cv=none; d=google.com; s=arc-20160816; b=EKcey8M2f0GTWukXoRtP5H17bWJfuz+l6887zMcMgReOi6y2/suMmaqlX6PD6UHelX bWvQfqaGZfdOA7PokzjxW02bTNyC582rYPDsLSuK4guhmCUymLP9v+Zd0LFP/driC3G4 yi+oFmIuAVTqdz0EKSAlqoA295gMmHsQwKZPBxuGidAuIqlo27U2SXnoUjOx53WMUcXC P8p9qDEdRHd2OnskWkdO58q19gVI8OP5cUs1vWmYVT7zxQ57LP6tZxnfHtPbcKvu1dhQ 3f8CV96m46+Gt6lsQAP1hf8XKKernhzHKO+GXoAwBf+aqRYhG4WY0xHhiuhQEC6MBFrU bdrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:in-reply-to:date :references:subject:cc:to:from; bh=LxOfP7kfftkzvzs14knMjl0PomNDZ/PdhnzhpCW6KCA=; b=D6Wyt7QeJFrn3Osz+/HfOo7lhm5QdXke/4C1PyR9NewgGPvwCw4Da6nRtA95xv0vAS zLbbdCXwyd38QBGQu0uHeFZSTxqCY16TxIlDX1ZEby0aHRLZD/p6UKfuNVrFOHCVwkPV qMay+/fYLCB7Td9L/QTrG6WE681/n7OAyXyV28wjpnwAqQT01rN/uF6bd0RKP3iGs1I1 614Bm/AqyCxjEQL1c1W2iN6aVT/fEAMPwIpXLhWq1GtDreiBYlZBy3MbGqXsT7cuhvgN T6aZJtoaA8LDOL8YcGuvVfp7UjBSzDozWt1P9rHMCked8dLCM9SCRod5zinRQolgVD43 KRmg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l9si314562edn.77.2020.07.08.09.39.17; Wed, 08 Jul 2020 09:39:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730452AbgGHQgM (ORCPT + 99 others); Wed, 8 Jul 2020 12:36:12 -0400 Received: from albireo.enyo.de ([37.24.231.21]:57546 "EHLO albireo.enyo.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730445AbgGHQgM (ORCPT ); Wed, 8 Jul 2020 12:36:12 -0400 Received: from [172.17.203.2] (helo=deneb.enyo.de) by albireo.enyo.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) id 1jtD3D-0003zF-QC; Wed, 08 Jul 2020 16:36:03 +0000 Received: from fw by deneb.enyo.de with local (Exim 4.92) (envelope-from ) id 1jtD3D-0002Vp-NX; Wed, 08 Jul 2020 18:36:03 +0200 From: Florian Weimer To: Christian Brauner Cc: Mathieu Desnoyers , Linus Torvalds , carlos , Thomas Gleixner , linux-kernel , Peter Zijlstra , paulmck , Boqun Feng , "H. Peter Anvin" , Paul Turner , linux-api , Dmitry Vyukov , Neel Natu Subject: Re: [RFC PATCH for 5.8 3/4] rseq: Introduce RSEQ_FLAG_RELIABLE_CPU_ID References: <20200706204913.20347-1-mathieu.desnoyers@efficios.com> <20200706204913.20347-4-mathieu.desnoyers@efficios.com> <87fta3zstr.fsf@mid.deneb.enyo.de> <2088331919.943.1594118895344.JavaMail.zimbra@efficios.com> <874kqjzhkb.fsf@mid.deneb.enyo.de> <378862525.1039.1594123580789.JavaMail.zimbra@efficios.com> <87zh8bw158.fsf@mid.deneb.enyo.de> <1448906726.3717.1594222431276.JavaMail.zimbra@efficios.com> <20200708162247.txdleelcalxkrfjy@wittgenstein> Date: Wed, 08 Jul 2020 18:36:03 +0200 In-Reply-To: <20200708162247.txdleelcalxkrfjy@wittgenstein> (Christian Brauner's message of "Wed, 8 Jul 2020 18:22:47 +0200") Message-ID: <87zh8aufpo.fsf@mid.deneb.enyo.de> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Christian Brauner: > I've been following this a little bit. The kernel version itself doesn't > really mean anything and the kernel version is imho not at all > interesting to userspace applications. Especially for cross-distro > programs. We can't go around and ask Red Hat, SUSE, Ubuntu, Archlinux, > openSUSE and god knows who what other distro what their fixed kernel > version is. And Red Hat Enterprise Linux only has a dozen or two kernel branches under active maintenance, each with their own succession of version numbers. It's just not feasible. Even figuring out the branch based on the kernel version can be tricky! > (Also, as a side-note. I see that you're passing struct rseq *rseq with > a length argument but you are not versioning by size. Is that > intentional? That basically somewhat locks you to the current struct > rseq layout and means users might run into problems when you extend > struct rseq in the future as they can't pass the new struct down to > older kernels. The way we deal with this is now - rseq might preceed > this - is copy_struct_from_user() The kernel retains the pointer after the system call returns. Basically, ownership of the memory area is transferred to the kernel. It's like set_robust_list in this regard.