Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp935751imu; Wed, 9 Jan 2019 08:46:55 -0800 (PST) X-Google-Smtp-Source: ALg8bN4TrIZ9Q+tEY7Z32w/pDhkvh9u3sEts8rkTYLeUedg+AmDeAZzMiQW9S4sL1V9Ihx2ElFsK X-Received: by 2002:a63:5d20:: with SMTP id r32mr6075441pgb.329.1547052415848; Wed, 09 Jan 2019 08:46:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547052415; cv=none; d=google.com; s=arc-20160816; b=aXrCvJ7BlDk6fAcbzxmQwu9IhQBEim4EnddewfBsspSjux9AIc6kjLdAd1N/+TNOTW xUnddLYb5YtOPLHI2yKl4TWlbwPHVpSplwNcVrI00YxYPkEXF5uVwp9g9p7Y+agPiOyH IUep0UNBBA+IhXfS7XSanCpVRNN/SafXOBQoFikBpCvWNrUp5HyXiDZ5KpscafBSuamK FAmH7t9zwNbslwnNNRgfNaprjRvx6il4VL2uMlTfE5fQjsQpqSRPt6Ahw9hFWGZ7K0r4 FVZ3R6dhqJdrI0KcF/66vBvKQxkrrNh3zS0bOrkQB4tuhjy4ZqE8HWa2eIBuB14qgjkB A8jA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:from; bh=kEF7pZOs7Lt8p4y4rpY5KfoztjcX9uR2Dub7sV7pl4Q=; b=E6I949/G7SWJRJgdE0XXkSry6R5Tbb3WKVm5qcuUayNuWTbnsQQ75/OJLLuMeyyPk8 l/TzlDBalrDjoiyFssrH13lrAw3dw09h8a4StinJ2Koqcm4rVPtbRVVDFXbp3NeQONcB eC+Vnv/wMzf2WlqyfhqwC4ob8B4hvZ8DgB3Aj0IcuWlKv2rpvkYtaKsxgrPiDqc+AYAI p2AW/9tst9mgtqRxB9b6LpWzFdFK/Zf2cEAeOFQKx9syX3+lw6EUoaHVUZqWycDb4s58 5CvhTFMmpVePiku0JDIUuLPOPxvHGkuZ2eQrOwUKdwFvuyXq9NO2WuFHriKwTUJ+V8ly Zhgw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p9si67894467pgc.448.2019.01.09.08.46.40; Wed, 09 Jan 2019 08:46:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726678AbfAIQkr (ORCPT + 99 others); Wed, 9 Jan 2019 11:40:47 -0500 Received: from mx2.suse.de ([195.135.220.15]:57778 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726642AbfAIQko (ORCPT ); Wed, 9 Jan 2019 11:40:44 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id B39C1B01C; Wed, 9 Jan 2019 16:40:42 +0000 (UTC) From: Roman Penyaev Cc: Roman Penyaev , Andrew Morton , Davidlohr Bueso , Jason Baron , Al Viro , "Paul E. McKenney" , Linus Torvalds , Andrea Parri , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH 15/15] epoll: support mapping for epfd when polled from userspace Date: Wed, 9 Jan 2019 17:40:25 +0100 Message-Id: <20190109164025.24554-16-rpenyaev@suse.de> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20190109164025.24554-1-rpenyaev@suse.de> References: <20190109164025.24554-1-rpenyaev@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit To: unlisted-recipients:; (no To-header on input) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org User has to mmap user_header and user_index vmalloce'd pointers in order to consume events from userspace. Support mapping with possibility to mremap() in the future, i.e. vma does not have VM_DONTEXPAND flag set. User mmaps two pointers: header and index in order to expand both calling mremap(). Expanding is made with support of the fault callback, where page is mmaped with all appropriate size checks. Signed-off-by: Roman Penyaev Cc: Andrew Morton Cc: Davidlohr Bueso Cc: Jason Baron Cc: Al Viro Cc: "Paul E. McKenney" Cc: Linus Torvalds Cc: Andrea Parri Cc: linux-fsdevel@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- fs/eventpoll.c | 85 ++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 85 insertions(+) diff --git a/fs/eventpoll.c b/fs/eventpoll.c index 5de640fcf28b..2849b238f80b 100644 --- a/fs/eventpoll.c +++ b/fs/eventpoll.c @@ -1388,11 +1388,96 @@ static void ep_show_fdinfo(struct seq_file *m, struct file *f) } #endif +static vm_fault_t ep_eventpoll_fault(struct vm_fault *vmf) +{ + struct vm_area_struct *vma = vmf->vma; + struct eventpoll *ep = vma->vm_file->private_data; + size_t off = vmf->address - vma->vm_start; + vm_fault_t ret; + int rc; + + mutex_lock(&ep->mtx); + ret = VM_FAULT_SIGBUS; + if (!vma->vm_pgoff) { + if (ep->header_length < (off + PAGE_SIZE)) + goto unlock_and_out; + + rc = remap_vmalloc_range_partial(vma, vmf->address, + ep->user_header + off, + PAGE_SIZE); + } else { + if (ep->index_length < (off + PAGE_SIZE)) + goto unlock_and_out; + + rc = remap_vmalloc_range_partial(vma, vmf->address, + ep->user_index + off, + PAGE_SIZE); + } + if (likely(!rc)) { + /* Success path */ + vma->vm_flags &= ~VM_DONTEXPAND; + ret = VM_FAULT_NOPAGE; + } +unlock_and_out: + mutex_unlock(&ep->mtx); + + return ret; +} + +static const struct vm_operations_struct eventpoll_vm_ops = { + .fault = ep_eventpoll_fault, +}; + +static int ep_eventpoll_mmap(struct file *filep, struct vm_area_struct *vma) +{ + struct eventpoll *ep = vma->vm_file->private_data; + size_t size; + int rc; + + if (!ep_polled_by_user(ep)) + return -ENOTSUPP; + + mutex_lock(&ep->mtx); + rc = -ENXIO; + size = vma->vm_end - vma->vm_start; + if (!vma->vm_pgoff && size > ep->header_length) + goto unlock_and_out; + if (vma->vm_pgoff && ep->header_length != (vma->vm_pgoff << PAGE_SHIFT)) + /* + * Index ring starts exactly after header. In future vm_pgoff + * is not used, only as indication what kernel ptr is mapped. + */ + goto unlock_and_out; + if (vma->vm_pgoff && size > ep->index_length) + goto unlock_and_out; + + /* + * vm_pgoff is used *only* for indication, what is mapped: user header + * or user index ring. + */ + if (!vma->vm_pgoff) + rc = remap_vmalloc_range_partial(vma, vma->vm_start, + ep->user_header, size); + else + rc = remap_vmalloc_range_partial(vma, vma->vm_start, + ep->user_index, size); + + if (likely(!rc)) { + vma->vm_flags &= ~VM_DONTEXPAND; + vma->vm_ops = &eventpoll_vm_ops; + } +unlock_and_out: + mutex_unlock(&ep->mtx); + + return rc; +} + /* File callbacks that implement the eventpoll file behaviour */ static const struct file_operations eventpoll_fops = { #ifdef CONFIG_PROC_FS .show_fdinfo = ep_show_fdinfo, #endif + .mmap = ep_eventpoll_mmap, .release = ep_eventpoll_release, .poll = ep_eventpoll_poll, .llseek = noop_llseek, -- 2.19.1