Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4775517yba; Tue, 30 Apr 2019 04:17:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqyvY/TkDoTac9Qw0BQrmM/fnkgAq1Bau/PEzGt79a8TVK3fUGy/xEk8G01QtkhUBHDHXees X-Received: by 2002:a17:902:820c:: with SMTP id x12mr66510238pln.199.1556623072832; Tue, 30 Apr 2019 04:17:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556623072; cv=none; d=google.com; s=arc-20160816; b=ougDf1Ol18r+9hMusO1cXpkz8oXMtEGGoQuJSfoXX+ErkSatamwHncqSmBctr0UHG9 Xr7R62/oKRr43v7Cz1bCw4NubRLSc9Emonbstd0eJklHdRkdMAgQyzEy3SYe9HmCM1OG j6mVUfupf79Ygjk6Z6k6PXgE92qS8fHydZZtfiy9kRNHsYS3+n5z+6TMTpSBpK+PKCm0 ZrikPKaMC1iYbefSMr+fLvIRPrPca+3UycBrln6nZ2kQJpE3mSC5hY1sj5HUYPRKilQE 8S0tr79Zk9Mh79hkyTeTmBlRmcsISvDrzRFX92gPeAn+trvYHIk6wAqPATHLTO16CIH7 gl1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=fydu+6qYHerO1cPr92MYvYdO9B7wxgm+yhBMcZrMeDY=; b=07eIiFy0/8EUqiMrGBHmwk3W79HZcy+NEgYdkZ6y+lENhbZHXTgY88+zokKHwnnldW zn4d3GmR47qZg8BHkMYQgLgNZVG2ik/qVZt96n7lwrrQeQvsfNSoH+B52KBerRwfikzm IJdoirukhMk44G7MKddqopqcwIJt7vV0d4GfANLzZKKFpUgkZ6aEkTlKQyiEB0oT856K 7KrhHLZt7aEP33RqYR+tKzxbUSQ3XRJ9v0NRDHNDWP0wYq2Z/5iUiEQQtgj32BSPIDMX Del3Zlv4JTqccoMfJuz7XH2ANXggGexUroZaNCXjVksfkYp5LTdiTllzun9WbKUJRp2L DFTw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l37si37482933plb.173.2019.04.30.04.17.37; Tue, 30 Apr 2019 04:17:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727588AbfD3LQe (ORCPT + 99 others); Tue, 30 Apr 2019 07:16:34 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:44734 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726648AbfD3LQc (ORCPT ); Tue, 30 Apr 2019 07:16:32 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 3C20380D; Tue, 30 Apr 2019 04:16:32 -0700 (PDT) Received: from arrakis.emea.arm.com (arrakis.cambridge.arm.com [10.1.196.78]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E981E3F5C1; Tue, 30 Apr 2019 04:16:27 -0700 (PDT) Date: Tue, 30 Apr 2019 12:16:25 +0100 From: Catalin Marinas To: Leon Romanovsky Cc: Andrey Konovalov , Will Deacon , Robin Murphy , Kees Cook , Greg Kroah-Hartman , Andrew Morton , Vincenzo Frascino , Eric Dumazet , "David S. Miller" , Yishai Hadas , linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, netdev@vger.kernel.org, linux-rdma@vger.kernel.org, linux-kernel@vger.kernel.org, Dmitry Vyukov , Kostya Serebryany , Evgeniy Stepanov , Ramana Radhakrishnan , Ruben Ayrapetyan , Luc Van Oostenryck , Dave Martin , Kevin Brodsky , Szabolcs Nagy Subject: Re: [PATCH v13 16/20] IB/mlx4, arm64: untag user pointers in mlx4_get_umem_mr Message-ID: <20190430111625.GD29799@arrakis.emea.arm.com> References: <1e2824fd77e8eeb351c6c6246f384d0d89fd2d58.1553093421.git.andreyknvl@google.com> <20190429180915.GZ6705@mtr-leonro.mtl.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190429180915.GZ6705@mtr-leonro.mtl.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org (trimmed down the cc list slightly as the message bounces) On Mon, Apr 29, 2019 at 09:09:15PM +0300, Leon Romanovsky wrote: > On Wed, Mar 20, 2019 at 03:51:30PM +0100, Andrey Konovalov wrote: > > This patch is a part of a series that extends arm64 kernel ABI to allow to > > pass tagged user pointers (with the top byte set to something else other > > than 0x00) as syscall arguments. > > > > mlx4_get_umem_mr() uses provided user pointers for vma lookups, which can > > only by done with untagged pointers. > > > > Untag user pointers in this function. > > > > Signed-off-by: Andrey Konovalov > > --- > > drivers/infiniband/hw/mlx4/mr.c | 7 ++++--- > > 1 file changed, 4 insertions(+), 3 deletions(-) > > > > diff --git a/drivers/infiniband/hw/mlx4/mr.c b/drivers/infiniband/hw/mlx4/mr.c > > index 395379a480cb..9a35ed2c6a6f 100644 > > --- a/drivers/infiniband/hw/mlx4/mr.c > > +++ b/drivers/infiniband/hw/mlx4/mr.c > > @@ -378,6 +378,7 @@ static struct ib_umem *mlx4_get_umem_mr(struct ib_udata *udata, u64 start, > > * again > > */ > > if (!ib_access_writable(access_flags)) { > > + unsigned long untagged_start = untagged_addr(start); > > struct vm_area_struct *vma; > > > > down_read(¤t->mm->mmap_sem); > > @@ -386,9 +387,9 @@ static struct ib_umem *mlx4_get_umem_mr(struct ib_udata *udata, u64 start, > > * cover the memory, but for now it requires a single vma to > > * entirely cover the MR to support RO mappings. > > */ > > - vma = find_vma(current->mm, start); > > - if (vma && vma->vm_end >= start + length && > > - vma->vm_start <= start) { > > + vma = find_vma(current->mm, untagged_start); > > + if (vma && vma->vm_end >= untagged_start + length && > > + vma->vm_start <= untagged_start) { > > if (vma->vm_flags & VM_WRITE) > > access_flags |= IB_ACCESS_LOCAL_WRITE; > > } else { > > -- > > Thanks, > Reviewed-by: Leon Romanovsky Thanks for the review. > Interesting, the followup question is why mlx4 is only one driver in IB which > needs such code in umem_mr. I'll take a look on it. I don't know. Just using the light heuristics of find_vma() shows some other places. For example, ib_umem_odp_get() gets the umem->address via ib_umem_start(). This was previously set in ib_umem_get() as called from mlx4_get_umem_mr(). Should the above patch have just untagged "start" on entry? BTW, what's the provenience of such "start" address here? Is it something that the user would have malloc()'ed? We try to impose some restrictions one what is allowed to be tagged in user so that we don't have to untag the addresses in the kernel. For example, if it was the result of an mmap() on the device file, we don't allow tagging. Thanks. -- Catalin