Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp1144681rdg; Wed, 11 Oct 2023 16:21:12 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGvImofuV1j5yulFXC+ILYitkQOTVDWam/wEseFcqDORhcbVb3pHCyr8ns7ZVi76OkJKAyb X-Received: by 2002:a05:6808:1a25:b0:3a0:3495:c8d4 with SMTP id bk37-20020a0568081a2500b003a03495c8d4mr29239855oib.28.1697066471721; Wed, 11 Oct 2023 16:21:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697066471; cv=none; d=google.com; s=arc-20160816; b=WeLPMhrLxvc7xwC2iZvT6aX/etisWgCtVo5PgEbNB89olNiIXRbiNSo6yNISlss5uN dbmmE7g1Vf7z/kwb9s2YExMnPVF3ozg847FddLg6ocaNyPoZ73vEb5uHhbTJXq8d6qss bt5x7GH22YpDwk/LCOY5C/A8e5E6x/tEMok9sxVJEVYx5EMnAyX6Dy8EDjz1xt0mdnzE Hhsb5w6hpfPV4BTWSB8RH/x6wuhD6q8JNGSg8l8uLibgktgSUFmvE60ZEpjME2Wq7V7T /iNKYiK/xrnVAcwY/eL48WTcoWLbgqKL4xNLaJCU063B+PFwV9jDMmwInXMgSBaoDTuB 254g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature:dkim-filter; bh=A+3phZYqNXM4miRlbtMsbx7u98cTT8X7Jf9CLISzVzM=; fh=pNxGwTaWa3EZzhoIfRoo+zSJMR+8IYHKGAItDkHaqpo=; b=yRHOZwOCzCKxjvUSRFC4DAdKJhmfgBLsAcpw9Z4pR0CHe57q+iqGycM48/UGhBW7da BgNyW3hNv2WyYAYbJe0DcphE9eMN2fcwpHkH/UU2SRo0MCG7NTZOwx4xx/lkQMMd3YnJ 07H5JNM6TXhB0x38Vhd/CLjAZ+tbvKT7admQqq3Qr+p+K8mDLfWRvbICLCwYl4GfXgCg gMl+AIyJ/VFERhxjTz8sWcxLREtw77j5Y8v/o639pW3bmePfKD4p2f4dsFCptGeOAjSX IDc8HzUR927TcmZ26E1CY4MBoBgGuRv7B6QhppLFgMSasEV6N6HXpzzks1IyspE1eGmF Xbnw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@zytor.com header.s=2023091101 header.b="XeQjykw/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id t7-20020a632247000000b00573fd9be4bdsi843502pgm.493.2023.10.11.16.21.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Oct 2023 16:21:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; dkim=pass header.i=@zytor.com header.s=2023091101 header.b="XeQjykw/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id E9A668062092; Wed, 11 Oct 2023 16:21:08 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235207AbjJKXVA (ORCPT + 99 others); Wed, 11 Oct 2023 19:21:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38328 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233737AbjJKXU6 (ORCPT ); Wed, 11 Oct 2023 19:20:58 -0400 Received: from mail.zytor.com (unknown [IPv6:2607:7c80:54:3::138]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B8CDAA4 for ; Wed, 11 Oct 2023 16:20:56 -0700 (PDT) Received: from [IPV6:2601:646:9a00:1821:7c45:267e:5aad:82e7] ([IPv6:2601:646:9a00:1821:7c45:267e:5aad:82e7]) (authenticated bits=0) by mail.zytor.com (8.17.1/8.17.1) with ESMTPSA id 39BNKBnV1461541 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Wed, 11 Oct 2023 16:20:12 -0700 DKIM-Filter: OpenDKIM Filter v2.11.0 mail.zytor.com 39BNKBnV1461541 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zytor.com; s=2023091101; t=1697066415; bh=A+3phZYqNXM4miRlbtMsbx7u98cTT8X7Jf9CLISzVzM=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=XeQjykw/+h9Es/QbI/1xphsZ0JBa+PKYr0spgfLTCDJIxFQzaBrWoMpvMWmDYX1fg FA/9IJypiexXo9wPeeNIosNU1QoGcvxS3ne1AaI5FujaBLJMX2VqMMxkgYEBL/5jVp ZdynKuLm2U0Qj3DNro6yBcaT2jqruhugaeOTRSi1RXGgRfm7Gc+T2ShhNXBmRe/Wt/ 4zkG4yMbgp5QdRzgBMRmyBZaEatruHUPhZZxgPXbU+TksTEClWrDXd0Zg1cCgOtNcW byOaWwtWwL4Qbzmk6w8iSrRCmOQR/1A2tY4EtfHdk2g/M3CdwestzW4UtnspFCDht6 ake1+JpJ2Ijlw== Message-ID: Date: Wed, 11 Oct 2023 16:20:06 -0700 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v3 00/23] Add generic vdso_base tracking Content-Language: en-US To: Dmitry Safonov , linux-kernel@vger.kernel.org Cc: Dmitry Safonov <0x7f454c46@gmail.com>, Alexander Viro , Andrew Morton , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Catalin Marinas , Christophe Leroy , Guo Ren , Ingo Molnar , Oleg Nesterov , Russell King , Thomas Bogendoerfer , Thomas Gleixner , Vincenzo Frascino , Will Deacon , x86@kernel.org References: <20210611180242.711399-1-dima@arista.com> From: "H. Peter Anvin" In-Reply-To: <20210611180242.711399-1-dima@arista.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=2.7 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Wed, 11 Oct 2023 16:21:09 -0700 (PDT) X-Spam-Level: ** On 6/11/21 11:02, Dmitry Safonov wrote: > > Patches set is based on linux-next (next-20201123) and it depends on > changes in x86/cleanups (those reclaim TIF_IA32/TIF_X32) and also > on my changes in akpm (fixing several mremap() issues). > > Logically, the patches set divides on: > - patch 1: a cleanup for patches in x86/cleanups > - patches 2-13: cleanups for arch_setup_additional_pages() > - patches 13-14: x86 signal changes for unmapped vdso > - patches 15-22: provide generic vdso_base in mm_struct > - patch 23: selftest for unmapped vDSO & fast syscalls > > In the end, besides cleanups, it's now more predictable what happens for > applications with unmapped vdso on architectures those support .mremap() > for vdso/sigpage. > > I'm aware of only one user that unmaps vdso - Valgrind [2]. > (there possibly are more, but this one is "special", it unmaps vdso, but > not vvar, which confuses CRIU [Checkpoint Restore In Userspace], that's > why I'm aware of it) > There was another discussion that might be relevant: actually associating the vdso with an actual file, and allowing a program to map said file normally if it want access to one that it normally wouldn't have (say, /proc/vdso/x86_64.so versus /proc/vdso/i386.so on the same system.) The "catch", of course, is that this file will need to be mapped as MAP_SHARED because of vdso data. -hpa