Received: by 10.223.164.202 with SMTP id h10csp854130wrb; Tue, 7 Nov 2017 16:12:54 -0800 (PST) X-Google-Smtp-Source: ABhQp+Qa0tDNv/4sltI8SSvOEytcjxI8oaVC7irrpTQHyRgcPn0fAWVO6piZRmvxLHAJ9a/smudg X-Received: by 10.99.111.6 with SMTP id k6mr456460pgc.308.1510099974768; Tue, 07 Nov 2017 16:12:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1510099974; cv=none; d=google.com; s=arc-20160816; b=UwipNG+dl38ph85K3iCicIFUkaFNWOuYP3Alh+QQJ8PK7+A8aUjkAKvHIuumBJe7/t O8YWK60lBhFddcVBZC1pbnkxtH5zaTOAOPWR2rtf/WfWa7mamSy7E6jxL+W3kvP8p67Y zt1ic3rz+UvxfON5cl540937LYD1ICWFdJhIonftUIGEFm416Ry75ClhPDFXv2LXpcW5 yWkV0EGG021EmP5/KN1ihP0roEXFCv9Q5IHFSsO4XPzVLGBhZPN5J96BOrNJBNHfsDZu b3MznDO5C9CYx0WtnuqSOhoHfO37RLQrknjiC37nFRJnWystNnIor0PgndKcnRr5jGeh iNrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dmarc-filter:arc-authentication-results; bh=P5Hj8n3a51SsoBGI12l/mQhHnEsUF3MuMTCFwyGmUdg=; b=wbjMnC1+swS1LGF+5tc9hDIYOxyUvOw6PoyNbBKw69K4AfpA7ve1AhuYYNgG5g87mR 0S30oI5+1Q0CKexke1d3ZxldKls9DvIi6oajMvhZT9XSZn3evmk1AAsHU3Bhf8+ABX90 XUpY8Azi3zZzgByFSIgz4qLlHi1WqvsN6Z3NUyHveFfnUg9NVlPFiBvo6Gx8qLfddd8h ma7scZJtan6zyJklbM2/6FNs+9HfSl4mc+eOA72HeyrsM/ox0cA7QJXgsXWt+HHiNlR2 HuKplV34nEVRyIvB/0UofY3w2YKUiI7W3n+1mmIc/1fwIghywokipS7Vrs5rWn/m/VPH jRaw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h4si2476520pfa.387.2017.11.07.16.12.41; Tue, 07 Nov 2017 16:12:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757655AbdKGM2Z (ORCPT + 91 others); Tue, 7 Nov 2017 07:28:25 -0500 Received: from mx1.redhat.com ([209.132.183.28]:41372 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757624AbdKGM2X (ORCPT ); Tue, 7 Nov 2017 07:28:23 -0500 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 8FAAAC04AC48; Tue, 7 Nov 2017 12:28:23 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 8FAAAC04AC48 Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com; spf=fail smtp.mailfrom=marcandre.lureau@redhat.com Received: from localhost (ovpn-112-38.ams2.redhat.com [10.36.112.38]) by smtp.corp.redhat.com (Postfix) with ESMTP id 8EA6C5D9C9; Tue, 7 Nov 2017 12:28:20 +0000 (UTC) From: =?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= To: linux-mm@kvack.org, linux-kernel@vger.kernel.org Cc: aarcange@redhat.com, hughd@google.com, nyc@holomorphy.com, mike.kravetz@oracle.com, =?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= Subject: [PATCH v3 5/9] shmem: add sealing support to hugetlb-backed memfd Date: Tue, 7 Nov 2017 13:27:56 +0100 Message-Id: <20171107122800.25517-6-marcandre.lureau@redhat.com> In-Reply-To: <20171107122800.25517-1-marcandre.lureau@redhat.com> References: <20171107122800.25517-1-marcandre.lureau@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Tue, 07 Nov 2017 12:28:23 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Adapt add_seals()/get_seals() to work with hugetbfs-backed memory. Teach memfd_create() to allow sealing operations on MFD_HUGETLB. Signed-off-by: Marc-André Lureau Reviewed-by: Mike Kravetz --- mm/shmem.c | 47 ++++++++++++++++++++++++++++------------------- 1 file changed, 28 insertions(+), 19 deletions(-) diff --git a/mm/shmem.c b/mm/shmem.c index b7811979611f..b08ba5d84d84 100644 --- a/mm/shmem.c +++ b/mm/shmem.c @@ -2717,6 +2717,19 @@ static