Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp61180ybv; Tue, 18 Feb 2020 17:46:15 -0800 (PST) X-Google-Smtp-Source: APXvYqxPnbGGtFk+e6ufz6ainz19ujHIRwGqKjUAO98A/PPMMIWU2mSM5j5XIZ1IwIwf4+KreYPL X-Received: by 2002:a9d:5e9:: with SMTP id 96mr18056793otd.307.1582076775264; Tue, 18 Feb 2020 17:46:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582076775; cv=none; d=google.com; s=arc-20160816; b=nb3gpwepdOHn2Iv8zA/kP7yMKe3AD+LJEAtNKz1lg7Y1nC71eGpn0pj9eG1brJGa78 /1E4IyvSSGQB21NXfXsPkYOcyRpEb/l+6IWwdvhnQOfGbS/Mm8t6+tNBFbXHD7PSrbg8 V4hNm6NAs6GGJ3KfwvWG8AB3Hei50Oedq8bVs8/K7iCE2U5qFbTRMH5zqZ6NGX4EDOCX bUh0nmHtNVBCGUzSSUNwwRtmZyzvc+7YHVLYSR6PnMLZwQgFZx9mwyk9H34I/wl5J1oy SUwKzOSxr9x6Lb8OyF5prKVNXmCXUGFcdUn6a2LVUT+O7xW//QNEJTDp4nyCvwNHV+Zk l3Sg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=S6I7FkbWENtipd9zPITUUz5qzwuADyMhSE4JPk/5aKo=; b=MLddcGeprUZeRuOhmObMftmC5TjPacR8/XwPFcsPATqDeUEmRR63BQBDL9XdlVsdNz +ipgcsCoQrOFIPQJbEDy32BTKpTVKE6sVXmUTQ2lKzmKHgnvWNPNaMchvj8ogtJZDdjT 23+EQ37BR1h7w8D0dNghgNqDoJ5EbS1WVlBk7aPJDkQX4d9aYU4StUgxMOPtO4GJ9Kjt 18X+oq3YJezaJ5V4+c3PrcirI6P1FxPoKQV6EMEPQ6iMThlPUUez5nHC3TZt5N5fSEuI Hzx3IcsI3uMdBl/Ig5zycwGB3o7PvOWh1H99+1bLVyI38nRpH/bpYA9HXF6m2u0OJwJs 6CXg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=grpW1aOc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u123si956966oif.84.2020.02.18.17.46.03; Tue, 18 Feb 2020 17:46:15 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=grpW1aOc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728104AbgBSBou (ORCPT + 99 others); Tue, 18 Feb 2020 20:44:50 -0500 Received: from mail-pj1-f68.google.com ([209.85.216.68]:55217 "EHLO mail-pj1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728078AbgBSBor (ORCPT ); Tue, 18 Feb 2020 20:44:47 -0500 Received: by mail-pj1-f68.google.com with SMTP id dw13so1858409pjb.4; Tue, 18 Feb 2020 17:44:46 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=S6I7FkbWENtipd9zPITUUz5qzwuADyMhSE4JPk/5aKo=; b=grpW1aOcWY7IHSfhWkaQekrHm6oGkQJgAbcYNwHWWr8RBl8yhAq7SWaWmfi9gFhATr 7WszFDcQhbjWb2XWYhUE6Iw0vro+RRY0MiqfowH/YpmjfpbbiLMQQMKCqURY3XS80SFW DEcTlHoQDPpBLtE5WA6aRVkzBDDyXmQt9wU2OrYaGJPFgNpU0vrRRHNr/Q9wPhIbCTHA lHxnnz0SMDaqyThdCgCiYimxOspulO3xIsDK06unf7EefYUcpQOqE+brGSsec/s2VmvY r0JB2w3NHhYOWizQgKT7ddX7eLIecrq+HG90y9k4bu0zm9NaKFWs04ufT7Nd8cwb0nUB giiQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id :in-reply-to:references:mime-version:content-transfer-encoding; bh=S6I7FkbWENtipd9zPITUUz5qzwuADyMhSE4JPk/5aKo=; b=lqpE6bN4PUscLAUL3D9WZF4v82Zxe0uadmP5l6vTrvc/SIabtYf3msBWX47uDwJfer 7LjRkcj0JPYnIVqC4MXkGoVdOJcTDCMSEePSpL3kyWPo81rozE6WQG2TIufJO5At/UR1 LKK1qvPhmSf4lD8LbnnSEphl8btXKz8d3+eSH68XM//7Un9zuus0mCk3IVrBqFSVTpSC wQ7QPY5s5v+iXOA0Qi0TBeooWVEEqAd+K5+ELkEMDtpCaR6w7PPb94pkDbSoBQXRiGjg /bN6xMo73Ki6UCGDnqfQHeHVdxQ29etQHZBugbinqD9tJZ5McjlWrrIfI0BmvRz3ga3W doEQ== X-Gm-Message-State: APjAAAVYccTj9bDIRxqfgefJNnfefG8aH8UbADqXEO7VkP19r3VXGfbe /1OtwPqEFKWl+rT+foacF5s= X-Received: by 2002:a17:902:462:: with SMTP id 89mr23938662ple.270.1582076686098; Tue, 18 Feb 2020 17:44:46 -0800 (PST) Received: from bbox-1.mtv.corp.google.com ([2620:15c:211:1:3e01:2939:5992:52da]) by smtp.gmail.com with ESMTPSA id t186sm221192pgd.26.2020.02.18.17.44.