Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp327358pxk; Thu, 3 Sep 2020 00:14:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJytOAQWt1mv1nFJI3GlTOI0327TbU2wQqKQ3BVVAdZ1afO0csQf5G60WAj4bc8SsJCpfj7W X-Received: by 2002:aa7:dc16:: with SMTP id b22mr1616028edu.252.1599117267122; Thu, 03 Sep 2020 00:14:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599117267; cv=none; d=google.com; s=arc-20160816; b=lRi2fSK8BF36V6di9p9kkklSn9Dy82KIwubZnn6n90PjQv1obiLCxMeD0iCTE1qJzT hyR6q7qYJeiadOXGrsE2CAYxxC86ZmdYKcqDN5V9IMXNv5ApLcT8043wX/4BNd/y05Xm ZXBk4rLSRZXn5tFp07I7V0ocGiU8svGeIVTzLajY7bh3T/VKrKN+RJ0Yf6x1sYOF4BQP DQtQLB8OD7FALzKk5s47Pdu1HhrGyQEGat73lD/Z1JfR1rKIzxxqiXi2RZu/t8yzAw5d gGbk/ODZk/oPEHDUQWVmFnoaAjQsWh9YTtRtLvb8RQthrvCwJ3L1hOpd5Z9YztRo+lrP I0Ew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=+YHglauWyo1GpdJHdSOrL6fqb9MSa+7lxYYxKcetf0w=; b=WnRAWejOPOQ+yBWEtGDyKu0L+CXb13BxNSgbqovP/PuyG/We0O4A3j9tqZRCkJKm5N +pD787pj7qYsmOP5ZT2gVMw1XISzwq8pe8uL8NuUA4g+9fuUhzi0E7WpHRhkjOf/BkBM v9Vpv0NLZmMrWhDIEkQCBrqwWHe00SbsqrT/2LXzz+VQ1wk76DXiNPmkDV5HESkAhwKB IhAzxzVpMZUbC8LrgZmj+PZRR/0PNVoWyoF3do4T1FiJ0LXP9LKjHEJ9XuPa9akW1Igm wMSwYxmjzE7caYM/ZVEwJEYQNyUyS2qziA5hVCoouxu3GE4lHwb9fnvfJLAMZcOYi7IH 8nGg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="M/tFSSmE"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bv7si1331493ejb.523.2020.09.03.00.14.04; Thu, 03 Sep 2020 00:14:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="M/tFSSmE"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727847AbgICHNA (ORCPT + 99 others); Thu, 3 Sep 2020 03:13:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53496 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725919AbgICHM7 (ORCPT ); Thu, 3 Sep 2020 03:12:59 -0400 Received: from mail-lf1-x142.google.com (mail-lf1-x142.google.com [IPv6:2a00:1450:4864:20::142]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9BD7AC061244 for ; Thu, 3 Sep 2020 00:12:58 -0700 (PDT) Received: by mail-lf1-x142.google.com with SMTP id d2so1293400lfj.1 for ; Thu, 03 Sep 2020 00:12:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=+YHglauWyo1GpdJHdSOrL6fqb9MSa+7lxYYxKcetf0w=; b=M/tFSSmEvorZluN8EPZwgE5Tgn3kvpXb09Z3o12FeaxXZnpiVOm2R09pYwftnj4bMz YI5qV3nmRKPhR9Kzj9Xs4SHdUw2A8SejSAhbTu2ymuaH3OTHtgfmJiUwd6C1NeOl8tbc iwaC3enWC/wFq8pILWDBOJ8p+4Tb9VDbyRZfFJDlpMLfT1fBa/mt5s4sVnxArB8JVxFw 7YOD4is4mtZECMvMJnYfOwNylGf/2zQj4eiaNMGNTVf2qnixSNRhZ2AsegMdLaGQkk1k V6vSuk7WKbJUos5jcAZu58DYZtm4TgqGjAgEWfx5mUCrFMEY+QLcCfQ1kOHZg8t9GQap u17A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=+YHglauWyo1GpdJHdSOrL6fqb9MSa+7lxYYxKcetf0w=; b=CCjw+gjaRGF8P5m4fGalI5V6XGxV3/0W1fRZSZOK5AGuK1zVfAhqZ51BP7/5U/dTeF aNL2xXjPT0XGxVklz1KAdOxuHpff45XJPuX8zeicA1xWTKQ8TY6vXl0Q+9Rp+ZGs0223 BHiQF3K8SIRPJVzuu51/Re1Wl7F/zqAmRNMKWgwZarr76QhwQOTRZvXVG/Mgr3SG4zDU UFzrVIQNiOyGis+eTa4fiHCZJcJsrxFszL2JsE3ZagacXJ/WADotkPv2A58/lz64L/Bk YQGbz39N4HQktGqP7DhBQ+6Tn5AykTJyMQwExvXbBG0p1+kt9Eav+To4QwLsVvoMvdkf YV2Q== X-Gm-Message-State: AOAM530gJhG+eQhOzJCMzF15XIb7ZuVMNfSE5AFr8LCCr7llA2sKhotG eJAY+2OJ4momtODAWgC8TJI+rIsUPE5gHy3GBQI= X-Received: by 2002:a19:ee0d:: with SMTP id g13mr495606lfb.139.1599117176910; Thu, 03 Sep 2020 00:12:56 -0700 (PDT) MIME-Version: 1.0 References: <20200819110100.23504-1-song.bao.hua@hisilicon.com> In-Reply-To: From: Souptick Joarder Date: Thu, 3 Sep 2020 12:42:44 +0530 Message-ID: Subject: Re: [PATCH] mm/gup: don't permit users to call get_user_pages with FOLL_LONGTERM To: John Hubbard Cc: Barry Song , Andrew Morton , Linux-MM , linux-kernel@vger.kernel.org, linuxarm@huawei.com, Jan Kara , =?UTF-8?B?SsOpcsO0bWUgR2xpc3Nl?