int shmem_wait_for_pins(struct address_space *mapping) return error; } +static unsigned int *memfd_file_seals_ptr(struct file *file) +{ + if (file->f_op == &shmem_file_operations) + return &SHMEM_I(file_inode(file))->seals; + +#ifdef CONFIG_HUGETLBFS + if (file->f_op == &hugetlbfs_file_operations) + return &HUGETLBFS_I(file_inode(file))->seals; +#endif + + return NULL; +} + #define F_ALL_SEALS (F_SEAL_SEAL | \ F_SEAL_SHRINK | \ F_SEAL_GROW | \ @@ -2725,7 +2738,7 @@ static int shmem_wait_for_pins(struct address_space *mapping) static int memfd_add_seals(struct file *file, unsigned int seals) { struct inode *inode = file_inode(file); - struct shmem_inode_info *info = SHMEM_I(inode); + unsigned int *file_seals; int error; /* @@ -2758,8 +2771,6 @@ static int memfd_add_seals(struct file *file, unsigned int seals) * other file types. */ - if (file->f_op != &shmem_file_operations) - return -EINVAL; if (!(file->f_mode & FMODE_WRITE)) return -EPERM; if (seals & ~(unsigned int)F_ALL_SEALS) @@ -2767,12 +2778,18 @@ static int memfd_add_seals(struct file *file, unsigned int seals) inode_lock(inode); - if (info->seals & F_SEAL_SEAL) { + file_seals = memfd_file_seals_ptr(file); + if (!file_seals) { + error = -EINVAL; + goto unlock; + } + + if (*file_seals & F_SEAL_SEAL) { error = -EPERM; goto unlock; } - if ((seals & F_SEAL_WRITE) && !(info->seals & F_SEAL_WRITE)) { + if ((seals & F_SEAL_WRITE) && !(*file_seals & F_SEAL_WRITE)) { error = mapping_deny_writable(file->f_mapping); if (error) goto unlock; @@ -2784,7 +2801,7 @@ static int memfd_add_seals(struct file *file, unsigned int seals) } } - info->seals |= seals; + *file_seals |= seals; error = 0; unlock: @@ -2794,10 +2811,9 @@ static int memfd_add_seals(struct file *file, unsigned int seals) static int memfd_get_seals(struct file *file) { - if (file->f_op != &shmem_file_operations) - return -EINVAL; + unsigned int *seals = memfd_file_seals_ptr(file); - return SHMEM_I(file_inode(file))->seals; + return seals ? *seals : -EINVAL; } long memfd_fcntl(struct file *file, unsigned int cmd, unsigned long arg) @@ -3657,7 +3673,7 @@ SYSCALL_DEFINE2(memfd_create, const char __user *, uname, unsigned int, flags) { - struct shmem_inode_info *info; + unsigned int *file_seals; struct file *file; int fd, error; char *name; @@ -3667,9 +3683,6 @@ SYSCALL_DEFINE2(memfd_create, if (flags & ~(unsigned int)MFD_ALL_FLAGS) return -EINVAL; } else { - /* Sealing not supported in hugetlbfs (MFD_HUGETLB) */ - if (flags & MFD_ALLOW_SEALING) - return -EINVAL; /* Allow huge page size encoding in flags. */ if (flags & ~(unsigned int)(MFD_ALL_FLAGS | (MFD_HUGE_MASK << MFD_HUGE_SHIFT))) @@ -3722,12 +3735,8 @@ SYSCALL_DEFINE2(memfd_create, file->f_flags |= O_RDWR | O_LARGEFILE; if (flags & MFD_ALLOW_SEALING) { - /* - * flags check at beginning of function ensures - * this is not a hugetlbfs (MFD_HUGETLB) file. - */ - info = SHMEM_I(file_inode(file)); - info->seals &= ~F_SEAL_SEAL; + file_seals = memfd_file_seals_ptr(file); + *file_seals &= ~F_SEAL_SEAL; } fd_install(fd, file); -- 2.15.0.125.g8f49766d64 From 1583061729001382395@xxx Fri Nov 03 16:08:32 +0000 2017 X-GM-THRID: 1583028530288307014 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread