Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp465897ybg; Tue, 28 Jul 2020 10:19:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz74KIAw/Pqt0p2w7tBRElw9nX3mcaHqK/RkqpP+DRwGZB2XwPGgr3+eJRPKxixdV9S0//D X-Received: by 2002:a05:6402:1d97:: with SMTP id dk23mr27727132edb.1.1595956772247; Tue, 28 Jul 2020 10:19:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595956772; cv=none; d=google.com; s=arc-20160816; b=aUX+iv/ozQyGCuCiLiRffMzkMZqZCuQMIefe8/65MVYMxMHsd1iXv0jsavWqEdbpez 2NuOUvaWU5gyYfj594ImmpjsS4Ry8+LNdW8225QSOg5Qf/1VK0D4R25dh8+Ge0XGl3oD yo0BIATZarPd3jCs7qeP7NvJWDu5DsKnlS/2tUhs3D0sxCUqCXYxYsMHIsF64Bnk4NPj UrLsscWeObDr9AznpyjWd7NV7qD14hF+fdeXocqfa4x9UwN9rXuebDk3SQkAvhCWjXws w9ivIeDn8ju7l1XPxaCebegFKo5dn6q0HDH74umY4rmk9t8OttMoDHre+SBqnpZul9rp 1Ulg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=tRunBKxAlmRRoH1uBlPS5slU9DV7bwMikGIa8NyJ7dI=; b=XQM+pWGi91OqQJqvwyCqcapheAMn8p1DriIQM3GoXjcZhI5UAg0S9hCOe+30WR1Ujr 11Rw+QVDc2ROQXFcVOyW/5HqFnnbGTzB0RXHjoi5BKgoVvYCb6/tHg3GkxFhfB80vEhN LITYwAVwpAyytMijKxmxij3l2MXp+jxWrsRe31rx2K0Gt+mYxxleTc8BwT3S+o8kZNLa iJ3iL1DWGBaQXKhSCGyDC2ZsIUhwVqYrJgi/xoKiHmNnh6hfpxP+1t/A9rFm23kSCikJ XTsoBn5XEe3a4IhDTmXyjw1jk6xXAKh0xDOaIDcZhKHyOGQ+9Xt6KLoKkoVwgJv6P2LI NeYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KPnMEN7i; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dt10si10150450ejc.535.2020.07.28.10.19.09; Tue, 28 Jul 2020 10:19:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KPnMEN7i; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731892AbgG1RQp (ORCPT + 99 others); Tue, 28 Jul 2020 13:16:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:37294 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731845AbgG1RQp (ORCPT ); Tue, 28 Jul 2020 13:16:45 -0400 Received: from mail-wm1-f46.google.com (mail-wm1-f46.google.com [209.85.128.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8182D21D95 for ; Tue, 28 Jul 2020 17:16:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1595956604; bh=FPl2g9z95O/j9qakMr1cGWs3U8+LQVfszTzNisgkf+I=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=KPnMEN7iCF/xEO6QsEaxqYO2GzTsDtB7AMcRLK6l/UjK4oIn/F4JOGSXZUvYW44s1 jEFlyTCl3P3MEFUQeNfubHYCCc9zG74UqQBTODvN2LzJ4uy4XxTnjTnNBbEJ2yMVj4 PZjnIsRaELUQ0yXk6Deqthsuj/8xNzoMTptFK1So= Received: by mail-wm1-f46.google.com with SMTP id d190so265418wmd.4 for ; Tue, 28 Jul 2020 10:16:44 -0700 (PDT) X-Gm-Message-State: AOAM530Yv6SlwOXbIC0weDf9w8qTSrLFXTro8w2lLTw0bQ5YjcbYohNo 3YlD4ktFfx0Tum27xkC94CAGUVSksm0WEIhogaJS/g== X-Received: by 2002:a1c:de86:: with SMTP id v128mr4734767wmg.36.1595956603047; Tue, 28 Jul 2020 10:16:43 -0700 (PDT) MIME-Version: 1.0 References: <20200728131050.24443-1-madvenka@linux.microsoft.com> In-Reply-To: From: Andy Lutomirski Date: Tue, 28 Jul 2020 10:16:32 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor To: "Madhavan T. Venkataraman" Cc: David Laight , "kernel-hardening@lists.openwall.com" , "linux-api@vger.kernel.org" , "linux-arm-kernel@lists.infradead.org" , "linux-fsdevel@vger.kernel.org" , "linux-integrity@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "linux-security-module@vger.kernel.org" , "oleg@redhat.com" , "x86@kernel.org" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 28, 2020 at 9:32 AM Madhavan T. Venkataraman wrote: > > Thanks. See inline.. > > On 7/28/20 10:13 AM, David Laight wrote: > > From: madvenka@linux.microsoft.com > >> Sent: 28 July 2020 14:11 > > ... > >> The kernel creates the trampoline mapping without any permissions. When > >> the trampoline is executed by user code, a page fault happens and the > >> kernel gets control. The kernel recognizes that this is a trampoline > >> invocation. It sets up the user registers based on the specified > >> register context, and/or pushes values on the user stack based on the > >> specified stack context, and sets the user PC to the requested target > >> PC. When the kernel returns, execution continues at the target PC. > >> So, the kernel does the work of the trampoline on behalf of the > >> application. > > Isn't the performance of this going to be horrid? > > It takes about the same amount of time as getpid(). So, it is > one quick trip into the kernel. I expect that applications will > typically not care about this extra overhead as long as > they are able to run. What did you test this on? A page fault on any modern x86_64 system is much, much, much, much slower than a syscall. --Andy