Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp4012864pxu; Mon, 12 Oct 2020 07:20:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxi0E+gVhnrvc3UF+io3Bt8BBcjEJ/scJDCaAF5W++Ce8lhR9UTWmp8R7tPPPO5N9Ust45V X-Received: by 2002:a17:907:42a6:: with SMTP id nf6mr28520579ejb.69.1602512446994; Mon, 12 Oct 2020 07:20:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602512446; cv=none; d=google.com; s=arc-20160816; b=JAY2x1nzF1cnk1uMLj1sezhiv8bQ3s4Mm1bddd3wMYebUPzdnR4Wu6/ecNWjUzUTgS pyapTW82PlnD/DHHuC4Zf0A+7/W4Hi/BlUgzLkpMy6kvw4k0vvbXbzJMH0tzjUS83/ON QKeOuePhKCmMssgS6OsmgQhSgEeDj/gdmRTKztQi7UaQp39+64v92U1iwooxGafRQCkT GQguP6Euph+bGfR8x8Lh8aqMSo2hhT3w/5eOTluUk6m+16a/vpZb0Amvhmwx7IEn/AUw Y6aG3l2nX+Lz1HnLDSI0qQdvLx7igRLjb+mA5sopxFbvEbeXclDzFqd/G9XndeXpanD6 IbNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:dkim-signature; bh=SuTUuPoSnGpk/kjzh2rwLKMK0NV61T2wKUHxGWe1zb8=; b=TmoxZzgfMklafE0PXBIKbeOsMTlVNXQduEndBxN+squnCG7ifTbtPJsSFbUQEv/bfK tHl9v+7S/6DHLExDltQ3zFgSoma8YsY7yQRld+jFgETVqCW1RSdb1YAe8oVYz41oLtef oSPUaRlkt3r+2W2fbCYBmbyc9y6lCsjvE8ojvClvu+hhBrxHvKYyG/Wg0rsa0Vh8no86 J+wGR4weZkgdak/loS/Asw3pSUaFdIoHXpsngzEsLfrIfrvbN6qtZuDGf/iv0rW+KYWa DlZqdREycSmgJeDfl9gyXp/G/fVZka1fgvvExC3zDb4Y9nKlhe3rSuUxLpBFIKtefUNs 7WPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=b2jM2N7c; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v3si12141314ejx.576.2020.10.12.07.20.23; Mon, 12 Oct 2020 07:20:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=b2jM2N7c; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388948AbgJLOTL (ORCPT + 99 others); Mon, 12 Oct 2020 10:19:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37100 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729253AbgJLOTL (ORCPT ); Mon, 12 Oct 2020 10:19:11 -0400 Received: from mail-wm1-x344.google.com (mail-wm1-x344.google.com [IPv6:2a00:1450:4864:20::344]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EB2CAC0613D2 for ; Mon, 12 Oct 2020 07:19:10 -0700 (PDT) Received: by mail-wm1-x344.google.com with SMTP id d3so17700089wma.4 for ; Mon, 12 Oct 2020 07:19:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=date:from:to:cc:subject:message-id:mail-followup-to:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=SuTUuPoSnGpk/kjzh2rwLKMK0NV61T2wKUHxGWe1zb8=; b=b2jM2N7c7mPZ8EQ74nK4as+DJOk3QIe1TTYSZ7oaXJ3365OVv4YcNg0qxxuCOPCxWm vCNnR/PtgLnbnCWWMkgiKiOIBral0E0p/MHJyNO76dWYwluCVeZIJCQEYXYML0RprK+3 MPKg0NsB7G5eAb0oAe3c/PxZvmGkrVc0l8J4g= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id :mail-followup-to:references:mime-version:content-disposition :content-transfer-encoding:in-reply-to; bh=SuTUuPoSnGpk/kjzh2rwLKMK0NV61T2wKUHxGWe1zb8=; b=HgXGMU6hzJ8mT9kdl1AJ8niolmIlgLdWxlYbYyQqfRsgMBoNy3n9LXPfT33JDMpS4n 9iaquz52lBjqAvdYqrF0cAVB6CDKZMLvBNCM8Tst5pVGaQna/cGRQn6q6DCj1A2hrOMz 3jzUZLMeJFIsE2dAUubSrpPg+8ihNsE6LnyPf7B4SLn4L30ngbMKUROAJd+9D47Jerve bBT9ieLCeQBcKV07QHiFyL3f6QNykAMzipXbvviHlVEu33OnE/ZwesFQ4lDJ0h615gFT 7cxTPjsYpJ/NTWPM409zh3kwOau7SYNLNsu0FnMi++Reg8uXJcqJkVGYxC7Pza5iJsR2 ujpA== X-Gm-Message-State: AOAM531qQTlZfad8wYmwj9wLw7EAWxnELZPIkKSwO59vKF2yLIk5VbsM xZxFwxRqLeGbwqCqQTDFJrfiDA== X-Received: by 2002:a1c:5685:: with SMTP id k127mr11456739wmb.135.1602512349502; Mon, 12 Oct 2020 07:19:09 -0700 (PDT) Received: from phenom.ffwll.local ([2a02:168:57f4:0:efd0:b9e5:5ae6:c2fa]) by smtp.gmail.com with ESMTPSA id z127sm23493365wmc.2.2020.10.12.07.19.