s the point of maintaining all of the complexity of
> the ifdefs. If no one can come up with a reason I say let's just remove
> CONFIG_CHECKPOINT_RESTORE entirely.
>
> Eric
>
>
>> Signed-off-by: Adrian Reber
>> Cc: Oleg Nesterov
>> Cc: Pavel Emelyanov
>
s the point of maintaining all of the complexity of
> the ifdefs. If no one can come up with a reason I say let's just remove
> CONFIG_CHECKPOINT_RESTORE entirely.
>
> Eric
>
>
>> Signed-off-by: Adrian Reber
>> Cc: Oleg Nesterov
>> Cc: Pavel Emelyanov
>
To make it easier for distributions to enable CHECKPOINT_RESTORE this
> removes EXPERT and moves the configuration option out of the EXPERT
> block.
>
> Signed-off-by: Adrian Reber
> Cc: Oleg Nesterov
> Cc: Pavel Emelyanov
> Cc: Andrew Morton
> Cc: Eric W. Biederman
&
To make it easier for distributions to enable CHECKPOINT_RESTORE this
> removes EXPERT and moves the configuration option out of the EXPERT
> block.
>
> Signed-off-by: Adrian Reber
> Cc: Oleg Nesterov
> Cc: Pavel Emelyanov
> Cc: Andrew Morton
> Cc: Eric W. Biederman
&
es once the uffd message is read by the monitor. That's
> surely way before monitor had chance to somehow process that message.
Ouch, yes. This is nasty :( So having no better solution in mind, let's
move forward with this.
Acked-by: Pavel Emelyanov <xe...@virtuozzo.com>
es once the uffd message is read by the monitor. That's
> surely way before monitor had chance to somehow process that message.
Ouch, yes. This is nasty :( So having no better solution in mind, let's
move forward with this.
Acked-by: Pavel Emelyanov
On 05/24/2018 02:56 PM, Mike Rapoport wrote:
> On Thu, May 24, 2018 at 02:24:37PM +0300, Pavel Emelyanov wrote:
>> On 05/23/2018 10:42 AM, Mike Rapoport wrote:
>>> If a process monitored with userfaultfd changes it's memory mappings or
>>> forks() at the same time as uff
On 05/24/2018 02:56 PM, Mike Rapoport wrote:
> On Thu, May 24, 2018 at 02:24:37PM +0300, Pavel Emelyanov wrote:
>> On 05/23/2018 10:42 AM, Mike Rapoport wrote:
>>> If a process monitored with userfaultfd changes it's memory mappings or
>>> forks() at the same time as uff
he non-cooperative events. In
> such case we return -EAGAIN and the uffd monitor can understand that
> userfaultfd_copy() clashed with a non-cooperative event and take an
> appropriate action.
>
> Signed-off-by: Mike Rapoport <r...@linux.vnet.ibm.com>
> Cc: Andrea Arcangeli &
he non-cooperative events. In
> such case we return -EAGAIN and the uffd monitor can understand that
> userfaultfd_copy() clashed with a non-cooperative event and take an
> appropriate action.
>
> Signed-off-by: Mike Rapoport
> Cc: Andrea Arcangeli
>
> @@ -52,6 +53,7 @@
> #define _UFFDIO_WAKE (0x02)
> #define _UFFDIO_COPY (0x03)
> #define _UFFDIO_ZEROPAGE (0x04)
> +#define _UFFDIO_WAKE_SYNC_EVENT (0x05)
Excuse my ignorance, but what's the difference between UFFDIO_WAKE and
> @@ -52,6 +53,7 @@
> #define _UFFDIO_WAKE (0x02)
> #define _UFFDIO_COPY (0x03)
> #define _UFFDIO_ZEROPAGE (0x04)
> +#define _UFFDIO_WAKE_SYNC_EVENT (0x05)
Excuse my ignorance, but what's the difference between UFFDIO_WAKE and
On 02/27/2018 05:18 AM, Dmitry V. Levin wrote:
> On Mon, Feb 26, 2018 at 12:02:25PM +0300, Pavel Emelyanov wrote:
>> On 02/21/2018 03:44 AM, Andrew Morton wrote:
>>> On Tue, 9 Jan 2018 08:30:49 +0200 Mike Rapoport <r...@linux.vnet.ibm.com>
>>> wrote:
>
On 02/27/2018 05:18 AM, Dmitry V. Levin wrote:
> On Mon, Feb 26, 2018 at 12:02:25PM +0300, Pavel Emelyanov wrote:
>> On 02/21/2018 03:44 AM, Andrew Morton wrote:
>>> On Tue, 9 Jan 2018 08:30:49 +0200 Mike Rapoport
>>> wrote:
>>>
>>>> This pat
On 02/21/2018 03:44 AM, Andrew Morton wrote:
> On Tue, 9 Jan 2018 08:30:49 +0200 Mike Rapoport
> wrote:
>
>> This patches introduces new process_vmsplice system call that combines
>> functionality of process_vm_read and vmsplice.
