Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp213239pxb; Wed, 14 Apr 2021 13:23:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwTUEkm3Rx6QT/twS30NcfTjwPRDV8QTqfgdlXn3BeE1ldt9j82XvhdtPwY/j2j5mThF0y8 X-Received: by 2002:a17:906:c283:: with SMTP id r3mr662963ejz.328.1618431820856; Wed, 14 Apr 2021 13:23:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618431820; cv=none; d=google.com; s=arc-20160816; b=rU0uGX0/pdTX1nrcH8TnhZvyvJVCnVkZmtui3cpaCuVfhkDgyGplEqBSASmdDySoPd nfOQ68d/QJaBiIkZDViuGWm4tuu2XiJ6sDgM7L6OXUgvexJYaYdd0oP70XpJ7xD/pEgK if/OdmQP+MOZ+UUcIXyB9ood1TtaTwN+qFC91qfo6ZXvttcJFN1zSL25CZ7/e3gOpNVZ 4COrS3OTnJYX1E2xwvACsE4qVV3+hQhZB+hSe/nRwi+Rb1iO61SHuQOvsQxn6pjzFAWy LdlV16izV9Xr7fkc+GsMSAb8Y/Zavm/mR5wezA1V3f+JwQjUu0m53CYT8jeVFNR+q61V 8wrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:organization :from:references:cc:to:subject; bh=V021SJLVg5kyRVHf/gLz5RODD+4YGcjU+F4RNoia5BA=; b=ZVA7VOTcatnVzPgG2BhI9S4r4bEALo+Aj3J1N6mj2DqkSE6hEyTa+yer7KLzcwnjsS Dir7PGNA+eAc0ztlPgcfMigwVVhVALlVL9zxIQMKuDAdUZ+Ov1Bdl6n8jqcN8OLNJ45T J6GekEY/Dk/DUDRjPh8E+pky1V4SymU/PJ3u4qteoKiOF8liDuR5fkjb7qBtBx5s7GZq yQfxboj4UXrDz4S1SOW9uO28mXZnEh09y6D7V66EzrR1LLW17CY8R5L3Vbr6ZCHrQiIU tjwpn+KEdjQUGhHqeOcgqwf46ammWTIcFvzwrVtae0tb6+/9pNduUGr21wsxfpBF3XhE uCIA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b13si561535edz.155.2021.04.14.13.23.17; Wed, 14 Apr 2021 13:23:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1348639AbhDNHXd (ORCPT + 99 others); Wed, 14 Apr 2021 03:23:33 -0400 Received: from ivanoab7.miniserver.com ([37.128.132.42]:34460 "EHLO www.kot-begemot.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231231AbhDNHXb (ORCPT ); Wed, 14 Apr 2021 03:23:31 -0400 Received: from tun252.jain.kot-begemot.co.uk ([192.168.18.6] helo=jain.kot-begemot.co.uk) by www.kot-begemot.co.uk with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1lWZr5-0004AT-4T; Wed, 14 Apr 2021 07:22:35 +0000 Received: from madding.kot-begemot.co.uk ([192.168.3.98]) by jain.kot-begemot.co.uk with esmtps (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92) (envelope-from ) id 1lWZr2-0003Qz-Ki; Wed, 14 Apr 2021 08:22:30 +0100 Subject: Re: [PATCH 0/4 POC] Allow executing code and syscalls in another address space To: Andrei Vagin , linux-kernel@vger.kernel.org, linux-api@vger.kernel.org Cc: linux-um@lists.infradead.org, criu@openvz.org, avagin@google.com, Andrew Morton , Andy Lutomirski , Christian Brauner , Dmitry Safonov <0x7f454c46@gmail.com>, Ingo Molnar , Jeff Dike , Mike Rapoport , Michael Kerrisk , Oleg Nesterov , Peter Zijlstra , Richard Weinberger , Thomas Gleixner References: <20210414055217.543246-1-avagin@gmail.com> From: Anton Ivanov Organization: Cambridge Greys Message-ID: <78cdee11-1923-595f-90d2-e236efbafa6a@cambridgegreys.com> Date: Wed, 14 Apr 2021 08:22:28 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.9.0 MIME-Version: 1.0 In-Reply-To: <20210414055217.543246-1-avagin@gmail.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-Spam-Score: -1.0 X-Spam-Score: -1.0 X-Clacks-Overhead: GNU Terry Pratchett Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 14/04/2021 06:52, Andrei Vagin wrote: > We already have process_vm_readv and process_vm_writev to read and write > to a process memory faster than we can do this with ptrace. And now it > is time for process_vm_exec that allows executing code in an address > space of another process. We can do this with ptrace but it is much > slower. > > = Use-cases = > > Here are two known use-cases. The first one is “application kernel” > sandboxes like User-mode Linux and gVisor. In this case, we have a > process that runs the sandbox kernel and a set of stub processes that > are used to manage guest address spaces. Guest code is executed in the > context of stub processes but all system calls are intercepted and > handled in the sandbox kernel. Right now, these sort of sandboxes use > PTRACE_SYSEMU to trap system calls, but the process_vm_exec can > significantly speed them up. Certainly interesting, but will require um to rework most of its memory management and we will most likely need extra mm support to make use of it in UML. We are not likely to get away just with one syscall there. > > Another use-case is CRIU (Checkpoint/Restore in User-space). Several > process properties can be received only from the process itself. Right > now, we use a parasite code that is injected into the process. We do > this with ptrace but it is