Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp2576438ybf; Mon, 2 Mar 2020 11:24:48 -0800 (PST) X-Google-Smtp-Source: ADFU+vtYh5ySWCdAlp888aSyWHigYKW38JPnm15WxRVpj7anbJLFlZzQC1Q4UNgxCSRzbaa7Oyom X-Received: by 2002:a05:6830:18ee:: with SMTP id d14mr530262otf.298.1583177087857; Mon, 02 Mar 2020 11:24:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583177087; cv=none; d=google.com; s=arc-20160816; b=ZKQK6IBQGlSRJMkqqmoMmqdcy3h8MlVeVG9aiPOrbyYarAiESwrb+L+B8agiSCgXeO pzukUppy2jPoIC0pDNKJ+/tKxvQriDEMzUAYAdimNdqYlpg9NLZJMap5mRK9Ov9kOytD jc/qfRgXhRUktUeUDom/oBQpnteCDCNCcEjP3yAlI3N3bKeJs5nwq5kg+FT8fSu3fr0q WTfcxXHVT32GK/Q5BMQsVEBqJIjPvBjBr/6e+5p8AHb96fG1kSbkWqgRPsUCNmmptyy9 gKXB8RT66CYptyCOozZdR/ctehkZoKl2nVGE70pgdr9omRZ2sfgkeIHV4EWSECrqzDiq aG7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=fX2Aei7xiQwIHHM7cuDD9mmHopxJvdd5QvDnEUqFw38=; b=wOdc4DdRqJTY1MnmxvhUcRWEiccEKxqf+G2iI0sCPFHxb9WsquMmPHU9hc+l5p9zoM mF1/Kww9LKT7Xg1yOpJSfkY5XDsaI5E3GTXPmsVmPG8aQ6It60Tt7rYeTihZ0TA8iD2b VUc8JL6dRVZQn8LgrodwX2n3hrMneVEsDUI6CDZdK+2jH0EZEKTfT18ZAMCHvr/0Qs+m hDDd5kiYKNEzXQmWq8d2ITAEbTE4TPneYrfMwM3vuv7kNY0b3R6iubXOA2VWaQ5ow16T dn9sy4ismNgRuwN4lfUY7d8B/D/4jqgtFFwfwfutobUv8KpBKvQosgxYMa9ma2gtIBXP vGZQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b="H/3CJ6rT"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b8si6784769otf.32.2020.03.02.11.24.35; Mon, 02 Mar 2020 11:24:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b="H/3CJ6rT"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727432AbgCBTXd (ORCPT + 99 others); Mon, 2 Mar 2020 14:23:33 -0500 Received: from mail-pl1-f193.google.com ([209.85.214.193]:45161 "EHLO mail-pl1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727126AbgCBTXd (ORCPT ); Mon, 2 Mar 2020 14:23:33 -0500 Received: by mail-pl1-f193.google.com with SMTP id b22so158823pls.12; Mon, 02 Mar 2020 11:23:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=fX2Aei7xiQwIHHM7cuDD9mmHopxJvdd5QvDnEUqFw38=; b=H/3CJ6rT+2Wsfz9ESdDWi3Xs8JbHfqLCzsju/DeoR106JaCeVs3NPpedySWUJCcWcG 1QrBZZcPlfz78ukYB6jDtkYs2dBXky/ZzXD9UePnBGnrxu1qkPkSby6zc/c5dx3NgTz4 Hrle3AckDUi+BagbjBdxOeQsMNibcwBAJ2j4rKro+2y2fx101FEpkBGsG+0/RSuPgdzR tTOIshi3WMwtaMzG2cqpUUd4NUV5NR/QoDboCimIxFPZJNmik39gSE4dfSDDh79cGwdK s88conD3d8G/SnDTJWBOgr/BAVwgk0CjL8UuVJMOAR/nrhxelZSwrnPrN6Oexxspzdiy vRtw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to:user-agent; bh=fX2Aei7xiQwIHHM7cuDD9mmHopxJvdd5QvDnEUqFw38=; b=HI97ZBtFEXnIAfA3DoEsUp7GccYgu2PKSqRk4eewMCPs9drKSWqZBbA5yodyDDF5lK L9KL1WqMezS08OhfmM/ERfZh5kJv2FJHPjKpuSZKJACuYyts6bbfSiG14KxGbjcXVrz9 VT+Mn+CxY1DVGZG8x+J+ksE7WuB4PUUjEqIkFGVFiD1nGcHhyZFV5OGAibIsba3DdnLv PEYwzFGYnAssWjjS6x90xytURKADwGBXiTtE9p8s0BDOqhUGzN8m3MC4qNjiD3BfniZ/ IOnjHQ2zUgIVrgew+q2ZX6Be8xXAyjH1YKPvkXTX/WK8bFaOs7TO6Dp6wW1aATwwY03Y njXg== X-Gm-Message-State: ANhLgQ2n098zR5AwI272q1fbJtt9AZmCweerQhAUkoWky3SBycyLc2ur i1xaqHovyOt350VxqDFRKv8= X-Received: by 2002:a17:90a:1546:: with SMTP id y6mr27255pja.26.1583177011513; Mon, 02 Mar 2020 11:23:31 -0800 (PST) Received: from google.com ([2620:15c:211:1:3e01:2939:5992:52da]) by smtp.gmail.com with ESMTPSA id b18sm22286150pfd.63.2020.03.02.11.23.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 Mar 2020 11:23:30 -0800 (PST) Date: Mon, 2 Mar 2020 11:23:28 -0800 From: Minchan Kim To: Suren Baghdasaryan Cc: Andrew Morton , LKML , linux-mm , linux-api@vger.kernel.org, oleksandr@redhat.com, Tim Murray , Daniel Colascione , Sandeep Patil , Sonny Rao , Brian Geffon , Michal Hocko , Johannes Weiner , Shakeel Butt , John Dias , Joel Fernandes , sj38.park@gmail.com, alexander.h.duyck@linux.intel.com, Jann Horn , Christian Brauner , Kirill Tkhai Subject: Re: [PATCH v6 5/7] mm: support both pid and pidfd for process_madvise Message-ID: <20200302192328.GB234476@google.com> References: <20200219014433.88424-1-minchan@kernel.org> <20200219014433.88424-6-minchan@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.2 (2019-09-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 28, 2020 at 02:41:07PM -0800, Suren Baghdasaryan wrote: > On Tue, Feb 18, 2020 at 5:44 PM Minchan Kim wrote: > > > > There is a demand[1] to support pid as well pidfd for process_madvise > > to reduce unnecessary syscall to get pidfd if the user has control of > > the target process(ie, they could guarantee the process is not gone > > or pid is not reused. Or, it might be okay to give a hint to wrong > > process). > > nit: When would "give a hint to wrong process" be ok? I would just > remove this part. I wanted to say non destructive hints. It's already true for other some hints because they are just best effort so it's not critical to be failed. If you mind it, I will remove the phrase. Thanks. > > > > > This patch aims for supporting both options like waitid(2). So, the > > syscall is currently, > > > > int process_madvise(int which, pid_t pid, void *addr, > > size_t length, int advise, unsigned long flag); > > > > @which is actually idtype_t for userspace libray and currently, > > it supports P_PID and P_PIDFD. > > > > [1] https://lore.kernel.org/linux-mm/9d849087-3359-c4ab-fbec-859e8186c509@virtuozzo.com/ > > > > Cc: Christian Brauner > > Suggested-by: Kirill Tkhai > > Signed-off-by: Minchan Kim > > --- > > include/linux/syscalls.h | 3 ++- > > mm/madvise.c | 34 ++++++++++++++++++++++------------ > > 2 files changed, 24 insertions(+), 13 deletions(-) > > > > diff --git a/include/linux/syscalls.h b/include/linux/syscalls.h > > index e4cd2c2f8bb4..f5ada20e2943 100644 > > --- a/include/linux/syscalls.h > > +++ b/include/linux/syscalls.h > > @@ -876,7 +876,8 @@ asmlinkage long sys_munlockall(void); > > asmlinkage long sys_mincore(unsigned long start, size_t len, > > unsigned char __user * vec); > > asmlinkage long sys_madvise(unsigned long start, size_t len, int behavior); > > -asmlinkage long sys_process_madvise(int pidfd, unsigned long start, > > + > > +asmlinkage long sys_process_madvise(int which, pid_t pid, unsigned long start, > > size_t len, int behavior, unsigned long flags); > > asmlinkage long sys_remap_file_pages(unsigned long start, unsigned long size, > > unsigned long prot, unsigned long pgoff, > > diff --git a/mm/madvise.c b/mm/madvise.c > > index def1507c2030..f6d9b9e66243 100644 > > --- a/mm/madvise.c > > +++ b/mm/madvise.c > > @@ -1182,11 +1182,10 @@ SYSCALL_DEFINE3(madvise, unsigned long, start, size_t, len_in, int, behavior) > > return do_madvise(current, current->mm, start, len_in, behavior); > > } > > > > -SYSCALL_DEFINE5(process_madvise, int, pidfd, unsigned long, start, > > +SYSCALL_DEFINE6(process_madvise, int, which, pid_t, upid, unsigned long, start, > > size_t, len_in, int, behavior, unsigned long, flags) > > { > > int ret; > > - struct fd f; > > struct pid *pid; > > struct task_struct *task; > > struct mm_struct *mm; > > @@ -1197,20 +1196,31 @@ SYSCALL_DEFINE5(process_madvise, int, pidfd, unsigned long, start, > > if (!process_madvise_behavior_valid(behavior)) > > return -EINVAL; > > > > - f = fdget(pidfd); > > - if (!f.file) > > - return -EBADF; > > + switch (which) { > > + case P_PID: > > + if (upid <= 0) > > + return -EINVAL; > > + > > + pid = find_get_pid(upid); > > + if (!pid) > > + return -ESRCH; > > + break; > > + case P_PIDFD: > > + if (upid < 0) > > + return -EINVAL; > > > > - pid = pidfd_pid(f.file); > > - if (IS_ERR(pid)) { > > - ret = PTR_ERR(pid); > > - goto fdput; > > + pid = pidfd_get_pid(upid); > > + if (IS_ERR(pid)) > > + return PTR_ERR(pid); > > + break; > > + default: > > + return -EINVAL; > > } > > > > task = get_pid_task(pid, PIDTYPE_PID); > > if (!task) { > > ret = -ESRCH; > > - goto fdput; > > + goto put_pid; > > } > > > > mm = mm_access(task, PTRACE_MODE_ATTACH_FSCREDS); > > @@ -1223,7 +1233,7 @@ SYSCALL_DEFINE5(process_madvise, int, pidfd, unsigned long, start, > > mmput(mm); > > release_task: > > put_task_struct(task); > > -fdput: > > - fdput(f); > > +put_pid: > > + put_pid(pid); > > return ret; > > } > > -- > > 2.25.0.265.gbab2e86ba0-goog > > > > Reviewed-by: Suren Baghdasaryan