>
> All seems fairly strightforward.
On 02/21/2018 03:44 AM, Andrew Morton wrote:
> On Tue, 9 Jan 2018 08:30:49 +0200 Mike Rapoport
> wrote:
>
>> This patches introduces new process_vmsplice system call that combines
>> functionality of process_vm_read and vmsplice.
>
> All seems fairly strightforward. The big question is: do
On 12/11/2017 05:08 PM, Amir Goldstein wrote:
> On Mon, Dec 11, 2017 at 3:46 PM, Pavel Emelyanov <xe...@virtuozzo.com> wrote:
>> On 12/11/2017 10:05 AM, Amir Goldstein wrote:
>>> On Mon, Dec 11, 2017 at 8:41 AM, Amir Goldstein <amir7...@gmail.com> wrote:
>&g
On 12/11/2017 05:08 PM, Amir Goldstein wrote:
> On Mon, Dec 11, 2017 at 3:46 PM, Pavel Emelyanov wrote:
>> On 12/11/2017 10:05 AM, Amir Goldstein wrote:
>>> On Mon, Dec 11, 2017 at 8:41 AM, Amir Goldstein wrote:
>>>> On Mon, Dec 11, 2017 at 8:04 AM, NeilBrown wro
On 12/11/2017 10:05 AM, Amir Goldstein wrote:
> On Mon, Dec 11, 2017 at 8:41 AM, Amir Goldstein wrote:
>> On Mon, Dec 11, 2017 at 8:04 AM, NeilBrown wrote:
>>> If a filesystem does not set sb->s_export_op, then it
>>> does not support filehandles and
On 12/11/2017 10:05 AM, Amir Goldstein wrote:
> On Mon, Dec 11, 2017 at 8:41 AM, Amir Goldstein wrote:
>> On Mon, Dec 11, 2017 at 8:04 AM, NeilBrown wrote:
>>> If a filesystem does not set sb->s_export_op, then it
>>> does not support filehandles and export_fs_encode_fh()
>>> and
On 05/24/2017 02:31 PM, Vlastimil Babka wrote:
> On 05/24/2017 12:39 PM, Mike Rapoport wrote:
>>> Hm so the prctl does:
>>>
>>> if (arg2)
>>> me->mm->def_flags |= VM_NOHUGEPAGE;
>>> else
>>> me->mm->def_flags &=
On 05/24/2017 02:31 PM, Vlastimil Babka wrote:
> On 05/24/2017 12:39 PM, Mike Rapoport wrote:
>>> Hm so the prctl does:
>>>
>>> if (arg2)
>>> me->mm->def_flags |= VM_NOHUGEPAGE;
>>> else
>>> me->mm->def_flags &=
On 05/24/2017 02:18 PM, Michal Hocko wrote:
> On Wed 24-05-17 13:39:48, Mike Rapoport wrote:
>> On Wed, May 24, 2017 at 09:58:06AM +0200, Vlastimil Babka wrote:
>>> On 05/24/2017 09:50 AM, Mike Rapoport wrote:
On Mon, May 22, 2017 at 05:52:47PM +0200, Vlastimil Babka wrote:
> On
On 05/24/2017 02:18 PM, Michal Hocko wrote:
> On Wed 24-05-17 13:39:48, Mike Rapoport wrote:
>> On Wed, May 24, 2017 at 09:58:06AM +0200, Vlastimil Babka wrote:
>>> On 05/24/2017 09:50 AM, Mike Rapoport wrote:
On Mon, May 22, 2017 at 05:52:47PM +0200, Vlastimil Babka wrote:
> On
On 02/22/2017 03:04 PM, Alexey Gladkov wrote:
> On Wed, Feb 22, 2017 at 10:40:49AM +0300, Pavel Emelyanov wrote:
>> On 02/21/2017 05:57 PM, Oleg Nesterov wrote:
>>> On 02/18, Alexey Gladkov wrote:
>>>>
>>>> This patch allows to mount only the part of /proc
On 02/22/2017 03:04 PM, Alexey Gladkov wrote:
> On Wed, Feb 22, 2017 at 10:40:49AM +0300, Pavel Emelyanov wrote:
