From owner-freebsd-hackers@FreeBSD.ORG Mon Apr 13 11:25:13 2015 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 6FF9D481 for ; Mon, 13 Apr 2015 11:25:13 +0000 (UTC) Received: from mail-vn0-f54.google.com (mail-vn0-f54.google.com [209.85.216.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 2E51A9BA for ; Mon, 13 Apr 2015 11:25:12 +0000 (UTC) Received: by vnbf62 with SMTP id f62so18511310vnb.13 for ; Mon, 13 Apr 2015 04:25:06 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=EIlnAjpozSoh3ejbtFVsp9wUWLzB9nc2eeV+UFPmXY4=; b=YVtEW5MR70WmhNj73gGm5LpmVqyXxFBoQWw+gZUHnXyDZiyhNZmZH/uWSNgnrhFmEJ yM1n+R+z877UJYM4egr0OW2jvbjvrEhBwvlK9BjANryllYHB+MQY6CG2wUhoqsM4uLZ3 2/xR7FaGcYvdupoegaCAa2Wzn3nhhp75qgtUjHbTkhpuN1TIdIbsoDN2WunVIkZ66PaY 7vMbxCNbOFgzEFZaA7CdqGJWAVJ8BDFAU7a2FMffkyFMLKmZQPOxldyybDByxuY9yRjH uBgOPqx0PwmpcCLDmWmZ+62ZFd5SQeUEVX6fSkFy1on+kPEpzxur4UkDzxEDPVY00FuB AVYQ== X-Gm-Message-State: ALoCoQmrWYWaYxM2cFufSclGpD41z0XKhbrfIMkN8/ovGnEU56R2nefUjmE02tP3+RFcfRLZFED6 MIME-Version: 1.0 X-Received: by 10.182.204.6 with SMTP id ku6mr11830730obc.48.1428924305949; Mon, 13 Apr 2015 04:25:05 -0700 (PDT) Received: by 10.202.80.6 with HTTP; Mon, 13 Apr 2015 04:25:05 -0700 (PDT) In-Reply-To: References: Date: Mon, 13 Apr 2015 13:25:05 +0200 Message-ID: Subject: Re: another question - VM mappings From: Oliver Pinter To: Wojciech Puchar Content-Type: text/plain; charset=UTF-8 Cc: "freebsd-hackers@freebsd.org" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 13 Apr 2015 11:25:13 -0000 Under amd64 exists an so called shared-page - similar to linux's vdso mechanism - https://github.com/freebsd/freebsd/blob/master/sys/kern/kern_exec.c#L1045 . This page is double mapped with user-space and with kernel. From security reason it's only RO, otherwise, when mapped with RW or RWX, then you could write kernel memory from user-space. On Mon, Apr 13, 2015 at 9:31 AM, Wojciech Puchar wrote: > below is mapping for very simple process (no libc etc) > > [wojtek@laptop ~]$ procstat -v 917 > PID START END PRT RES PRES REF SHD FL TP > PATH > 917 0x400000 0x401000 r-x 1 0 1 0 CN-- vn > /home/wojtek/test/1 > 917 0x600000 0x601000 rw- 1 0 1 0 ---- df > 917 0x7ffffffdf000 0x7ffffffff000 rw- 1 0 1 0 ---D df > 917 0x7ffffffff000 0x800000000000 r-x 0 0 39 0 ---- ph > > > what is "ph" mapping and why read&executable?