slow, unsafe, and tricky. process_vm_exec can > simplify the process of injecting a parasite code and it will allow > pre-dump memory without stopping processes. The pre-dump here is when we > enable a memory tracker and dump the memory while a process is continue > running. On each interaction we dump memory that has been changed from > the previous iteration. In the final step, we will stop processes and > dump their full state. Right now the most effective way to dump process > memory is to create a set of pipes and splice memory into these pipes > from the parasite code. With process_vm_exec, we will be able to call > vmsplice directly. It means that we will not need to stop a process to > inject the parasite code. > > = How it works = > > process_vm_exec has two modes: > > * Execute code in an address space of a target process and stop on any > signal or system call. > > * Execute a system call in an address space of a target process. > > int process_vm_exec(pid_t pid, struct sigcontext uctx, > unsigned long flags, siginfo_t siginfo, > sigset_t *sigmask, size_t sizemask) > > PID - target process identification. We can consider to use pidfd > instead of PID here. > > sigcontext contains a process state with what the process will be > resumed after switching the address space and then when a process will > be stopped, its sate will be saved back to sigcontext. > > siginfo is information about a signal that has interrupted the process. > If a process is interrupted by a system call, signfo will contain a > synthetic siginfo of the SIGSYS signal. > > sigmask is a set of signals that process_vm_exec returns via signfo. > > # How fast is it > > In the fourth patch, you can find two benchmarks that execute a function > that calls system calls in a loop. ptrace_vm_exe uses ptrace to trap > system calls, proces_vm_exec uses the process_vm_exec syscall to do the > same thing. > > ptrace_vm_exec: 1446 ns/syscall > ptrocess_vm_exec: 289 ns/syscall > > PS: This version is just a prototype. Its goal is to collect the initial > feedback, to discuss the interfaces, and maybe to get some advice on > implementation.. > > Cc: Andrew Morton > Cc: Andy Lutomirski > Cc: Anton Ivanov > Cc: Christian Brauner > Cc: Dmitry Safonov <0x7f454c46@gmail.com> > Cc: Ingo Molnar > Cc: Jeff Dike > Cc: Mike Rapoport > Cc: Michael Kerrisk (man-pages) > Cc: Oleg Nesterov > Cc: Peter Zijlstra > Cc: Richard Weinberger > Cc: Thomas Gleixner > > Andrei Vagin (4): > signal: add a helper to restore a process state from sigcontex > arch/x86: implement the process_vm_exec syscall > arch/x86: allow to execute syscalls via process_vm_exec > selftests: add tests for process_vm_exec > > arch/Kconfig | 15 ++ > arch/x86/Kconfig | 1 + > arch/x86/entry/common.c | 19 +++ > arch/x86/entry/syscalls/syscall_64.tbl | 1 + > arch/x86/include/asm/sigcontext.h | 2 + > arch/x86/kernel/Makefile | 1 + > arch/x86/kernel/process_vm_exec.c | 160 ++++++++++++++++++ > arch/x86/kernel/signal.c | 125 ++++++++++---- > include/linux/entry-common.h | 2 + > include/linux/process_vm_exec.h | 17 ++ > include/linux/sched.h | 7 + > include/linux/syscalls.h | 6 + > include/uapi/asm-generic/unistd.h | 4 +- > include/uapi/linux/process_vm_exec.h | 8 + > kernel/entry/common.c | 2 +- > kernel/fork.c | 9 + > kernel/sys_ni.c | 2 + > .../selftests/process_vm_exec/Makefile | 7 + > tools/testing/selftests/process_vm_exec/log.h | 26 +++ > .../process_vm_exec/process_vm_exec.c | 105 ++++++++++++ > .../process_vm_exec/process_vm_exec_fault.c | 111 ++++++++++++ > .../process_vm_exec/process_vm_exec_syscall.c | 81 +++++++++ > .../process_vm_exec/ptrace_vm_exec.c | 111 ++++++++++++ > 23 files changed, 785 insertions(+), 37 deletions(-) > create mode 100644 arch/x86/kernel/process_vm_exec.c > create mode 100644 include/linux/process_vm_exec.h > create mode 100644 include/uapi/linux/process_vm_exec.h > create mode 100644 tools/testing/selftests/process_vm_exec/Makefile > create mode 100644 tools/testing/selftests/process_vm_exec/log.h > create mode 100644 tools/testing/selftests/process_vm_exec/process_vm_exec.c > create mode 100644 tools/testing/selftests/process_vm_exec/process_vm_exec_fault.c > create mode 100644 tools/testing/selftests/process_vm_exec/process_vm_exec_syscall.c > create mode 100644 tools/testing/selftests/process_vm_exec/ptrace_vm_exec.c > -- Anton R. Ivanov Cambridgegreys Limited. Registered in England. Company Number 10273661 https://www.cambridgegreys.com/