Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp3538136pxu; Tue, 8 Dec 2020 15:00:09 -0800 (PST) X-Google-Smtp-Source: ABdhPJwMs4T6pxhA/2xv3JTeqhqenfy9vzgzkXSFJjXklkQGDeNEUv9tncMOISbk/ThyF9KxzDmX X-Received: by 2002:a50:bc15:: with SMTP id j21mr192438edh.187.1607468402465; Tue, 08 Dec 2020 15:00:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607468402; cv=none; d=google.com; s=arc-20160816; b=wd7KEsG4LbcPj0EFX7Wb3Ey1nTruK/lPBBofmzNy3K4ppIcp83zDyu+U/ACvWHWX/d dVZErHhJGAlVoj5CAOePDB2BBDOJfC07LQ3Xh2EsJgQsNhl+dfVPFNNmLf5dQIs1Nl3C bU0p09/v0K+K6QT/OiMeia8FRRon4mzZtCvJwQVRff/2oMxTmH2+zJrJn8vwSdnRKF/b H4VRROmTY18HzZWZt33I8OBuzDpxjO86ug1rw3VPoKHiqlDuWeMxdWpLpAiN2lFDZA+m 80icAbOlhrOrf3DxASdaFuLCecs5u/6mUtaMGREx0+LqDToReuxgHINybmjzp/RfSeVC iXCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=awHPg+iyDLnmqpp/Cix68l0fsaA4igxr2Qb0br1IObI=; b=MKT0Nx9FTJQD3a7Ihx8/Y4gzC5alwDD1sEHlMe8iFzXvfT8avJL8UipwiJtOwpNXaT Z2Qh1EBKTHqto4BqAaC55hwnRfYfw9i63m/hHMDnr12jpIFj+99eGQcCbUj6KpA61WFW gtilYt5ZVP7x368IKfAQpwvZ9kjmRRFH+CSIr5e+WwU/CNwtn9gnh455ur/B5FAA4tPd y98W38TBfxv4ylzJVmNRDdN5fardUXRanXqm4VmnbfWar97P2vG7iELBzt57v85KYmt1 GpQgt43OxUUyFozUs9HO09F7al4hgXYYWSprP3Xn3sZ/JZDgc3zN3TxlysLPvVhCj30/ Kyww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=B4dCdvkp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z2si3301338ede.501.2020.12.08.14.59.34; Tue, 08 Dec 2020 15:00:02 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=B4dCdvkp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731564AbgLHWzr (ORCPT + 99 others); Tue, 8 Dec 2020 17:55:47 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33846 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731093AbgLHWzr (ORCPT ); Tue, 8 Dec 2020 17:55:47 -0500 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 21F51C0613CF; Tue, 8 Dec 2020 14:55:07 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=awHPg+iyDLnmqpp/Cix68l0fsaA4igxr2Qb0br1IObI=; b=B4dCdvkpsGV6bCkCQ5b+Mc1/r/ IoiliAO0Lny2SOH5HDWyZMnJ9carbOGkL+YMWW0PSkQdTi2AXz8Rzpp095YZN7Qc25ItVr6uqB/9T 6ZHgyapjpZhOEU9zFXAhs+BQ+VxJyocKS2HNztqFeU1GHQO/QrNgXTGvxbAV/gu9jLOskJXT/kgkc 3PAgS+wU4flclPVKcq7k15YB5ZcjEV/8wv2jeFpzsQoGsTHw2V+qjCb6cRO7PoIrvqL5EnoNhwHjD F7fsnR2B+DtEAe64HU1UON+T80wy26veZTrFZSRoa4P7HJt2ImTh9rcwD5+KEPDofBhH/5Uu2JK/S 6LZu5PLg==; Received: from willy by casper.infradead.org with local (Exim 4.92.3 #3 (Red Hat Linux)) id 1kmlsh-0007hx-SO; Tue, 08 Dec 2020 22:54:51 +0000 Date: Tue, 8 Dec 2020 22:54:51 +0000 From: Matthew Wilcox To: "Darrick J. Wong" Cc: Dan Williams , Ira Weiny , Thomas Gleixner , Andrew Morton , Dave Hansen , Christoph Hellwig , Al Viro , Eric Biggers , Joonas Lahtinen , Linux Kernel Mailing List , linux-fsdevel Subject: Re: [PATCH V2 2/2] mm/highmem: Lift memcpy_[to|from]_page to core Message-ID: <20201208225451.GM7338@casper.infradead.org> References: <20201207225703.2033611-3-ira.weiny@intel.com> <20201207232649.GD7338@casper.infradead.org> <20201207234008.GE7338@casper.infradead.org> <20201208213255.GO1563847@iweiny-DESK2.sc.intel.com> <20201208215028.GK7338@casper.infradead.org> <20201208223234.GL7338@casper.infradead.org> <20201208224555.GA605321@magnolia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201208224555.GA605321@magnolia> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Dec 08, 2020 at 02:45:55PM -0800, Darrick J. Wong wrote: > On Tue, Dec 08, 2020 at 10:32:34PM +0000, Matthew Wilcox wrote: > > On Tue, Dec 08, 2020 at 02:23:10PM -0800, Dan Williams wrote: > > > On Tue, Dec 8, 2020 at 1:51 PM Matthew Wilcox wrote: > > > > > > > > On Tue, Dec 08, 2020 at 01:32:55PM -0800, Ira Weiny wrote: > > > > > On Mon, Dec 07, 2020 at 03:49:55PM -0800, Dan Williams wrote: > > > > > > On Mon, Dec 7, 2020 at 3:40 PM Matthew Wilcox wrote: > > > > > > > > > > > > > > On Mon, Dec 07, 2020 at 03:34:44PM -0800, Dan Williams wrote: > > > > > > > > On Mon, Dec 7, 2020 at 3:27 