From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.6 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1E8B3C7618B for ; Mon, 29 Jul 2019 08:06:16 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id DB3DD2075B for ; Mon, 29 Jul 2019 08:06:15 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="LB/VimNW" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727477AbfG2IGO (ORCPT ); Mon, 29 Jul 2019 04:06:14 -0400 Received: from mail-lj1-f196.google.com ([209.85.208.196]:36633 "EHLO mail-lj1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726680AbfG2IGN (ORCPT ); Mon, 29 Jul 2019 04:06:13 -0400 Received: by mail-lj1-f196.google.com with SMTP id i21so57682221ljj.3 for ; Mon, 29 Jul 2019 01:06:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=q+5I/p/Nycgrz3gMKuzpkFKzO+GKwckGcbd0BiK6zG0=; b=LB/VimNWk6JAU5/0EApO5jynRztUXjN0TlosFKaq/kodUwFVw0PewLEs0V68CR581J 4JlwzGL1H/RgmulXJE0tUnfGIbnAg+sboDZsIgfwmu5zl5BuBomBD0GnsmCfvsD96P7c 81a3Itk5111vnbz+3jlZUj6HwRjk603ngMwMhwxGZtZyazLVFIh7gk8zwdo6uMokLrwo BxlrHYeLTM7lyQGhdhkpGxhnpuX6jxPYtIgh6+bxdTukqfk38gWfWBmqLnsQhkJfiAW1 gHJBp5gXUR/8JTLCOXBmIl6aYSDoYBFQWfAph63tY1YwjFkjyQjdiesYPJO7SBVp2XXA p9xQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=q+5I/p/Nycgrz3gMKuzpkFKzO+GKwckGcbd0BiK6zG0=; b=htNL5lMr4i7BIKlX20Tq44GsXL2Lih21IAhnBWUnECB88qsolYaG0Rse3qpredwJju rAUI1h+NTdSTOKg8i6LYLDQa+9GoCXfx4F9bC7OByg29Jc3yBvzpQAbwYjVZfKbSNa0q uX5ETpV9iYkSARAU/A0zZYqXvuWE6hIOTgq+p3E3JND/Y8SUEsU68sGJrc/Mis4nsEjj yBDE5n4nMX8Opc7Z+b5m1170GA81f7IxPz8Tpm/GUR55NbRQOjkEVBhC9dsp6YR7Mqn0 YVOmVNoII/pV38l53tcdRcDGuZtqNgLB0k8z+JyCPbxLCyYuB26svpgQ1ugapecFbo9X Xj0g== X-Gm-Message-State: APjAAAVLfuY3Xupl8pir6IexKFSkXiiNSHcogNHT/AdxNcV729igO6wX Ofn211BQh/qbqeFzbV2TIeJxRyTTOOYmVR0gq11tt3xg X-Google-Smtp-Source: APXvYqz0P76ouodZLQJ+67CUBUqcRzH9RJUfbxlKZqHe7C7pDJbANNDWcvHTrBJed/XvhfMm/hXZdRRCBXnmIBaGkUs= X-Received: by 2002:a2e:93cc:: with SMTP id p12mr57966349ljh.11.1564387571686; Mon, 29 Jul 2019 01:06:11 -0700 (PDT) MIME-Version: 1.0 References: <20190215024830.GA26477@jordon-HP-15-Notebook-PC> <20190728180611.GA20589@mail-itl> In-Reply-To: <20190728180611.GA20589@mail-itl> From: Souptick Joarder Date: Mon, 29 Jul 2019 13:35:59 +0530 Message-ID: Subject: Re: [Xen-devel] [PATCH v4 8/9] xen/gntdev.c: Convert to use vm_map_pages() To: =?UTF-8?Q?Marek_Marczykowski=2DG=C3=B3recki?= Cc: Andrew Morton , Matthew Wilcox , Michal Hocko , Boris Ostrovsky , Juergen Gross , Russell King - ARM Linux , robin.murphy@arm.com, xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, Linux-MM Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Jul 28, 2019 at 11:36 PM Marek Marczykowski-G=C3=B3recki wrote: > > On Fri, Feb 15, 2019 at 08:18:31AM +0530, Souptick Joarder wrote: > > Convert to use vm_map_pages() to map range of kernel > > memory to user vma. > > > > map->count is passed to vm_map_pages() and internal API > > verify map->count against count ( count =3D vma_pages(vma)) > > for page array boundary overrun condition. > > This commit breaks gntdev