>> On 02/21/2017 05:57 PM, Oleg Nesterov wrote:
>>> On 02/18, Alexey Gladkov wrote:
>>>>
>>>> This patch allows to mount only the part of /proc
On 02/22/2017 11:18 AM, Cyrill Gorcunov wrote:
> On Wed, Feb 22, 2017 at 11:09:23AM +0300, Pavel Emelyanov wrote:
>>>>
>>>> Actually it shouldn't. If you extend the kcmp argument to accept the
>>>> epollfd:epollslot pair, this would be effectively the sa
On 02/22/2017 11:18 AM, Cyrill Gorcunov wrote:
> On Wed, Feb 22, 2017 at 11:09:23AM +0300, Pavel Emelyanov wrote:
>>>>
>>>> Actually it shouldn't. If you extend the kcmp argument to accept the
>>>> epollfd:epollslot pair, this would be effectively the sa
On 02/22/2017 10:54 AM, Cyrill Gorcunov wrote:
> On Wed, Feb 22, 2017 at 10:44:07AM +0300, Pavel Emelyanov wrote:
>> On 02/21/2017 10:16 PM, Cyrill Gorcunov wrote:
>>> On Tue, Feb 21, 2017 at 10:41:12AM -0800, Andy Lutomirski wrote:
>>>>> Thus lets add file positi
On 02/22/2017 10:54 AM, Cyrill Gorcunov wrote:
> On Wed, Feb 22, 2017 at 10:44:07AM +0300, Pavel Emelyanov wrote:
>> On 02/21/2017 10:16 PM, Cyrill Gorcunov wrote:
>>> On Tue, Feb 21, 2017 at 10:41:12AM -0800, Andy Lutomirski wrote:
>>>>> Thus lets add file positi
On 02/21/2017 10:16 PM, Cyrill Gorcunov wrote:
> On Tue, Feb 21, 2017 at 10:41:12AM -0800, Andy Lutomirski wrote:
>>> Thus lets add file position, inode and device number where
>>> this target lays. This three fields can be used as a primary
>>> key for sorting, and together with kcmp help CRIU
On 02/21/2017 10:16 PM, Cyrill Gorcunov wrote:
> On Tue, Feb 21, 2017 at 10:41:12AM -0800, Andy Lutomirski wrote:
>>> Thus lets add file position, inode and device number where
>>> this target lays. This three fields can be used as a primary
>>> key for sorting, and together with kcmp help CRIU
On 02/21/2017 05:57 PM, Oleg Nesterov wrote:
> On 02/18, Alexey Gladkov wrote:
>>
>> This patch allows to mount only the part of /proc related to pids
>> without rest objects. Since this is an addon to /proc, flags applied to
>> /proc have an effect on this pidfs filesystem.
>
> I leave this to
On 02/21/2017 05:57 PM, Oleg Nesterov wrote:
> On 02/18, Alexey Gladkov wrote:
>>
>> This patch allows to mount only the part of /proc related to pids
>> without rest objects. Since this is an addon to /proc, flags applied to
>> /proc have an effect on this pidfs filesystem.
>
> I leave this to
other states we have to dump the same socket
> properties, so lets allow to enable repair mode for these sockets.
>
> The repair mode reveals nothing more for sockets in other states.
>
> Signed-off-by: Andrei Vagin <ava...@openvz.org>
Acked-by: Pavel Emelyanov <xe...@o
other states we have to dump the same socket
> properties, so lets allow to enable repair mode for these sockets.