PM Matthew Wilcox wrote: > > > > > > > > > > > > > > > > > > On Mon, Dec 07, 2020 at 02:57:03PM -0800, ira.weiny@intel.com wrote: > > > > > > > > > > +static inline void memcpy_page(struct page *dst_page, size_t dst_off, > > > > > > > > > > + struct page *src_page, size_t src_off, > > > > > > > > > > + size_t len) > > > > > > > > > > +{ > > > > > > > > > > + char *dst = kmap_local_page(dst_page); > > > > > > > > > > + char *src = kmap_local_page(src_page); > > > > > > > > > > > > > > > > > > I appreciate you've only moved these, but please add: > > > > > > > > > > > > > > > > > > BUG_ON(dst_off + len > PAGE_SIZE || src_off + len > PAGE_SIZE); > > > > > > > > > > > > > > > > I imagine it's not outside the realm of possibility that some driver > > > > > > > > on CONFIG_HIGHMEM=n is violating this assumption and getting away with > > > > > > > > it because kmap_atomic() of contiguous pages "just works (TM)". > > > > > > > > Shouldn't this WARN rather than BUG so that the user can report the > > > > > > > > buggy driver and not have a dead system? > > > > > > > > > > > > > > As opposed to (on a HIGHMEM=y system) silently corrupting data that > > > > > > > is on the next page of memory? > > > > > > > > > > > > Wouldn't it fault in HIGHMEM=y case? I guess not necessarily... > > > > > > > > > > > > > I suppose ideally ... > > > > > > > > > > > > > > if (WARN_ON(dst_off + len > PAGE_SIZE)) > > > > > > > len = PAGE_SIZE - dst_off; > > > > > > > if (WARN_ON(src_off + len > PAGE_SIZE)) > > > > > > > len = PAGE_SIZE - src_off; > > > > > > > > > > > > > > and then we just truncate the data of the offending caller instead of > > > > > > > corrupting innocent data that happens to be adjacent. Although that's > > > > > > > not ideal either ... I dunno, what's the least bad poison to drink here? > > > > > > > > > > > > Right, if the driver was relying on "corruption" for correct operation. > > > > > > > > > > > > If corruption actual were happening in practice wouldn't there have > > > > > > been screams by now? Again, not necessarily... > > > > > > > > > > > > At least with just plain WARN the kernel will start screaming on the > > > > > > user's behalf, and if it worked before it will keep working. > > > > > > > > > > So I decided to just sleep on this because I was recently told to not introduce > > > > > new WARN_ON's[1] > > > > > > > > > > I don't think that truncating len is worth the effort. The conversions being > > > > > done should all 'work' At least corrupting users data in the same way as it > > > > > used to... ;-) I'm ok with adding the WARN_ON's and I have modified the patch > > > > > to do so while I work through the 0-day issues. (not sure what is going on > > > > > there.) > > > > > > > > > > However, are we ok with adding the WARN_ON's given what Greg KH told me? This > > > > > is a bit more critical than the PKS API in that it could result in corrupt > > > > > data. > > > > > > > > zero_user_segments contains: > > > > > > > > BUG_ON(end1 > page_size(page) || end2 > page_size(page)); > > > > > > > > These should be consistent. I think we've demonstrated that there is > > > > no good option here. > > > > > > True, but these helpers are being deployed to many new locations where > > > they were not used before. > > > > So what's your preferred poison? > > > > 1. Corrupt random data in whatever's been mapped into the next page (which > > is what the helpers currently do) > > Please no. > > > 2. Copy less data than requested > > This sounds like the germination event for a research paper showing that > 63% of callers never notice. ;) > > > 3. Crash > > Useful as a debug tool? > > > 4. Something else > > Return bytes copied like we do for writes that didn't quite work? ... to learn that 87% of callers never check the return value, 10% of them do the wrong thing and the remainder have never been tested?