driver. If vma->vm_pgoff > 0, vm_map_pages > will: > - use map->pages starting at vma->vm_pgoff instead of 0 The actual code ignores vma->vm_pgoff > 0 scenario and mapped the entire map->pages[i]. Why the entire map->pages[i] needs to be mapped if vma->vm_pgoff > 0 (in original code) ? are you referring to set vma->vm_pgoff =3D 0 irrespective of value passed from user space ? If yes, using vm_map_pages_zero() is an alternate option. > - verify map->count against vma_pages()+vma->vm_pgoff instead of just > vma_pages(). In original code -> diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c index 559d4b7f807d..469dfbd6cf90 100644 --- a/drivers/xen/gntdev.c +++ b/drivers/xen/gntdev.c @@ -1084,7 +1084,7 @@ static int gntdev_mmap(struct file *flip, struct vm_area_struct *vma) int index =3D vma->vm_pgoff; int count =3D vma_pages(vma); Count is user passed value. struct gntdev_grant_map *map; - int i, err =3D -EINVAL; + int err =3D -EINVAL; if ((vma->vm_flags & VM_WRITE) && !(vma->vm_flags & VM_SHARED)) return -EINVAL; @@ -1145,12 +1145,9 @@ static int gntdev_mmap(struct file *flip, struct vm_area_struct *vma) goto out_put_map; if (!use_ptemod) { - for (i =3D 0; i < count; i++) { - err =3D vm_insert_page(vma, vma->vm_start + i*PAGE_SIZE, - map->pages[i]); and when count > i , we end up with trying to map memory outside boundary of map->pages[i], which was not correct. - if (err) - goto out_put_map; - } + err =3D vm_map_pages(vma, map->pages, map->count); + if (err) + goto out_put_map; With this commit, inside __vm_map_pages(), we have addressed this scenario. +static int __vm_map_pages(struct vm_area_struct *vma, struct page **pages, + unsigned long num, unsigned long offset) +{ + unsigned long count =3D vma_pages(vma); + unsigned long uaddr =3D vma->vm_start; + int ret, i; + + /* Fail if the user requested offset is beyond the end of the object */ + if (offset > num) + return -ENXIO; + + /* Fail if the user requested size exceeds available object size */ + if (count > num - offset) + return -ENXIO; By checking count > num -offset. (considering vma->vm_pgoff !=3D 0 as well)= . So we will never cross the boundary of map->pages[i]. > > In practice, this breaks using a single gntdev FD for mapping multiple > grants. How ? > > It looks like vm_map_pages() is not a good fit for this code and IMO it > should be reverted. Did you hit any issue around this code in real time ? > > > Signed-off-by: Souptick Joarder > > Reviewed-by: Boris Ostrovsky > > --- > > drivers/xen/gntdev.c | 11 ++++------- > > 1 file changed, 4 insertions(+), 7 deletions(-) > > > > diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c > > index 5efc5ee..5d64262 100644 > > --- a/drivers/xen/gntdev.c > > +++ b/drivers/xen/gntdev.c > > @@ -1084,7 +1084,7 @@ static int gntdev_mmap(struct file *flip, struct = vm_area_struct *vma) > > int index =3D vma->vm_pgoff; > > int count =3D vma_pages(vma); > > struct gntdev_grant_map *map; > > - int i, err =3D -EINVAL; > > + int err =3D -EINVAL; > > > > if ((vma->vm_flags & VM_WRITE) && !(vma->vm_flags & VM_SHARED)) > > return -EINVAL; > > @@ -1145,12 +1145,9 @@ static int gntdev_mmap(struct file *flip, struct= vm_area_struct *vma) > > goto out_put_map; > > > > if (!use_ptemod) { > > - for (i =3D 0; i < count; i++) { > > - err =3D vm_insert_page(vma, vma->vm_start + i*PAG= E_SIZE, > > - map->pages[i]); > > - if (err) > > - goto out_put_map; > > - } > > + err =3D vm_map_pages(vma, map->pages, map->count); > > + if (err) > > + goto out_put_map; > > } else { > > #ifdef CONFIG_X86 > > /* > > -- > Best Regards, > Marek Marczykowski-G=C3=B3recki > Invisible Things Lab > A: Because it messes up the order in which people normally read text. > Q: Why is top-posting such a bad thing? From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.6 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3351CC433FF for ; Mon, 29 Jul 2019 08:06:15 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id DFCFC20693 for ; Mon, 29 Jul 2019 08:06:14 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="LB/VimNW" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org DFCFC20693 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 72CD88E0003; Mon, 29 Jul 2019 04:06:14 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 6DCD68E0002; Mon, 29 Jul 2019 04:06:14 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 5CD758E0003; Mon, 29 Jul 2019 04:06:14 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from mail-lj1-f197.google.com (mail-lj1-f197.google.com [209.85.208.197]) by kanga.kvack.org (Postfix) with ESMTP id EF4318E0002 for ; Mon, 29 Jul 2019 04:06:13 -0400 (EDT) Received: by mail-lj1-f197.google.com with SMTP id e16so13103241lja.23 for ; Mon, 29 Jul 2019 01:06:13 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:dkim-signature:mime-version:references :in-reply-to:from:date:message-id:subject:to:cc :content-transfer-encoding; bh=q+5I/p/Nycgrz3gMKuzpkFKzO+GKwckGcbd0BiK6zG0=; b=sfflCX/Hdzt+EzlnD4fRfVOcva+9ElN/rpxhBzM9Ar2PfAS7PP7PEM95fpplVaiJz+ TGa1WnobRCxrfK8CdWnUuYlx/MZjezVXscyWHrTZL1UyqRm2e8EHrXficoMmha0h+eSw aGSYDNhsgIeL0h1ox9NdHMwvaIWCifgejn+Je78nT6yqSuiZEpLwWsAdkM5p22mTcBLV E3GuW02D98qVwub61GjPtsN8nXzbH35INq33Q3vhKocC/J/qYrFi0UfdHMCPyf8oTH5e Iu2cZ+6GL0ahd8yTYzwxUDVEN5PFl485bKbdXruaqr6LqHV1bhfMpMOs4BGZQog1UYmz oP+Q== X-Gm-Message-State: APjAAAV/+6C9v19ibCdb+mbYmuXBccubLYaCF5cdtoKTOUnRhO2mtI6d duetPC3Pvnf8QlVaa9SrGebiIv3WLwPzuIeCOGYDWQVL9pANDQJNminxL4UJM0ol3yFsggQ8g1B kMN1ArNiV3IGW0YHoWvrEarZi59Vg854KH1Q28jHG8I0dsPUCl2XAs/3Z6C3HhtNhmQ== X-Received: by 2002:a2e:b0c4:: with SMTP id g4mr39771802ljl.155.1564387573137; Mon, 29 Jul 2019 01:06:13 -0700 (PDT) X-Received: by 2002:a2e:b0c4:: with SMTP id g4mr39771751ljl.155.1564387572126; Mon, 29 Jul 2019 01:06:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564387572; cv=none; d=google.com; s=arc-20160816; b=y1rcJ4ZymZ6L9LH9OXoa+qMIsqiea3hmHXouu73MT+LVHaSXTrT0uXgtAduK8iwR6l TVbj85M+ahung+F0+BxbPXBoG3LDrIGp8hONd8BiW82y6fL3O3pCA8pZHRzzwd5feWio