Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp1015438iog; Thu, 30 Jun 2022 15:09:42 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vZ/KMXETQrCK2guhKdiUCmkkYhvULHGEfFIlP+P4LG7VuWZzOpBI7GA6sn9K+7g9+SaXRD X-Received: by 2002:a05:6a00:ad0:b0:50a:51b3:1e3d with SMTP id c16-20020a056a000ad000b0050a51b31e3dmr16660987pfl.18.1656626982118; Thu, 30 Jun 2022 15:09:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656626982; cv=none; d=google.com; s=arc-20160816; b=FLhr3FOPoqvZN8q7fVoBKtYn8I0pzogAoXu3SHRSF1HykzquEPHwB8dYdGVE+YPNED uNKPATN0rRZOXrV2JZUDQfwe+OJ/8SI7dhwtrLDaIYE0Te6tnzDP7XjI2HTCxLQz10Lu R5wFkx/rRXYDic8PZ0scnKqkj5jouE6Qopqr6zPw/U6tq2pKCeD+e+ead4aZpClH4PqL 8iiWG7YcjR1a3ZxogGrptDQVgwbT6P2QRuJAUH65HqKMWjCHcvHO6QizBUPUhEC0yC+8 BzmA7jLVudrhV46Prq4z+NR/QWkjKrW3A8Ll412WHS/y36i9Z43HCOn5x7TjSPZxQ5IV MvSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Eeu9QJYkwTLTThHqlRyDU+BIToPcJVgniGCZQDz/aG0=; b=UFIlevZ6L2zumrihG7amrKWhgmqTgJ2wQnnmeQh6uyrBdcC741Xxav4se0B61pGqBX 4XwaGAOmQAQXsFt5eSLEmK9EdMpo2JRWDxFtRSGucrHUVCUrsRGeAnIiLcQpOndK2XdF kEmJNxLpyMwvCXXYMGMXehsiAHhJdkcLosYS4/VdPkmrH4K+BoMf6fu3c9/g615N7qa2 qImrpqJj7MMkMM/UEpNQELTKU7IOKtNncI4hqHIVO0b9gCbgRo0tTnsrdzpfc/9qf6k+ AdjCkd5JH06/LLQdvy5cDS1Y7Oj2IX1xdiah5jOYxSvvyVcPq2grQ469RyxwgaUbRvzM 8Uog== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bUkDpa6K; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 73-20020a63044c000000b0040504f9e815si27859236pge.81.2022.06.30.15.09.28; Thu, 30 Jun 2022 15:09:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bUkDpa6K; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237138AbiF3VoU (ORCPT + 99 others); Thu, 30 Jun 2022 17:44:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36328 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236588AbiF3VoS (ORCPT ); Thu, 30 Jun 2022 17:44:18 -0400 Received: from sin.source.kernel.org (sin.source.kernel.org [IPv6:2604:1380:40e1:4800::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A122753EDD; Thu, 30 Jun 2022 14:44:13 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id DD6DECE30A2; Thu, 30 Jun 2022 21:44:11 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 04D54C341C7; Thu, 30 Jun 2022 21:44:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1656625450; bh=C13rqpZrJRKSzkLJVmPoFoRJvrW7PfIx75bbaWBZjuk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=bUkDpa6KxvqO7KAXJUDiUPGhkiQY0XsCTOFU2vNZgXqQgGOXj0YasiMIEBVkQi5Ok hKcWImpbrPMHQXkW5INFHvc14rQ2+/A+eqtGO5ngo4DB8JGoR1udv/tGRwcrXPzxJ4 soWH9MVUR1Eve09zTcKPPfsUu9mN4BH2Yw/ncKtvI3rFa+fN6ZjEykfnG8+99aw1zj IJRRldK5vD7DK2uR44geaUbCBPoATIDKOjqKnCacOZFxXsO6exs6Ag+YoAoczm1ls7 OM+gN5BvCYLiPriYaZ3em2M4I6y1JIELI7b0ZxTO1eEjeEhrV6KTWoTOBNlx49oQ/v NMCRAApxotWqA== Date: Thu, 30 Jun 2022 14:44:09 -0700 From: "Darrick J. Wong" To: Khalid Aziz Cc: akpm@linux-foundation.org, willy@infradead.org, aneesh.kumar@linux.ibm.com, arnd@arndb.de, 21cnbao@gmail.com, corbet@lwn.net, dave.hansen@linux.intel.com, david@redhat.com, ebiederm@xmission.com, hagen@jauu.net, jack@suse.cz, keescook@chromium.org, kirill@shutemov.name, kucharsk@gmail.com, linkinjeon@kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, longpeng2@huawei.com, luto@kernel.org, markhemm@googlemail.com, pcc@google.com, rppt@kernel.org, sieberf@amazon.com, sjpark@amazon.de, surenb@google.com, tst@schoebel-theuer.de, yzaikin@google.com Subject: Re: [PATCH v2 6/9] mm/mshare: Add mmap operation Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-7.