Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758588AbXEPNE2 (ORCPT ); Wed, 16 May 2007 09:04:28 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1754866AbXEPNEU (ORCPT ); Wed, 16 May 2007 09:04:20 -0400 Received: from smtp104.mail.mud.yahoo.com ([209.191.85.214]:34968 "HELO smtp104.mail.mud.yahoo.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1753000AbXEPNET (ORCPT ); Wed, 16 May 2007 09:04:19 -0400 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com.au; h=Received:X-YMail-OSG:Message-ID:Date:From:User-Agent:X-Accept-Language:MIME-Version:To:CC:Subject:References:In-Reply-To:Content-Type:Content-Transfer-Encoding; b=mTyl2Q1k43tOBeET8G33jW2wEcgPtADKD9CN/Yq9yw3ZVY2d2ju14n7ALSdR/kNBhjd4/ZVznWeuk538BoKWvu1o1OEUv0KXXnj4DqTFFQPBguqUUyB3e2AaAk5y5Xtja5sqZFdgw6+xQ5PHL2XxcHYcsRPpK6oAkgHo7Numigc= ; X-YMail-OSG: 6SlDN0wVM1liQ2rriNdFtBWzLuty4wi9caoedxGNvnmKo9JrKe_hBF46qpUeiu_xbqmQx_sU8g-- Message-ID: <464B014B.20109@yahoo.com.au> Date: Wed, 16 May 2007 23:04:11 +1000 From: Nick Piggin User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.12) Gecko/20051007 Debian/1.7.12-1 X-Accept-Language: en MIME-Version: 1.0 To: Chris Mason CC: David Woodhouse , David Howells , David Chinner , lkml , linux-mm , linux-fsdevel Subject: Re: [PATCH 1 of 2] block_page_mkwrite() Implementation V2 References: <20070318233008.GA32597093@melbourne.sgi.com> <18993.1179310769@redhat.com> <1179317360.2859.225.camel@shinybook.infradead.org> <20070516125341.GS26766@think.oraclecorp.com> In-Reply-To: <20070516125341.GS26766@think.oraclecorp.com> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1654 Lines: 38 Chris Mason wrote: > On Wed, May 16, 2007 at 08:09:19PM +0800, David Woodhouse wrote: > >>On Wed, 2007-05-16 at 11:19 +0100, David Howells wrote: >> >>>The start and end points passed to block_prepare_write() delimit the region of >>>the page that is going to be modified. This means that prepare_write() >>>doesn't need to fill it in if the page is not up to date. >> >>Really? Is it _really_ going to be modified? Even if the pointer >>userspace gave to write() is bogus, and is going to fault half-way >>through the copy_from_user()? > > > This is why there are so many variations on copy_from_user that zero on > faults. One way or another, the prepare_write/commit_write pair are > responsible for filling it in. I'll add to David's question about David's comment on David's patch, yes it will be modified but in that case it would be zero-filled as Chris says. However I believe this is incorrect behaviour. It is possible to easily fix that so it would only happen via a tiny race window (where the source memory gets unmapped at just the right time) however nobody seemed to interested (just by checking the return value of fault_in_pages_readable). The buffered write patches I'm working on fix that (among other things) of course. But they do away with prepare_write and introduce new aops, and they indeed must not expect the full range to have been written to. -- SUSE Labs, Novell Inc. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/