>
> The repair mode reveals nothing more for sockets in other states.
>
> Signed-off-by: Andrei Vagin
Acked-by: Pavel Emelyanov
> ---
> net/ipv4/tcp.c | 2 +-
On 08/03/2016 05:17 PM, Nikolay Borisov wrote:
>
>
> On 08/03/2016 04:46 PM, Jeff Layton wrote:
>> On Wed, 2016-08-03 at 10:35 +0300, Nikolay Borisov wrote:
>>> On busy container servers reading /proc/locks shows all the locks
>>> created by all clients. This can cause large latency spikes. In
On 08/03/2016 05:17 PM, Nikolay Borisov wrote:
>
>
> On 08/03/2016 04:46 PM, Jeff Layton wrote:
>> On Wed, 2016-08-03 at 10:35 +0300, Nikolay Borisov wrote:
>>> On busy container servers reading /proc/locks shows all the locks
>>> created by all clients. This can cause large latency spikes. In
On 03/20/2016 03:42 PM, Mike Rapoport wrote:
> Hi,
>
> This set is to address the issues that appear in userfaultfd usage
> scenarios when the task monitoring the uffd and the mm-owner do not
> cooperate to each other on VM changes such as remaps, madvises and
> fork()-s.
>
> The pacthes are
On 03/20/2016 03:42 PM, Mike Rapoport wrote:
> Hi,
>
> This set is to address the issues that appear in userfaultfd usage
> scenarios when the task monitoring the uffd and the mm-owner do not
> cooperate to each other on VM changes such as remaps, madvises and
> fork()-s.
>
> The pacthes are
ial system call "getumask" which returns
> the umask of the current process.
Ah! Thanks for this :)
Acked-by: Pavel Emelyanov <xe...@virtuozzo.com>
ial system call "getumask" which returns
> the umask of the current process.
Ah! Thanks for this :)
Acked-by: Pavel Emelyanov
.
>
> The pacthes are essentially the same as in the prevoious respin (1),
> they've just been rebased on the current tree.
>
> [1] http://thread.gmane.org/gmane.linux.kernel.mm/132662
Thanks, Mike!
Acked-by: Pavel Emelyanov <xe...@virtuozzo.com>
.
>
> The pacthes are essentially the same as in the prevoious respin (1),
> they've just been rebased on the current tree.
>
> [1] http://thread.gmane.org/gmane.linux.kernel.mm/132662
Thanks, Mike!
Acked-by: Pavel Emelyanov
On 08/14/2015 10:22 AM, Cyrill Gorcunov wrote:
> On Thu, Aug 13, 2015 at 01:09:47PM -0700, Linus Torvalds wrote:
>> On Thu, Aug 13, 2015 at 1:08 PM, Cyrill Gorcunov wrote:
>>>
>>> If only I'm not missin something obvious this should not hurt us.
>>> But I gonna build test kernel and check to be
On 08/14/2015 10:22 AM, Cyrill Gorcunov wrote:
On Thu, Aug 13, 2015 at 01:09:47PM -0700, Linus Torvalds wrote:
On Thu, Aug 13, 2015 at 1:08 PM, Cyrill Gorcunov gorcu...@gmail.com wrote:
If only I'm not missin something obvious this should not hurt us.
But I gonna build test kernel and check
On 06/25/2015 11:45 PM, Oleg Nesterov wrote:
> vma->vm_ops->mremap() looks more natural and clean in move_vma(),
> and this way ->mremap() can have more users. Say, vdso.
>
> While at it, s/aio_ring_remap/aio_ring_mremap/.
>
> Signed-off-by: Oleg Nesterov
On 06/25/2015 11:45 PM, Oleg Nesterov wrote:
vma-vm_ops-mremap() looks more natural and clean in move_vma(),
and this way -mremap() can have more users. Say, vdso.
While at it, s/aio_ring_remap/aio_ring_mremap/.
Signed-off-by: Oleg Nesterov o...@redhat.com
Acked-by: Pavel Emelyanov xe
On 06/23/2015 09:02 PM, Oleg Nesterov wrote:
> vma->vm_ops->mremap() looks more natural and clean in move_vma(),
> and this way ->mremap() can have more users. Say, vdso.