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 18 Feb 2020 17:44:45 -0800 (PST) From: Minchan Kim To: Andrew Morton Cc: LKML , linux-mm , linux-api@vger.kernel.org, oleksandr@redhat.com, Suren Baghdasaryan , Tim Murray , Daniel Colascione , Sandeep Patil , Sonny Rao , Brian Geffon , Michal Hocko , Johannes Weiner , Shakeel Butt , John Dias , Joel Fernandes , sj38.park@gmail.com, alexander.h.duyck@linux.intel.com, Jann Horn , Minchan Kim , Christian Brauner , Kirill Tkhai Subject: [PATCH v6 5/7] mm: support both pid and pidfd for process_madvise Date: Tue, 18 Feb 2020 17:44:31 -0800 Message-Id: <20200219014433.88424-6-minchan@kernel.org> X-Mailer: git-send-email 2.25.0.265.gbab2e86ba0-goog In-Reply-To: <20200219014433.88424-1-minchan@kernel.org> References: <20200219014433.88424-1-minchan@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org There is a demand[1] to support pid as well pidfd for process_madvise to reduce unnecessary syscall to get pidfd if the user has control of the target process(ie, they could guarantee the process is not gone or pid is not reused. Or, it might be okay to give a hint to wrong process). This patch aims for supporting both options like waitid(2). So, the syscall is currently, int process_madvise(int which, pid_t pid, void *addr, size_t length, int advise, unsigned long flag); @which is actually idtype_t for userspace libray and currently, it supports P_PID and P_PIDFD. [1] https://lore.kernel.org/linux-mm/9d849087-3359-c4ab-fbec-859e8186c509@virtuozzo.com/ Cc: Christian Brauner Suggested-by: Kirill Tkhai Signed-off-by: Minchan Kim --- include/linux/syscalls.h | 3 ++- mm/madvise.c | 34 ++++++++++++++++++++++------------ 2 files changed, 24 insertions(+), 13 deletions(-) diff --git a/include/linux/syscalls.h b/include/linux/syscalls.h index e4cd2c2f8bb4..f5ada20e2943 100644 --- a/include/linux/syscalls.h +++ b/include/linux/syscalls.h @@ -876,7 +876,8 @@ asmlinkage long sys_munlockall(void); asmlinkage long sys_mincore(unsigned long start, size_t len, unsigned char __user * vec); asmlinkage long sys_madvise(unsigned long start, size_t len, int behavior); -asmlinkage long sys_process_madvise(int pidfd, unsigned long start, + +asmlinkage long sys_process_madvise(int which, pid_t pid, unsigned long start, size_t len, int behavior, unsigned long flags); asmlinkage long sys_remap_file_pages(unsigned long start, unsigned long size, unsigned long prot, unsigned long pgoff, diff --git a/mm/madvise.c b/mm/madvise.c index def1507c2030..f6d9b9e66243 100644 --- a/mm/madvise.c +++ b/mm/madvise.c @@ -1182,11 +1182,10 @@ SYSCALL_DEFINE3(madvise, unsigned long, start, size_t, len_in, int, behavior) return do_madvise(current, current->mm, start, len_in, behavior); } -SYSCALL_DEFINE5(process_madvise, int, pidfd, unsigned long, start, +SYSCALL_DEFINE6(process_madvise, int, which, pid_t, upid, unsigned long, start, size_t, len_in, int, behavior, unsigned long, flags) { int ret; - struct fd f; struct pid *pid; struct task_struct *task; struct mm_struct *mm; @@ -1197,20 +1196,31 @@ SYSCALL_DEFINE5(process_madvise, int, pidfd, unsigned long, start, if (!process_madvise_behavior_valid(behavior)) return -EINVAL; - f = fdget(pidfd); - if (!f.file) - return -EBADF; + switch (which) { + case P_PID: + if (upid <= 0) + return -EINVAL; + + pid = find_get_pid(upid); + if (!pid) + return -ESRCH; + break; + case P_PIDFD: + if (upid < 0) + return -EINVAL; - pid = pidfd_pid(f.file); - if (IS_ERR(pid)) { - ret = PTR_ERR(pid); - goto fdput; + pid = pidfd_get_pid(upid); + if (IS_ERR(pid)) + return PTR_ERR(pid); + break; + default: + return -EINVAL; } task = get_pid_task(pid, PIDTYPE_PID); if (!task) { ret = -ESRCH; - goto fdput; + goto put_pid; } mm = mm_access(task, PTRACE_MODE_ATTACH_FSCREDS); @@ -1223,7 +1233,7 @@ SYSCALL_DEFINE5(process_madvise, int, pidfd, unsigned long, start, mmput(mm); release_task: put_task_struct(task); -fdput: - fdput(f); +put_pid: + put_pid(pid); return ret; } -- 2.25.0.265.gbab2e86ba0-goog