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 12 Oct 2020 07:19:08 -0700 (PDT) Date: Mon, 12 Oct 2020 16:19:06 +0200 From: Daniel Vetter To: Niklas Schnelle Cc: Daniel Vetter , DRI Development , LKML , kvm@vger.kernel.org, linux-mm@kvack.org, linux-arm-kernel@lists.infradead.org, linux-samsung-soc@vger.kernel.org, linux-media@vger.kernel.org, linux-s390@vger.kernel.org, Gerald Schaefer , Daniel Vetter , Jason Gunthorpe , Dan Williams , Kees Cook , Andrew Morton , John Hubbard , =?iso-8859-1?B?Suly9G1l?= Glisse , Jan Kara Subject: Re: [PATCH v2 08/17] s390/pci: Remove races against pte updates Message-ID: <20201012141906.GX438822@phenom.ffwll.local> Mail-Followup-To: Niklas Schnelle , DRI Development , LKML , kvm@vger.kernel.org, linux-mm@kvack.org, linux-arm-kernel@lists.infradead.org, linux-samsung-soc@vger.kernel.org, linux-media@vger.kernel.org, linux-s390@vger.kernel.org, Gerald Schaefer , Daniel Vetter , Jason Gunthorpe , Dan Williams , Kees Cook , Andrew Morton , John Hubbard , =?iso-8859-1?B?Suly9G1l?= Glisse , Jan Kara References: <20201009075934.3509076-1-daniel.vetter@ffwll.ch> <20201009075934.3509076-9-daniel.vetter@ffwll.ch> <6deb08dd-46f3-bf26-5362-fdc696f6fd74@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <6deb08dd-46f3-bf26-5362-fdc696f6fd74@linux.ibm.com> X-Operating-System: Linux phenom 5.7.0-1-amd64 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 12, 2020 at 04:03:28PM +0200, Niklas Schnelle wrote: > Hi Daniel, > > freshly back from my vacation I've just taken a look at your patch. > First thanks for this fix and the detailed commit description. > Definitely makes sense to fix this and you can add my > > Acked-by: Niklas Schnelle > > Content wise it all looks sane and clear and since Gerald did the testing, > I would have applied it to our tree already, but I got some trivial > checkpatch violations that probably apply to the whole series. > I've commented them inline below. > If you confirm there I can do the fixups when applying or you can resend. > > On 10/9/20 9:59 AM, Daniel Vetter wrote: > > Way back it was a reasonable assumptions that iomem mappings never > > change the pfn range they point at. But this has changed: > > > > - gpu drivers dynamically manage their memory nowadays, invalidating > > ptes with unmap_mapping_range when buffers get moved > > > > - contiguous dma allocations have moved from dedicated carvetouts to > > cma regions. This means if we miss the unmap the pfn might contain > > pagecache or anon memory (well anything allocated with GFP_MOVEABLE) > > > > - even /dev/mem now invalidates mappings when the kernel requests that > > iomem region when CONFIG_IO_STRICT_DEVMEM is set, see 3234ac664a87 > > The above commit mention should use the format > 'commit 3234ac664a87 ("/dev/mem: Revoke mappings when a driver claims the region")' > otherwise this results in a checkpatch ERROR. > > > ("/dev/mem: Revoke mappings when a driver claims the region") > > > > Accessing pfns obtained from ptes without holding all the locks is > > therefore no longer a good idea. Fix this. > > > > Since zpci_memcpy_from|toio seems to not do anything nefarious with > > locks we just need to open