>
> Signed-off-by: Oleg Nesterov
Looks-good-to: /me :) Thanks!
--
To unsubscribe from this list: send the line "unsubscribe
On 06/23/2015 03:47 AM, Oleg Nesterov wrote:
> On 06/21, Oleg Nesterov wrote:
>>
>> Forgot to add Andy...
>
> Add Pavel ;)
>
> I never understood why ->mremap() lives in file_operations, not in
> vm_operations_struct. To me vma->vm_file->f_op in move_vma() just
> looks strange,
On 06/23/2015 03:47 AM, Oleg Nesterov wrote:
On 06/21, Oleg Nesterov wrote:
Forgot to add Andy...
Add Pavel ;)
I never understood why -mremap() lives in file_operations, not in
vm_operations_struct. To me vma-vm_file-f_op in move_vma() just
looks strange, vma-vm_ops-mremap(new_vma)
On 06/23/2015 09:02 PM, Oleg Nesterov wrote:
vma-vm_ops-mremap() looks more natural and clean in move_vma(),
and this way -mremap() can have more users. Say, vdso.
Signed-off-by: Oleg Nesterov o...@redhat.com
Looks-good-to: /me :) Thanks!
--
To unsubscribe from this list: send the line
n favor of a capable() check in ptrace
> directly
>
> v5 changes:
>
> * check that seccomp is not enabled (or suspended) on the tracer
>
> Signed-off-by: Tycho Andersen
> CC: Kees Cook
> CC: Andy Lutomirski
> CC: Will Drewry
> CC: Roland McGrath
> CC: Oleg
tycho.ander...@canonical.com
CC: Kees Cook keesc...@chromium.org
CC: Andy Lutomirski l...@amacapital.net
CC: Will Drewry w...@chromium.org
CC: Roland McGrath rol...@hack.frob.com
CC: Oleg Nesterov o...@redhat.com
CC: Pavel Emelyanov xe...@parallels.com
CC: Serge E. Hallyn serge.hal...@ubuntu.com
>> +int suspend_seccomp(struct task_struct *task)
>> +{
>> +int ret = -EACCES;
>> +
>> +spin_lock_irq(>sighand->siglock);
>> +
>> +if (!capable(CAP_SYS_ADMIN))
>> +goto out;
>
> I am puzzled ;) Why do we need ->siglock? And even if we need it, why
> we can't check
+int suspend_seccomp(struct task_struct *task)
+{
+int ret = -EACCES;
+
+spin_lock_irq(task-sighand-siglock);
+
+if (!capable(CAP_SYS_ADMIN))
+goto out;
I am puzzled ;) Why do we need -siglock? And even if we need it, why
we can't check CAP_SYS_ADMIN lockless?
e faults than what was available before
> (PROT_NONE + SIGSEGV trap).
Not to spam with 23 e-mails, all patches are
Acked-by: Pavel Emelyanov
Thanks!
-- Pavel
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kerne
+ SIGSEGV trap).
Not to spam with 23 e-mails, all patches are
Acked-by: Pavel Emelyanov xe...@parallels.com
Thanks!
-- Pavel
--
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org
to the userfaultfd_ctx_read() to handle
the ctx queues' locking vs file creation.
Another thing worth noticing is that the task that fork()-s
waits for the uffd event to get processed WITHOUT the mmap sem.
Signed-off-by: Pavel Emelyanov
---
fs/userfaultfd.c | 137
If the page is punched out of the address space the uffd reader
should know this and zeromap the respective area in case of
the #PF event.
Signed-off-by: Pavel Emelyanov
---
fs/userfaultfd.c | 26 ++
include/linux/userfaultfd_k.h| 10
s
for fork event.
Signed-off-by: Pavel Emelyanov
---
fs/userfaultfd.c | 35 +++
include/linux/userfaultfd_k.h| 12
include/uapi/linux/userfaultfd.h | 10 +-
mm/mremap.c | 31 --
ser-space.
Signed-off-by: Pavel Emelyanov
---
fs/userfaultfd.c | 97 ++--
1 file changed, 95 insertions(+), 2 deletions(-)
diff --git a/fs/userfaultfd.c b/fs/userfaultfd.c
index c593a72..83acb19 100644
--- a/fs/userfaultfd.c
+++ b/fs/userfaultf
I will need one to lookup for userfaultfd_wait_queue-s in different
wait queue.