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 29, 2022 at 04:53:57PM -0600, Khalid Aziz wrote: > mmap is used to establish address range for mshare region and map the > region into process's address space. Add basic mmap operation that > supports setting address range. Also fix code to not allocate new > mm_struct for files in msharefs that exist for information and not > for defining a new mshare region. > > Signed-off-by: Khalid Aziz > Signed-off-by: Matthew Wilcox (Oracle) > --- > mm/mshare.c | 48 +++++++++++++++++++++++++++++++++++++++++------- > 1 file changed, 41 insertions(+), 7 deletions(-) > > diff --git a/mm/mshare.c b/mm/mshare.c > index d238b68b0576..088a6cab1e93 100644 > --- a/mm/mshare.c > +++ b/mm/mshare.c > @@ -9,7 +9,8 @@ > * > * > * Copyright (C) 2022 Oracle Corp. All rights reserved. > - * Author: Khalid Aziz > + * Authors: Khalid Aziz > + * Matthew Wilcox > * > */ > > @@ -60,9 +61,36 @@ msharefs_read(struct kiocb *iocb, struct iov_iter *iov) > return ret; > } > > +static int > +msharefs_mmap(struct file *file, struct vm_area_struct *vma) > +{ > + struct mshare_data *info = file->private_data; > + struct mm_struct *mm = info->mm; > + > + /* > + * If this mshare region has been set up once already, bail out > + */ > + if (mm->mmap_base != 0) > + return -EINVAL; > + > + if ((vma->vm_start | vma->vm_end) & (PGDIR_SIZE - 1)) > + return -EINVAL; > + > + mm->mmap_base = vma->vm_start; > + mm->task_size = vma->vm_end - vma->vm_start; > + if (!mm->task_size) > + mm->task_size--; > + info->minfo->start = mm->mmap_base; > + info->minfo->size = mm->task_size; So, uh, if the second mmap() caller decides to ignore the mshare_info, should they get an -EINVAL here since the memory mappings won't be at the same process virtual address? > + vma->vm_flags |= VM_SHARED_PT; > + vma->vm_private_data = info; > + return 0; > +} > + > static const struct file_operations msharefs_file_operations = { > .open = msharefs_open, > .read_iter = msharefs_read, > + .mmap = msharefs_mmap, > .llseek = no_llseek, > }; > > @@ -119,7 +147,12 @@ msharefs_fill_mm(struct inode *inode) > goto err_free; > } > info->mm = mm; > - info->minfo = NULL; > + info->minfo = kzalloc(sizeof(struct mshare_info), GFP_KERNEL); > + if (info->minfo == NULL) { > + retval = -ENOMEM; > + goto err_free; > + } > + > refcount_set(&info->refcnt, 1); > inode->i_private = info; > > @@ -128,13 +161,14 @@ msharefs_fill_mm(struct inode *inode) > err_free: > if (mm) > mmput(mm); > + kfree(info->minfo); > kfree(info); > return retval; > } > > static struct inode > *msharefs_get_inode(struct super_block *sb, const struct inode *dir, > - umode_t mode) > + umode_t mode, bool newmm) > { > struct inode *inode = new_inode(sb); > if (inode) { > @@ -147,7 +181,7 @@ static struct inode > case S_IFREG: > inode->i_op = &msharefs_file_inode_ops; > inode->i_fop = &msharefs_file_operations; > - if (msharefs_fill_mm(inode) != 0) { > + if (newmm && msharefs_fill_mm(inode) != 0) { > discard_new_inode(inode); > inode = ERR_PTR(-ENOMEM); > } > @@ -177,7 +211,7 @@ msharefs_mknod(struct user_namespace *mnt_userns, struct inode *dir, > struct inode *inode; > int err = 0; > > - inode = msharefs_get_inode(dir->i_sb, dir, mode); > + inode = msharefs_get_inode(dir->i_sb, dir, mode, true); > if (IS_ERR(inode)) > return PTR_ERR(inode); > > @@ -267,7 +301,7 @@ prepopulate_files(struct super_block *s, struct inode *dir, > if (!dentry) > return -ENOMEM; > > - inode = msharefs_get_inode(s, dir, S_IFREG | files->mode); > + inode = msharefs_get_inode(s, dir, S_IFREG | files->mode, false); I was wondering why the information files were getting their own mshare_data. TBH I'm not really sure what the difference is between mshare_data and mshare_info, since those names are not especially distinct. > if (!inode) { > dput(dentry); > return -ENOMEM; > @@ -301,7 +335,7 @@ msharefs_fill_super(struct super_block *sb, struct fs_context *fc) > sb->s_d_op = &msharefs_d_ops; > sb->s_time_gran = 1; > > - inode = msharefs_get_inode(sb, NULL, S_IFDIR | 0777); > + inode = msharefs_get_inode(sb, NULL, S_IFDIR | 0777, false); Is it wise to default to world-writable? Surely whatever userspace software wraps an msharefs can relax permissions as needed. --D > if (!inode) { > err = -ENOMEM; > goto out; > -- > 2.32.0 >