Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp573100pxp; Wed, 9 Mar 2022 08:24:03 -0800 (PST) X-Google-Smtp-Source: ABdhPJw/Y3j1/mOEcSZrVq2tQVtfwLx/vxOQU18X8MEdZX2tYH3qV291c7szkmkfjJLYiCSa2Aad X-Received: by 2002:a17:906:1f11:b0:685:d50e:3bf9 with SMTP id w17-20020a1709061f1100b00685d50e3bf9mr493547ejj.275.1646843043152; Wed, 09 Mar 2022 08:24:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646843043; cv=none; d=google.com; s=arc-20160816; b=sJkiDxBbd0m2elIdYfUaYbW5IdMyuL9yr6xrgqgcJK1/m3cS/YvI6y+JqquZsw68WR kN2H6mHNIF5/66u9O9M2kpFG8zezHh7xjd/QP2nOmEQuseqxtzAVPMgCR/kNT/lgrH5Y pMhhPR8QPs/Bm00Jt6yCwxkh6L0VCKbzfvEckXypQafgp1W2JFyl9+noJCFb4WHaJ0vS 02ryrSS6j6NXN0jNf4DfPYeJjXT1EjSi0jG1vOpbfvlrzSMtq/TWUVpsHfsP1njr4NKy pLr+neHoZoCLZj1jVtMbGTI0Z+026W1YOPqtNz5sc/7IUWZISHlHob64VKSPaQ3uTYZB xn6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=STEkdGSZPZuQXjVmWEDYcZY4MnTg8DgY/9sYGKZMBPs=; b=JQzBO6ihmBdRMottBqgNfejwMAlc4PFIfXfu2aG8ql790+YIJ9Rsule8slWM9wRE93 yqakzWfkhrC3W1IuXKk9MX4mIRWdOOlNwiXn1zbUEOBAJgGPx32z2aw4V0PQLTOvyzG8 mDyvdRGSxA3SResNRXgwpijm7dkrpbeC8ZU4O+0rBwJKqTldx6MSGHQHLqYVfbFq6FoD +S9xhQ0ZE4t8amwvtwx2UwUkBAZsTCU2a6RJOx3+Vj2ePivWFt6Z7I+ChbHOROAlzYB3 pNRUI/5HG6ZjEstKMgHFdZ4Uu6f9hKsTVoIP1bEBcI4Nsiv33e/hyI8HO6XFPmirOgO7 aU2Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j25-20020aa7de99000000b0041086c885b9si1460967edv.392.2022.03.09.08.23.40; Wed, 09 Mar 2022 08:24:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233928AbiCIPmd (ORCPT + 99 others); Wed, 9 Mar 2022 10:42:33 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36362 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231348AbiCIPmd (ORCPT ); Wed, 9 Mar 2022 10:42:33 -0500 Received: from pegase2.c-s.fr (pegase2.c-s.fr [93.17.235.10]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BEB5D17C430 for ; Wed, 9 Mar 2022 07:41:32 -0800 (PST) Received: from localhost (mailhub3.si.c-s.fr [172.26.127.67]) by localhost (Postfix) with ESMTP id 4KDGdP4YVVz9sSh; Wed, 9 Mar 2022 16:41:29 +0100 (CET) X-Virus-Scanned: amavisd-new at c-s.fr Received: from pegase2.c-s.fr ([172.26.127.65]) by localhost (pegase2.c-s.fr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Sf-CINmH9zVP; Wed, 9 Mar 2022 16:41:29 +0100 (CET) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase2.c-s.fr (Postfix) with ESMTP id 4KDGdP3NhXz9sQv; Wed, 9 Mar 2022 16:41:29 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 5ECF38B780; Wed, 9 Mar 2022 16:41:29 +0100 (CET) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id Lvh8lYiafQd6; Wed, 9 Mar 2022 16:41:29 +0100 (CET) Received: from [192.168.202.27] (unknown [192.168.202.27]) by messagerie.si.c-s.fr (Postfix) with ESMTP id B31918B763; Wed, 9 Mar 2022 16:41:27 +0100 (CET) Message-ID: <8bba9ed8-ae1f-7c98-fde5-808927935447@csgroup.eu> Date: Wed, 9 Mar 2022 16:41:29 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 Subject: Re: [PATCH v3 00/23] Add generic vdso_base tracking Content-Language: fr-FR To: Dmitry Safonov , linux-kernel@vger.kernel.org Cc: Dmitry Safonov <0x7f454c46@gmail.com>, Alexander Viro , Andrew Morton , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Catalin Marinas , Guo Ren , "H. Peter Anvin" , Ingo Molnar , Oleg Nesterov , Russell King , Thomas Bogendoerfer , Thomas Gleixner , Vincenzo Frascino , Will Deacon , x86@kernel.org References: <20210611180242.711399-1-dima@arista.com> From: Christophe Leroy In-Reply-To: <20210611180242.711399-1-dima@arista.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Dmitry, I'm wondering the status of this series. Wondering what to do while reviewing pending powerpc patches and especially https://patchwork.ozlabs.org/project/linuxppc-dev/patch/20201103171336.98883-1-ldufour@linux.ibm.com/ Christophe Le 11/06/2021 à 20:02, Dmitry Safonov a écrit : > v3 Changes: > - Migrated arch/powerpc to vdso_base > - Added x86/selftest for unmapped vdso & no landing on fast syscall > - Review comments from Andy & Christophe (thanks!) > - Amended s/born process/execed process/ everywhere I noticed > - Build robot warning on cast from __user pointer > > I've tested it on x86, I would appreciate any help with > Tested-by on arm/arm64/mips/powerpc/s390/... platforms. > > One thing I've noticed while cooking this and haven't found a clean > way to solve is zero-terminated .pages[] array in vdso mappings, which > is not always zero-terminated but works by the reason of > VM_DONTEXPAND on mappings. > > v2 Changes: > - Rename user_landing to vdso_base as it tracks vDSO VMA start address, > rather than the explicit address to land (Andy) > - Reword and don't use "new-execed" and "new-born" task (Andy) > - Fix failures reported by build robot > > Started from discussion [1], where was noted that currently a couple of > architectures support mremap() for vdso/sigpage, but not munmap(). > If an application maps something on the ex-place of vdso/sigpage, > later after processing signal it will land there (good luck!) > > Patches set is based on linux-next (next-20201123) and it depends on > changes in x86/cleanups (those reclaim TIF_IA32/TIF_X32) and also > on my changes in akpm (fixing several mremap() issues). > > Logically, the patches set divides on: > - patch 1: a cleanup for patches in x86/cleanups > - patches 2-13: cleanups for arch_setup_additional_pages() > - patches 13-14: x86 signal changes for unmapped vdso > - patches 15-22: provide generic vdso_base in mm_struct > - patch 23: selftest for unmapped vDSO & fast syscalls > > In the end, besides cleanups, it's now more predictable what happens for > applications with unmapped vdso on architectures those support .mremap() > for vdso/sigpage. > > I'm aware of only one user that unmaps vdso - Valgrind [2]. > (there possibly are more, but this one is "special", it unmaps vdso, but > not vvar, which confuses CRIU [Checkpoint Restore In Userspace], that's > why I'm aware of it) > I'm wondering the status of this series. Wondering what to do while reviewing pending powerpc patches and especially https://patchwork.ozlabs.org/project/linuxppc-dev/patch/20201103171336.98883-1-ldufour@linux.ibm.com/ Christophe