Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp4833817pxb; Mon, 15 Feb 2021 02:26:18 -0800 (PST) X-Google-Smtp-Source: ABdhPJyGE17p2eqDX3BCQiy3u0nqwa1zbR5mQzuSkOcrwFFKiCEcQTGjO3PZYJmqEJakYrCN1sRJ X-Received: by 2002:a17:906:a3d5:: with SMTP id ca21mr15119918ejb.192.1613384778039; Mon, 15 Feb 2021 02:26:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613384778; cv=none; d=google.com; s=arc-20160816; b=hH6MxPDAi4Fo2ZzqrawVPsGeie2FJ0izRhv54vv+Zbu160hY09S/kn090D0G21WDGc W3r9/ZckZzE97W4bnnqhLx9bGyIihYvfGMRC4a/guC11lbSOMaknXv7KjXV5YmnAhSsc XMcxxMZ3q+HZwrVRVEEY8OaUFRmaycZKU63RCOIcT8QdBUuDkeAkdjOuk5xGJRuzeEbF h4cy37UGlgcKPqgTMYAeJ0PnoIFdI0G/3aIeL0h+ZsIOFArCeCyZWamuBXVq2cqntY1D IekjkiklHULZw9An9CTZ82tkjInRbZPd96uMHsYpEdLGX10wWN+CEBnkpg/45mMcTHLo 4BQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=/EHuvKYfiagp/Dx3b87++lJ7F4I3HRUFayZY/2a5GZg=; b=dhsR2WILz5+rxcVY2TEd5diiLBCdaw/kdqyxQ8eQCLJ0VGkhLAMkNtqKsypK6giHRU CLATiGXx+e01ML8/UqeoXbeVU1iNty9vBmU8ru2oqTF8e5vHeDDwBy+7riTpyubfJyVU dZ5ZP2eF+FUp65yVG4s8p6LqN6BINAsJKsN8ZC+ladyOLjKDBnhzVwL0o2d2+1Tfn/YU ZHaYEu2hhi/kFtU0EpDS2LNSK10ZbrQcCum1NTqchcFUR8eUH0E+mNqAH6wlb5Qwbex1 f4wyo/P7rAHdElVRTECmLKTpb/SrsM5LrYC7SZEZSi0dbgC9BdMl0W4OoukmWlt7V44A XFZA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d24si1691787edz.429.2021.02.15.02.25.54; Mon, 15 Feb 2021 02:26:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229927AbhBOKYC (ORCPT + 99 others); Mon, 15 Feb 2021 05:24:02 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57576 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229627AbhBOKYB (ORCPT ); Mon, 15 Feb 2021 05:24:01 -0500 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 891A3C061756 for ; Mon, 15 Feb 2021 02:23:20 -0800 (PST) Received: from gallifrey.ext.pengutronix.de ([2001:67c:670:201:5054:ff:fe8d:eefb] helo=[IPv6:::1]) by metis.ext.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1lBb2C-0002vs-Le; Mon, 15 Feb 2021 11:23:16 +0100 Message-ID: <188afd4d2e299652da33ad5d4ea743f02fb2ffc5.camel@pengutronix.de> Subject: Re: [PATCH] kernel: Expose SYS_kcmp by default From: Lucas Stach To: Pavel Machek , Chris Wilson Cc: linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, intel-gfx@lists.freedesktop.org, Kees Cook , Andy Lutomirski , Will Drewry , Andrew Morton , Dave Airlie , Daniel Vetter Date: Mon, 15 Feb 2021 11:23:11 +0100 In-Reply-To: <20210213174000.GA31409@duo.ucw.cz> References: <20210205163752.11932-1-chris@chris-wilson.co.uk> <20210213174000.GA31409@duo.ucw.cz> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.38.3 (3.38.3-1.fc33) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-SA-Exim-Connect-IP: 2001:67c:670:201:5054:ff:fe8d:eefb X-SA-Exim-Mail-From: l.stach@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Am Samstag, dem 13.02.2021 um 18:40 +0100 schrieb Pavel Machek: > Hi! > > > Userspace has discovered the functionality offered by SYS_kcmp and has > > started to depend upon it. In particular, Mesa uses SYS_kcmp for > > os_same_file_description() in order to identify when two fd (e.g. device > > or dmabuf) point to the same struct file. Since they depend on it for > > core functionality, lift SYS_kcmp out of the non-default > > CONFIG_CHECKPOINT_RESTORE into the selectable syscall category. > > Is it good idea to enable everything because Mesa uses it for file > descriptors? > > This is really interesting syscall... As Debian/Ubuntu and Fedora are already shipping with CONFIG_CHECKPOINT_RESTORE=y in their kernel configs, I don't really see the need to add further restrictions here. Or this discussion should have happened a while ago... Regards, Lucas