Signed-off-by: Pavel Emelyanov
---
fs/userfaultfd.c | 18 --
1 file changed, 12 insertions(+), 6 deletions(-)
diff --git a/fs/userfaultfd.c b/fs/userfaultfd.c
index c89e96f..c593a72 100644
--- a/fs
Hi,
This set is to address the issues that appear in userfaultfd usage
scenarios when the task monitoring the uffd and the mm-owner do not
cooperate to each other on VM changes such as remaps, madvises and
fork()-s.
This is the re-based set on the recent userfaultfd branch, two major
changes
to the userfaultfd_ctx_read() to handle
the ctx queues' locking vs file creation.
Another thing worth noticing is that the task that fork()-s
waits for the uffd event to get processed WITHOUT the mmap sem.
Signed-off-by: Pavel Emelyanov xe...@parallels.com
---
fs/userfaultfd.c | 137
Hi,
This set is to address the issues that appear in userfaultfd usage
scenarios when the task monitoring the uffd and the mm-owner do not
cooperate to each other on VM changes such as remaps, madvises and
fork()-s.
This is the re-based set on the recent userfaultfd branch, two major
changes
I will need one to lookup for userfaultfd_wait_queue-s in different
wait queue.
Signed-off-by: Pavel Emelyanov xe...@parallels.com
---
fs/userfaultfd.c | 18 --
1 file changed, 12 insertions(+), 6 deletions(-)
diff --git a/fs/userfaultfd.c b/fs/userfaultfd.c
index c89e96f
-space.
Signed-off-by: Pavel Emelyanov xe...@parallels.com
---
fs/userfaultfd.c | 97 ++--
1 file changed, 95 insertions(+), 2 deletions(-)
diff --git a/fs/userfaultfd.c b/fs/userfaultfd.c
index c593a72..83acb19 100644
--- a/fs/userfaultfd.c
event.
Signed-off-by: Pavel Emelyanov xe...@parallels.com
---
fs/userfaultfd.c | 35 +++
include/linux/userfaultfd_k.h| 12
include/uapi/linux/userfaultfd.h | 10 +-
mm/mremap.c | 31
If the page is punched out of the address space the uffd reader
should know this and zeromap the respective area in case of
the #PF event.
Signed-off-by: Pavel Emelyanov xe...@parallels.com
---
fs/userfaultfd.c | 26 ++
include/linux/userfaultfd_k.h
On 04/28/2015 12:12 AM, Andrea Arcangeli wrote:
> Hello,
>
> On Thu, Apr 23, 2015 at 09:29:07AM +0300, Pavel Emelyanov wrote:
>> So your proposal is to always report 16 bytes per PF from read() and
>> let userspace decide itself how to handle the result?
>
> Reading
On 04/28/2015 12:12 AM, Andrea Arcangeli wrote:
Hello,
On Thu, Apr 23, 2015 at 09:29:07AM +0300, Pavel Emelyanov wrote:
So your proposal is to always report 16 bytes per PF from read() and
let userspace decide itself how to handle the result?
Reading 16bytes for each userfault (instead
On 04/21/2015 03:02 PM, Andrea Arcangeli wrote:
> Hi Pavel,
>
> On Wed, Mar 18, 2015 at 10:34:26PM +0300, Pavel Emelyanov wrote:
>> Hi,
>>
>> On the recent LSF Andrea presented his userfault-fd patches and
>> I had shown some issues that appear in usage scenario
On 04/21/2015 03:18 PM, Andrea Arcangeli wrote:
> On Wed, Mar 18, 2015 at 10:35:17PM +0300, Pavel Emelyanov wrote:
>> +if (!(ctx->features & UFFD_FEATURE_LONGMSG)) {
>
> If we are to use different protocols, it'd be nicer to have two
> di
On 04/21/2015 03:02 PM, Andrea Arcangeli wrote:
Hi Pavel,
On Wed, Mar 18, 2015 at 10:34:26PM +0300, Pavel Emelyanov wrote:
Hi,
On the recent LSF Andrea presented his userfault-fd patches and
I had shown some issues that appear in usage scenarios when the
monitor task and mm task do
On 04/21/2015 03:18 PM, Andrea Arcangeli wrote:
On Wed, Mar 18, 2015 at 10:35:17PM +0300, Pavel Emelyanov wrote:
+if (!(ctx-features UFFD_FEATURE_LONGMSG)) {
If we are to use different protocols, it'd be nicer to have two
different methods to assign to userfaultfd_fops.read
ide the scope of the patchset, I guess.