Dk30JxIDYleFLjFlPqazA3Bq91nN/EpqUTeQnMGvqYvX4Bcq7d3VmbuaTFDAJJKSjC8U nfsxp/Y2VuhhOmb38mcMVyHhMKN8GsL1v8n7cayTQjOhEUbLtZth8uYhLcFdxlrRX1y5 Sa7SLd8L63ISxm9Vv4I38hf4H148GHNBtAvPDQdRU1D4rMMLOqB09ivThxJETx0Cp0vX 1Leg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=q+5I/p/Nycgrz3gMKuzpkFKzO+GKwckGcbd0BiK6zG0=; b=V1w9lC/tDnXDbGEwNVECp70nRweXSoX3YxODQA8dH64CoDGKRE2ri3DyFe2ulVto7Z fqVS3H6oixexUYTqO5wA0ZG+oKDw6SEtFfLMbFQPU/KK1M7JoFaYVk9RUm7sb7qispK8 DB5+HuSEje6amTFaBitPQef6lDMeXqnewzREzgxaUUpcP64V9LbGe/8cgfcXmukKd/4C sXaUNMHEmoCSkSZdVSGr8f0b2aGFOXy0ybjEipZY5Lf7xAFBPuBP/gUr0qjBRfk8fDD7 L9lW9SrXl0DONPncrpVOVlvLhYpRuFD7/SVciTdTEkUHLk+v1L1WvdjYfP1t6XJlGFaS OByQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="LB/VimNW"; spf=pass (google.com: domain of jrdr.linux@gmail.com designates 209.85.220.65 as permitted sender) smtp.mailfrom=jrdr.linux@gmail.com; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from mail-sor-f65.google.com (mail-sor-f65.google.com. [209.85.220.65]) by mx.google.com with SMTPS id z5sor32426122ljc.29.2019.07.29.01.06.11 for (Google Transport Security); Mon, 29 Jul 2019 01:06:12 -0700 (PDT) Received-SPF: pass (google.com: domain of jrdr.linux@gmail.com designates 209.85.220.65 as permitted sender) client-ip=209.85.220.65; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="LB/VimNW"; spf=pass (google.com: domain of jrdr.linux@gmail.com designates 209.85.220.65 as permitted sender) smtp.mailfrom=jrdr.linux@gmail.com; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=q+5I/p/Nycgrz3gMKuzpkFKzO+GKwckGcbd0BiK6zG0=; b=LB/VimNWk6JAU5/0EApO5jynRztUXjN0TlosFKaq/kodUwFVw0PewLEs0V68CR581J 4JlwzGL1H/RgmulXJE0tUnfGIbnAg+sboDZsIgfwmu5zl5BuBomBD0GnsmCfvsD96P7c 81a3Itk5111vnbz+3jlZUj6HwRjk603ngMwMhwxGZtZyazLVFIh7gk8zwdo6uMokLrwo BxlrHYeLTM7lyQGhdhkpGxhnpuX6jxPYtIgh6+bxdTukqfk38gWfWBmqLnsQhkJfiAW1 gHJBp5gXUR/8JTLCOXBmIl6aYSDoYBFQWfAph63tY1YwjFkjyQjdiesYPJO7SBVp2XXA p9xQ== X-Google-Smtp-Source: APXvYqz0P76ouodZLQJ+67CUBUqcRzH9RJUfbxlKZqHe7C7pDJbANNDWcvHTrBJed/XvhfMm/hXZdRRCBXnmIBaGkUs= X-Received: by 2002:a2e:93cc:: with SMTP id p12mr57966349ljh.11.1564387571686; Mon, 29 Jul 2019 01:06:11 -0700 (PDT) MIME-Version: 1.0 References: <20190215024830.GA26477@jordon-HP-15-Notebook-PC> <20190728180611.GA20589@mail-itl> In-Reply-To: <20190728180611.GA20589@mail-itl> From: Souptick Joarder Date: Mon, 29 Jul 2019 13:35:59 +0530 Message-ID: Subject: Re: [Xen-devel] [PATCH v4 8/9] xen/gntdev.c: Convert to use vm_map_pages() To: =?UTF-8?Q?Marek_Marczykowski=2DG=C3=B3recki?= Cc: Andrew Morton , Matthew Wilcox , Michal Hocko , Boris Ostrovsky , Juergen Gross , Russell King - ARM Linux , robin.murphy@arm.com, xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, Linux-MM Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Sun, Jul 28, 2019 at 11:36 PM Marek Marczykowski-G=C3=B3recki wrote: > > On Fri, Feb 15, 2019 at 08:18:31AM +0530, Souptick Joarder wrote: > > Convert to use vm_map_pages() to map range of kernel > > memory to user vma. > > > > map->count is passed to vm_map_pages() and internal