code get_pfn and follow_pfn and make sure > > we drop the locks only after we've done. The write function also needs > > just a typo but just saw it "we're" instead of "we've" > > > the copy_from_user move, since we can't take userspace faults while > > holding the mmap sem. > > > > Reviewed-by: Gerald Schaefer > > > No empty line after the Revied-by tag. > > > Signed-off-by: Daniel Vetter > > Your Signed-off-by mail address does not match the one you're sending from, > this yields a checkpatch warning when using git am with your mail. > This is probably just a silly misconfiguration but since Signed-offs > are signatures should I change this to > "Daniel Vetter " which is the one you're > sending from and also in the MAINTAINERS file? > > > > Cc: Jason Gunthorpe > > Cc: Dan Williams > > Cc: Kees Cook > > Cc: Andrew Morton > > Cc: John Hubbard > > Cc: J?r?me Glisse > > Cc: Jan Kara > > Cc: Dan Williams > > The above Cc: line for Dan Williams is a duplicate > > > Cc: linux-mm@kvack.org > > Cc: linux-arm-kernel@lists.infradead.org > > Cc: linux-samsung-soc@vger.kernel.org > > Cc: linux-media@vger.kernel.org > > Cc: Niklas Schnelle > > Cc: Gerald Schaefer > > Cc: linux-s390@vger.kernel.org > > -- > > v2: Move VM_IO | VM_PFNMAP checks around so they keep returning EINVAL > > like before (Gerard) > > I think the above should go before the CC/Signed-off/Reviewev block. This is a per-subsystem bikeshed :-) drivers/gpu definitely wants it above, but most core subsystems want it below. I'll move it. > > --- > > arch/s390/pci/pci_mmio.c | 98 +++++++++++++++++++++++----------------- > > 1 file changed, 57 insertions(+), 41 deletions(-) > > > > diff --git a/arch/s390/pci/pci_mmio.c b/arch/s390/pci/pci_mmio.c > > index 401cf670a243..1a6adbc68ee8 100644 > > --- a/arch/s390/pci/pci_mmio.c > > +++ b/arch/s390/pci/pci_mmio.c > > @@ -119,33 +119,15 @@ static inline int __memcpy_toio_inuser(void __iomem *dst, > > return rc; > > } > > > > -static long get_pfn(unsigned long user_addr, unsigned long access, > > - unsigned long *pfn) > > -{ > > - struct vm_area_struct *vma; > > - long ret; > > - > > - mmap_read_lock(current->mm); > > - ret = -EINVAL; > > - vma = find_vma(current->mm, user_addr); > > - if (!vma) > > - goto out; > > - ret = -EACCES; > > - if (!(vma->vm_flags & access)) > > - goto out; > > - ret = follow_pfn(vma, user_addr, pfn); > > -out: > > - mmap_read_unlock(current->mm); > > - return ret; > > -} > > - > > SYSCALL_DEFINE3(s390_pci_mmio_write, unsigned long, mmio_addr, > > const void __user *, user_buffer, size_t, length) > > { > > u8 local_buf[64]; > > void __iomem *io_addr; > > void *buf; > > - unsigned long pfn; > > + struct vm_area_struct *vma; > > + pte_t *ptep; > > + spinlock_t *ptl; > > With checkpatch.pl --strict the above yields a complained > "CHECK: spinlock_t definition without comment" but I think > that's really okay since your commit description is very clear. > Same oin line 277. I think this is a falls positive, checkpatch doesn't realize that SYSCALL_DEFINE3 is a function, not a structure. And in a structure I'd have added the kerneldoc or comment. I'll fix up all the nits you've found for the next round. Thanks for taking a look. -Daniel -- Daniel Vetter Software Engineer, Intel Corporation http://blog.ffwll.ch