>>>
>>> I don't see any better candidate for such dummy header. :-/
>>
>> Clearly, I'm not confortable with a rewrite of :(
>>
>> So what about this patch, is this v3 acceptable ?
>
> Acked-by: Kirill A. Shutem
On 04/13/2015 04:21 PM, Laurent Dufour wrote:
> On 13/04/2015 15:13, Kirill A. Shutemov wrote:
>> On Mon, Apr 13, 2015 at 02:41:22PM +0200, Laurent Dufour wrote:
>>> On 13/04/2015 13:58, Kirill A. Shutemov wrote:
On Mon, Apr 13, 2015 at 11:56:27AM +0200, Laurent Dufour wrote:
> Some
Other than the #ifdef thing, the same:
Acked-by: Pavel Emelyanov xe...@parallels.com
--
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read
On 04/13/2015 04:21 PM, Laurent Dufour wrote:
On 13/04/2015 15:13, Kirill A. Shutemov wrote:
On Mon, Apr 13, 2015 at 02:41:22PM +0200, Laurent Dufour wrote:
On 13/04/2015 13:58, Kirill A. Shutemov wrote:
On Mon, Apr 13, 2015 at 11:56:27AM +0200, Laurent Dufour wrote:
Some architecture would
On 03/19/2015 12:26 AM, Andy Lutomirski wrote:
> On Wed, Mar 18, 2015 at 1:02 PM, Oleg Nesterov wrote:
>> On 03/18, Andrey Wagin wrote:
>>>
>>> This patch fixes the problem. Oleg, could you send this path in the
>>> criu maillist?
>>
>> Sure, will do.
>
> We still haven't answered one question:
number
and will be able to start reading events from the new task.
The fork() of mm with uffd attached doesn't finish until the
monitor "acks" the message by reading the new uffd descriptor.
Signed-off-by: Pavel Emelyanov
---
fs/userfaultfd.c
spectively).
Signed-off-by: Pavel Emelyanov
---
fs/userfaultfd.c | 56 ++--
include/uapi/linux/userfaultfd.h | 21 ++-
2 files changed, 62 insertions(+), 15 deletions(-)
diff --git a/fs/userfaultfd.c b/fs/userfaultfd.c
index 6c9a2d
Hi,
On the recent LSF Andrea presented his userfault-fd patches and
I had shown some issues that appear in usage scenarios when the
monitor task and mm task do not cooperate to each other on VM
changes (and fork()-s).
Here's the implementation of the extended uffd API that would help
us to
Reformat the existing code a bit to make it easier for
further patching.
Signed-off-by: Pavel Emelyanov
---
fs/userfaultfd.c | 37 -
1 file changed, 28 insertions(+), 9 deletions(-)
diff --git a/fs/userfaultfd.c b/fs/userfaultfd.c
index b4c7f25..6c9a2d6
Reformat the existing code a bit to make it easier for
further patching.
Signed-off-by: Pavel Emelyanov xe...@parallels.com
---
fs/userfaultfd.c | 37 -
1 file changed, 28 insertions(+), 9 deletions(-)
diff --git a/fs/userfaultfd.c b/fs/userfaultfd.c
index
number
and will be able to start reading events from the new task.
The fork() of mm with uffd attached doesn't finish until the
monitor acks the message by reading the new uffd descriptor.
Signed-off-by: Pavel Emelyanov xe...@parallels.com
---
fs/userfaultfd.c | 175
).
Signed-off-by: Pavel Emelyanov xe...@parallels.com
---
fs/userfaultfd.c | 56 ++--
include/uapi/linux/userfaultfd.h | 21 ++-
2 files changed, 62 insertions(+), 15 deletions(-)
diff --git a/fs/userfaultfd.c b/fs/userfaultfd.c
index
Hi,
On the recent LSF Andrea presented his userfault-fd patches and
I had shown some issues that appear in usage scenarios when the
monitor task and mm task do not cooperate to each other on VM
changes (and fork()-s).