API > > verify map->count against count ( count =3D vma_pages(vma)) > > for page array boundary overrun condition. > > This commit breaks gntdev driver. If vma->vm_pgoff > 0, vm_map_pages > will: > - use map->pages starting at vma->vm_pgoff instead of 0 The actual code ignores vma->vm_pgoff > 0 scenario and mapped the entire map->pages[i]. Why the entire map->pages[i] needs to be mapped if vma->vm_pgoff > 0 (in original code) ? are you referring to set vma->vm_pgoff =3D 0 irrespective of value passed from user space ? If yes, using vm_map_pages_zero() is an alternate option. > - verify map->count against vma_pages()+vma->vm_pgoff instead of just > vma_pages(). In original code -> diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c index 559d4b7f807d..469dfbd6cf90 100644 --- a/drivers/xen/gntdev.c +++ b/drivers/xen/gntdev.c @@ -1084,7 +1084,7 @@ static int gntdev_mmap(struct file *flip, struct vm_area_struct *vma) int index =3D vma->vm_pgoff; int count =3D vma_pages(vma); Count is user passed value. struct gntdev_grant_map *map; - int i, err =3D -EINVAL; + int err =3D -EINVAL; if ((vma->vm_flags & VM_WRITE) && !(vma->vm_flags & VM_SHARED)) return -EINVAL; @@ -1145,12 +1145,9 @@ static int gntdev_mmap(struct file *flip, struct vm_area_struct *vma) goto out_put_map; if (!use_ptemod) { - for (i =3D 0; i < count; i++) { - err =3D vm_insert_page(vma, vma->vm_start + i*PAGE_SIZE, - map->pages[i]); and when count > i , we end up with trying to map memory outside boundary of map->pages[i], which was not correct. - if (err) - goto out_put_map; - } + err =3D vm_map_pages(vma, map->pages, map->count); + if (err) + goto out_put_map; With this commit, inside __vm_map_pages(), we have addressed this scenario. +static int __vm_map_pages(struct vm_area_struct *vma, struct page **pages, + unsigned long num, unsigned long offset) +{ + unsigned long count =3D vma_pages(vma); + unsigned long uaddr =3D vma->vm_start; + int ret, i; + + /* Fail if the user requested offset is beyond the end of the object */ + if (offset > num) + return -ENXIO; + + /* Fail if the user requested size exceeds available object size */ + if (count > num - offset) + return -ENXIO; By checking count > num -offset. (considering vma->vm_pgoff !=3D 0 as well)= . So we will never cross the boundary of map->pages[i]. > > In practice, this breaks using a single gntdev FD for mapping multiple > grants. How ? > > It looks like vm_map_pages() is not a good fit for this code and IMO it > should be reverted. Did you hit any issue around this code in real time ? > > > Signed-off-by: Souptick Joarder > > Reviewed-by: Boris Ostrovsky > > --- > > drivers/xen/gntdev.c | 11 ++++------- > > 1 file changed, 4 insertions(+), 7 deletions(-) > > > > diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c > > index 5efc5ee..5d64262 100644 > > --- a/drivers/xen/gntdev.c > > +++ b/drivers/xen/gntdev.c > > @@ -1084,7 +1084,7 @@ static int gntdev_mmap(struct file *flip, struct = vm_area_struct *vma) > > int index =3D vma->vm_pgoff; > > int count =3D vma_pages(vma); > > struct gntdev_grant_map *map; > > - int i, err =3D -EINVAL; > > + int err =3D -EINVAL; > > > > if ((vma->vm_flags & VM_WRITE) && !