From patchwork Tue Sep 19 20:51:56 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stefan Roesch X-Patchwork-Id: 14233 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:612c:172:b0:3f2:4152:657d with SMTP id h50csp3674168vqi; Tue, 19 Sep 2023 13:54:56 -0700 (PDT) X-Google-Smtp-Source: AGHT+IERoymgIn/NOz1K5EWeHBsCxYBC2GQUEx7dMcs4sFx2TLsk8aUhPOGSymw1g0IzyzaHBU9Y X-Received: by 2002:a05:6a21:3395:b0:14e:2208:d62f with SMTP id yy21-20020a056a21339500b0014e2208d62fmr895759pzb.22.1695156895770; Tue, 19 Sep 2023 13:54:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695156895; cv=none; d=google.com; s=arc-20160816; b=N5Oserpp024ETQLJImXzGbIpxf5bs2NbyT1GDoxSEAM4dnUm+CPipTRZ13b2bVmrdV DEvEXZeM0PBjS0mei4AQS0TPAlfAbG2kVoiyrs8zvq8jiLXQtP/tFvYKJrROOS5HFswl 5+KsjcfMZLecTbo0vGDvdkycVCI/Ey8Y5MAs7jbnayHUv7fc1hURIdmj7n0xOycagavL 1KSkV6/IKvF4bPtA8NJYEM0rso55S1uQZLX+8TQ+N+2wlOeU4d2yDc1BFlhItL2g2Pe8 ud3ASQPy3hGcyaDXzV8bc6M9dXK4XZHCLGS2tKDcUfBYikJpR/ujdB9AAc0pXrXo2A6H R4kw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=8zTfBJwmRQ0Fr3nlBPrc5M3zMldCRBNeqCsOYkllon0=; fh=sS+J4OyOC0EcVLWJpS3mBHGeO+0+dYZJ+ImCUfzsrH4=; b=G29iuE3QO5wkqHWiXuIJqEXXL44inZ42N9s+oasRpC82W9XJtr6VRuRFW6IOb45p3a BnOYREgNr/OKqsfKQhJOg2QNKqQclBsKQebiNWGdKUCIi2GsUV8JKQhmYZv1NJDo2neL SwLjmZM9nOhqOVF72XHQG4/ltkMUh/6jtbD94EJRoz6mGuTTpGfaiazkLvg6K/zwQjvg fHOPEO2UHfNnOULxqaji1rDxH1IrA0WUjTbcq76fxenT29oZ6Q/+VjQh4gBb/V3yQmua rYR36CGtrC0F8uNGyoJajisiJANCUgQJl/8P1+fucBWUzBaayT8Jry5nyYYcIKY66slb RXNA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id h7-20020a056a00170700b0068e2566615esi10556215pfc.379.2023.09.19.13.54.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 Sep 2023 13:54:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 4958D8041FD8; Tue, 19 Sep 2023 13:52:33 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233255AbjISUwX (ORCPT + 26 others); Tue, 19 Sep 2023 16:52:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48298 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233139AbjISUwV (ORCPT ); Tue, 19 Sep 2023 16:52:21 -0400 Received: from 66-220-144-178.mail-mxout.facebook.com (66-220-144-178.mail-mxout.facebook.com [66.220.144.178]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6270CBF for ; Tue, 19 Sep 2023 13:52:14 -0700 (PDT) Received: by devbig1114.prn1.facebook.com (Postfix, from userid 425415) id 4CB08C361C1B; Tue, 19 Sep 2023 13:51:59 -0700 (PDT) From: Stefan Roesch To: kernel-team@fb.com Cc: shr@devkernel.io, akpm@linux-foundation.org, david@redhat.com, hannes@cmpxchg.org, riel@surriel.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: [PATCH v1 0/2] mm/ksm: add fork-exec support for prctl Date: Tue, 19 Sep 2023 13:51:56 -0700 Message-Id: <20230919205158.1897353-1-shr@devkernel.io> X-Mailer: git-send-email 2.39.3 MIME-Version: 1.0 X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Tue, 19 Sep 2023 13:52:33 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1777500837396831954 X-GMAIL-MSGID: 1777500837396831954 A process can enable KSM with the prctl system call. When the process is forked the KSM flag is inherited by the child process. However if the process is executing an exec system call directly after the fork, the KSM setting is cleared. This patch series addresses this problem. 1) Change the mask in coredump.h for execing a new process 2) Add a new test case in ksm_functional_tests Stefan Roesch (2): mm/ksm: support fork/exec for prctl mm/ksm: Test case for prctl fork/exec workflow include/linux/sched/coredump.h | 7 ++- tools/testing/selftests/mm/Makefile | 2 + .../selftests/mm/ksm_fork_exec_child.c | 9 ++++ .../selftests/mm/ksm_functional_tests.c | 50 ++++++++++++++++++- 4 files changed, 65 insertions(+), 3 deletions(-) create mode 100644 tools/testing/selftests/mm/ksm_fork_exec_child.c base-commit: 15bcc9730fcd7526a3b92eff105d6701767a53bb