[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <250234d1acd54553bf5f55972d9b05cfccb2cfab.camel@sipsolutions.net>
Date: Fri, 12 Sep 2025 09:58:49 +0200
From: Benjamin Berg <benjamin@...solutions.net>
To: Tiwei Bie <tiwei.bie@...ux.dev>
Cc: richard@....at, anton.ivanov@...bridgegreys.com,
johannes@...solutions.net, arnd@...db.de, linux-um@...ts.infradead.org,
linux-kernel@...r.kernel.org, tiwei.btw@...group.com
Subject: Re: [PATCH v2 04/10] um: Turn signals_* into thread-local variables
On Fri, 2025-09-12 at 08:30 +0800, Tiwei Bie wrote:
> On Thu, 11 Sep 2025 10:06:53 +0200, Benjamin Berg wrote:
>
> > [SNIP]
> > That said, I do believe that the allocations from the libc itself are
> > problematic. A lot of the mappings from UML are there already (i.e. the
> > physical memory is mapped). However, I believe the vmalloc area for
> > example is not guarded.
> >
> > So when pthread allocates the thread specific memory (stack, TLS, ...),
> > we really do not know where this will be mapped into the address space.
> > If it happens to be in an area that UML wants to use later, then UML
> > could map e.g. vmalloc data over it.
> >
> > Now, it could be that (currently) the addresses picked by pthread (or
> > the host kernel) do not actually clash with anything. However, I do not
> > think there is any guarantee for that.
>
> Indeed. The mmap from libc (pthread, shared libs, ...) can potentially
> conflict with UML. The reason it has been working on x86_64 so far might
> be that we did this in linux_main():
>
> task_size = task_size & PGDIR_MASK;
>
> The current layout is:
>
> shared libs and pthreads are located at 7ffxxxxxxxxx
> TASK_SIZE = 7f8000000000
> VMALLOC_END = 7f7fffffe000 (which is TASK_SIZE-2*PAGE_SIZE)
Uh, right, yes. Because of the masking we are capping ourselves to
0x7f8000000000. And then all of the interesting bits (vdso, ...) happen
to be mapped above that address and are effectively protected. And,
there is also plenty of space for other allocations technically.
That is kind of horrible, as it only works because all of this happens
to be mapped into the top of the address space. But, maybe something to
just wilfully ignore and only fix as part of a nolibc port?
> However, on i386, the risk of conflicts looks much higher:
>
> TASK_SIZE = ffc00000
> VMALLOC_END = ffbfe000
>
> ......
> f7c00000-f7c20000 r--p 00000000 08:01 9114 /usr/lib32/libc.so.6
> f7c20000-f7d9e000 r-xp 00020000 08:01 9114 /usr/lib32/libc.so.6
> f7d9e000-f7e23000 r--p 0019e000 08:01 9114 /usr/lib32/libc.so.6
> f7e23000-f7e24000 ---p 00223000 08:01 9114 /usr/lib32/libc.so.6
> f7e24000-f7e26000 r--p 00223000 08:01 9114 /usr/lib32/libc.so.6
> f7e26000-f7e27000 rw-p 00225000 08:01 9114 /usr/lib32/libc.so.6
> f7e27000-f7e31000 rw-p 00000000 00:00 0
> f7fbe000-f7fc0000 rw-p 00000000 00:00 0
> f7fc0000-f7fc4000 r--p 00000000 00:00 0 [vvar]
> f7fc4000-f7fc6000 r-xp 00000000 00:00 0 [vdso]
> f7fc6000-f7fc7000 r--p 00000000 08:01 9107 /usr/lib32/ld-linux.so.2
> f7fc7000-f7fec000 r-xp 00001000 08:01 9107 /usr/lib32/ld-linux.so.2
> f7fec000-f7ffb000 r--p 00026000 08:01 9107 /usr/lib32/ld-linux.so.2
> f7ffb000-f7ffd000 r--p 00034000 08:01 9107 /usr/lib32/ld-linux.so.2
> f7ffd000-f7ffe000 rw-p 00036000 08:01 9107 /usr/lib32/ld-linux.so.2
> fffdd000-ffffe000 rw-p 00000000 00:00 0 [stack]
>
> Ideally, we could completely eliminate the dependency on libc. Before that,
> perhaps we could reserve a region of address space for UML with mmap(PROT_NONE).
Yeah, that does seem reasonable. That should at least protect us from
libc using our vmalloc area. And it is easy to do, as it just needs an
initial mmap and changing the kern_unmap implementation in tlb.c
Benjamin
Powered by blists - more mailing lists