= , "Matthew Wilcox (Oracle)" , Al Viro , Christoph Hellwig , Dan Williams , Dave Chinner , Jason Gunthorpe , Jonathan Corbet , Michal Hocko , Mike Kravetz , Shuah Khan , Vlastimil Babka Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 19, 2020 at 11:45 PM John Hubbard wrote: > > On 8/19/20 4:01 AM, Barry Song wrote: > > gug prohibits users from calling get_user_pages() with FOLL_PIN. But it > > Maybe Andrew can fix the typo above: gug --> gup. > > > > allows users to call get_user_pages() with FOLL_LONGTERM only. It seems > > insensible. > > > > since FOLL_LONGTERM is a stricter case of FOLL_PIN, we should prohibit > > users from calling get_user_pages() with FOLL_LONGTERM while not with > > FOLL_PIN. > > > > mm/gup_benchmark.c used to be the only user who did this improperly. > > But it has been fixed by moving to use pin_user_pages(). > > For future patches, you don't have to write everything in the > commit log. Some things are better placed in a cover letter or after > the "---" line, because they don't need to be recorded forever. > > Anyway, the diffs seem fine, assuming that you've audited the call sites. We can use is_valid_gup_flags() inside -> get_user_pages_locked(), get_user_pages_unlocked(), pin_user_pages_locked() as well. Are you planning to add it in future patches ? > > thanks, > -- > John Hubbard > NVIDIA > > > > > Cc: John Hubbard > > Cc: Jan Kara > > Cc: J=C3=A9r=C3=B4me Glisse > > Cc: "Matthew Wilcox (Oracle)" > > Cc: Al Viro > > Cc: Christoph Hellwig > > Cc: Dan Williams > > Cc: Dave Chinner > > Cc: Jason Gunthorpe > > Cc: Jonathan Corbet > > Cc: Michal Hocko > > Cc: Mike Kravetz > > Cc: Shuah Khan > > Cc: Vlastimil Babka > > Signed-off-by: Barry Song > > --- > > mm/gup.c | 37 ++++++++++++++++++++++--------------- > > 1 file changed, 22 insertions(+), 15 deletions(-) > > > > diff --git a/mm/gup.c b/mm/gup.c > > index ae096ea7583f..4da669f79566 100644 > > --- a/mm/gup.c > > +++ b/mm/gup.c > > @@ -1789,6 +1789,25 @@ static long __get_user_pages_remote(struct mm_st= ruct *mm, > > gup_flags | FOLL_TOUCH | FOLL_REMO= TE); > > } > > > > +static bool is_valid_gup_flags(unsigned int gup_flags) > > +{ > > + /* > > + * FOLL_PIN must only be set internally by the pin_user_pages*() = APIs, > > + * never directly by the caller, so enforce that with an assertio= n: > > + */ > > + if (WARN_ON_ONCE(gup_flags & FOLL_PIN)) > > + return false; > > + /* > > + * FOLL_PIN is a prerequisite to FOLL_LONGTERM. Another way of sa= ying > > + * that is, FOLL_LONGTERM is a specific case, more restrictive ca= se of > > + * FOLL_PIN. > > + */ > > + if (WARN_ON_ONCE(gup_flags & FOLL_LONGTERM)) > > + return false; > > + > > + return true; > > +} > > + > > /** > > * get_user_pages_remote() - pin user pages in memory > > * @mm: mm_struct of target mm > > @@ -1854,11 +1873,7 @@ long get_user_pages_remote(struct mm_struct *mm, > > unsigned int gup_flags, struct page **pages, > > struct vm_area_struct **vmas, int *locked) > > { > > - /* > > - * FOLL_PIN must only be set internally by the pin_user_pages*() = APIs, > > - * never directly by the caller, so enforce that with an assertio= n: > > - */ > > - if (WARN_ON_ONCE(gup_flags & FOLL_PIN)) > > + if (!is_valid_gup_flags(gup_flags)) > > return -EINVAL; > > > > return __get_user_pages_remote(mm, start, nr_pages, gup_flags, > > @@ -1904,11 +1919,7 @@ long get_user_pages(unsigned long start, unsigne= d long nr_pages, > > unsigned int gup_flags, struct page **pages, > > struct vm_area_struct **vmas) > > { > > - /* > > - * FOLL_PIN must only be set internally by the pin_user_pages*() = APIs, > > - * never directly by the caller, so enforce that with an assertio= n: > > - */ > > - if (WARN_ON_ONCE(gup_flags & FOLL_PIN)) > > + if (!is_valid_gup_flags(gup_flags)) > > return -EINVAL; > > > > return __gup_longterm_locked(current->mm, start, nr_pages, > > @@ -2810,11 +2821,7 @@ EXPORT_SYMBOL_GPL(get_user_pages_fast_only); > > int get_user_pages_fast(unsigned long start, int nr_pages, > > unsigned int gup_flags, struct page **pages) > > { > > - /* > > - * FOLL_PIN must only be set internally by the pin_user_pages*() = APIs, > > - * never directly by the caller, so enforce that: > > - */ > > - if (WARN_ON_ONCE(gup_flags & FOLL_PIN)) > > + if (!is_valid_gup_flags(gup_flags)) > > return -EINVAL; > > > > /* > > > >