Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp2551692pxb; Sat, 28 Aug 2021 18:56:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwculNVjqouBtSvb9urTrFapHyRWYbvh3/cxp5Uu4GuBZRFVZs8bd4DV9TYoRPZT755hnAB X-Received: by 2002:a17:906:a0c9:: with SMTP id bh9mr17701314ejb.51.1630202209496; Sat, 28 Aug 2021 18:56:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630202209; cv=none; d=google.com; s=arc-20160816; b=jWHBgR5+N0lR2fIIXdgVODum6Pp7T+x4Jsx+zgtg1ZrO/WcxVyruqsgUovy2eKvseM 3JTxIwGiRUzSzXlMPbv+2zDZfkMMSXxbsN53uY/pL9YNEjgdOsAOVKsmuKHgDkplWRXq KDvpTKIio5UsRd/aMKWbYWNrZJ82yjTAjQRHgTtyWI9u+ItySDKPtSf8htdDYZAzWUEV 8h2GZDOvfXdef0xc2Mv0yeGIuVshnphBWYyu4e/YLz21SRgl71zyd2HZjXEk3ma8UwxC C3/ItjkuFQIDa6eoOXE6Uzy/YT9lZSXWiZTkRwdlxxqN24wi3P7o3SWUc5PcY7gM93e3 Bmjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=WAJzXwSSfdOc+7r/ICSFO4IwsmKGjK9iQGj8E+xkNlY=; b=vmwoEv5ci+bBcUl0FF0Z1O/mM+aYmI9VJilRNnAg9PEnKGB1K/mvNKemqDoIBlaC+W nuEXTxiqvrihTIu2r8QIGOW3jfyTZwQFwUtTOHEs6AZZjhVEaKnQo9ogghaA1E+yi0se s6sx1koWGf+SYqnt2ivBZ2KUwJA1Ojn0ainf8HDxDC+XTWRtHia26oRM0s8gi0K2EB47 Zro/8eQFi5nL6SWuYxXNTAmBfLH+X+rcRVXiwzBpiUlBzeWHVBLe3Crvy3WN5+1qZBmr b3naL+/1fTJ+Mv7f9b5G2KXD0SW/6FYJoNAzZVgDwidMFXtLHZ752yYYNGI1eHPM8c5n ntvA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u20si10866268edv.439.2021.08.28.18.55.53; Sat, 28 Aug 2021 18:56:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233257AbhH2BBb (ORCPT + 99 others); Sat, 28 Aug 2021 21:01:31 -0400 Received: from zeniv-ca.linux.org.uk ([142.44.231.140]:38374 "EHLO zeniv-ca.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229725AbhH2BBa (ORCPT ); Sat, 28 Aug 2021 21:01:30 -0400 Received: from viro by zeniv-ca.linux.org.uk with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1mK99Q-00Gvaz-Dk; Sun, 29 Aug 2021 00:58:20 +0000 Date: Sun, 29 Aug 2021 00:58:20 +0000 From: Al Viro To: Linus Torvalds Cc: Andreas Gruenbacher , Christoph Hellwig , "Darrick J. Wong" , Jan Kara , Matthew Wilcox , cluster-devel , linux-fsdevel , Linux Kernel Mailing List , ocfs2-devel@oss.oracle.com Subject: Re: [PATCH v7 05/19] iov_iter: Introduce fault_in_iov_iter_writeable Message-ID: References: <20210827164926.1726765-1-agruenba@redhat.com> <20210827164926.1726765-6-agruenba@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: Al Viro Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Aug 27, 2021 at 09:48:55PM +0000, Al Viro wrote: > So we have 3 callers where we want all-or-nothing semantics - two in > arch/x86/kernel/fpu/signal.c and one in btrfs. HWPOISON will be a problem > for all 3, AFAICS... > > IOW, it looks like we have two different things mixed here - one that wants > to try and fault stuff in, with callers caring only about having _something_ > faulted in (most of the users) and one that wants to make sure we *can* do > stores or loads on each byte in the affected area. > > Just accessing a byte in each page really won't suffice for the second kind. > Neither will g-u-p use, unless we teach it about HWPOISON and other fun > beasts... Looks like we want that thing to be a separate primitive; for > btrfs I'd probably replace fault_in_pages_writeable() with clear_user() > as a quick fix for now... Looks like out of these 3 we have * x86 restoring FPU state on sigreturn: correct, if somewhat obfuscated; HWPOISON is not an issue. We want full fault-in there (1 or 2 pages) * x86 saving FPU state into sigframe: not really needed; we do __clear_user() on any error anyway, and taking it into the caller past the pagefault_enable() will serve just fine instead of fault-in of the same for write. * btrfs search_ioctl(): HWPOISON is not an issue (no #MC on stores), but arm64 side of the things very likely is a problem with MTE; there we can have successful store in some bytes in a page with faults on stores elsewhere in it. With such setups that thing will loop indefinitely. And unlike x86 FPU handling, btrfs is arch-independent. IOW, unless I'm misreading the situation, we have one caller where "all or nothing" semantics is correct and needed, several where fault-in is pointless, one where the current use of fault-in is actively wrong (ppc kvm, patch from ppc folks exists), another place where neither semantics is right (btrfs on arm64) and a bunch where "can we access at least the first byte?" should be fine...