Here's the implementation of the extended uffd API that would help
us to
On 03/19/2015 12:26 AM, Andy Lutomirski wrote:
On Wed, Mar 18, 2015 at 1:02 PM, Oleg Nesterov o...@redhat.com wrote:
On 03/18, Andrey Wagin wrote:
This patch fixes the problem. Oleg, could you send this path in the
criu maillist?
Sure, will do.
We still haven't answered one question:
/03/exploiting-dram-rowhammer-bug-to-gain.html
>
> Signed-off-by: Kirill A. Shutemov
> Cc: Pavel Emelyanov
> Cc: Konstantin Khlebnikov
> Cc: Andrew Morton
> Cc: Linus Torvalds
> Cc: Mark Seaborn
> Cc: Andy Lutomirski
> ---
> fs/proc/task_mmu.c | 3 +++
> 1 file cha
-to-gain.html
Signed-off-by: Kirill A. Shutemov kirill.shute...@linux.intel.com
Cc: Pavel Emelyanov xe...@parallels.com
Cc: Konstantin Khlebnikov khlebni...@openvz.org
Cc: Andrew Morton a...@linux-foundation.org
Cc: Linus Torvalds torva...@linux-foundation.org
Cc: Mark Seaborn mseab...@chromium.org
> All UFFDIO_COPY/ZEROPAGE/REMAP methods already support CRIU postcopy
> live migration and the UFFD can be passed to a manager process through
> unix domain sockets to satisfy point 5).
Yup :) That's the best (from my POV) point of ufd -- the ability to delegate
the descriptor to some other
> +static int mcopy_atomic_pte(struct mm_struct *dst_mm,
> + pmd_t *dst_pmd,
> + struct vm_area_struct *dst_vma,
> + unsigned long dst_addr,
> + unsigned long src_addr)
> +{
> + struct mem_cgroup
> +ssize_t remap_pages(struct mm_struct *dst_mm, struct mm_struct *src_mm,
> + unsigned long dst_start, unsigned long src_start,
> + unsigned long len, __u64 mode)
> +{
> + struct vm_area_struct *src_vma, *dst_vma;
> + long err = -EINVAL;
> + pmd_t
> +int handle_userfault(struct vm_area_struct *vma, unsigned long address,
> + unsigned int flags, unsigned long reason)
> +{
> + struct mm_struct *mm = vma->vm_mm;
> + struct userfaultfd_ctx *ctx;
> + struct userfaultfd_wait_queue uwq;
> +
> +
> diff --git a/kernel/fork.c b/kernel/fork.c
> index cf65139..cb215c0 100644
> --- a/kernel/fork.c
> +++ b/kernel/fork.c
> @@ -425,6 +425,7 @@ static int dup_mmap(struct mm_struct *mm, struct
> mm_struct *oldmm)
> goto fail_nomem_anon_vma_fork;
> tmp->vm_flags
diff --git a/kernel/fork.c b/kernel/fork.c
index cf65139..cb215c0 100644
--- a/kernel/fork.c
+++ b/kernel/fork.c
@@ -425,6 +425,7 @@ static int dup_mmap(struct mm_struct *mm, struct
mm_struct *oldmm)
goto fail_nomem_anon_vma_fork;
tmp-vm_flags =
+int handle_userfault(struct vm_area_struct *vma, unsigned long address,
+ unsigned int flags, unsigned long reason)
+{
+ struct mm_struct *mm = vma-vm_mm;
+ struct userfaultfd_ctx *ctx;
+ struct userfaultfd_wait_queue uwq;
+
+
+ssize_t remap_pages(struct mm_struct *dst_mm, struct mm_struct *src_mm,
+ unsigned long dst_start, unsigned long src_start,
+ unsigned long len, __u64 mode)
+{
+ struct vm_area_struct *src_vma, *dst_vma;
+ long err = -EINVAL;
+ pmd_t *src_pmd,
1 - 100 of 924 matches
Mail list logo