(vma->vm_flags & VM_SHARED)) > > return -EINVAL; > > @@ -1145,12 +1145,9 @@ static int gntdev_mmap(struct file *flip, struct= vm_area_struct *vma) > > goto out_put_map; > > > > if (!use_ptemod) { > > - for (i =3D 0; i < count; i++) { > > - err =3D vm_insert_page(vma, vma->vm_start + i*PAG= E_SIZE, > > - map->pages[i]); > > - if (err) > > - goto out_put_map; > > - } > > + err =3D vm_map_pages(vma, map->pages, map->count); > > + if (err) > > + goto out_put_map; > > } else { > > #ifdef CONFIG_X86 > > /* > > -- > Best Regards, > Marek Marczykowski-G=C3=B3recki > Invisible Things Lab > A: Because it messes up the order in which people normally read text. > Q: Why is top-posting such a bad thing? From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.3 required=3.0 tests=DKIM_ADSP_CUSTOM_MED, DKIM_INVALID,DKIM_SIGNED,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A2F56C433FF for ; Mon, 29 Jul 2019 08:06:45 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 7971E2070B for ; Mon, 29 Jul 2019 08:06:45 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="LB/VimNW" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 7971E2070B Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hs0ff-0003QO-PU; Mon, 29 Jul 2019 08:06:15 +0000 Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hs0fe-0003QJ-70 for xen-devel@lists.xenproject.org; Mon, 29 Jul 2019 08:06:14 +0000 X-Inumbo-ID: bad549b3-b1d7-11e9-8980-bc764e045a96 Received: from mail-lj1-x243.google.com (unknown [2a00:1450:4864:20::243]) by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS id bad549b3-b1d7-11e9-8980-bc764e045a96; Mon, 29 Jul 2019 08:06:13 +0000 (UTC) Received: by mail-lj1-x243.google.com with SMTP id y17so33086434ljk.10 for ; Mon, 29 Jul 2019 01:06:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=q+5I/p/Nycgrz3gMKuzpkFKzO+GKwckGcbd0BiK6zG0=; b=LB/VimNWk6JAU5/0EApO5jynRztUXjN0TlosFKaq/kodUwFVw0PewLEs0V68CR581J 4JlwzGL1H/RgmulXJE0tUnfGIbnAg+sboDZsIgfwmu5zl5BuBomBD0GnsmCfvsD96P7c 81a3Itk5111vnbz+3jlZUj6HwRjk603ngMwMhwxGZtZyazLVFIh7gk8zwdo6uMokLrwo BxlrHYeLTM7lyQGhdhkpGxhnpuX6jxPYtIgh6+bxdTukqfk38gWfWBmqLnsQhkJfiAW1 gHJBp5gXUR/8JTLCOXBmIl6aYSDoYBFQWfAph63tY1YwjFkjyQjdiesYPJO7SBVp2XXA p9xQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=q+5I/p/Nycgrz3gMKuzpkFKzO+GKwckGcbd0BiK6zG0=; b=TA4yvb0pCDSZnPDwm9k6UN+zuenbhQ40u+yJ0TLc6NJP1gJijZpqPj9V/SqXj6X0ou 2C+imDbFEXnhIN3UNssHTa8dQp0vRkhYe3H3Q2Y+7hN7+d7flTTIEtyM6tUh1IoTIZwE s3wnsRR3PgWv9eYYLWcdnj2lQyX5OGvKJttN4egBOADYasjOl5McLhPguMSPySZ9J8S3 EzzeMrQnQJrVn/hbyBsTiRceQ41ynzsJ+BwxNDr5C7v5zwXgUUGQhGsKRUH22Tqt9MrZ hdFM+E+MrVHMeGcSZoTk3AAfLgiGgIqh6MApzGu3WkVVqenX7lh+D8kn/xmzgCQC0i5E lyxw== X-Gm-Message-State: APjAAAX2YjJbJHdKfzZNf5plmjgJLVjaWkS+zd7b+0GodabVHoobqk8b RiLeVGs+YKgwAhZtaNk+UXsalk7xhCuapwKyrZ0= X-Google-Smtp-Source: APXvYqz0P76ouodZLQJ+67CUBUqcRzH9RJUfbxlKZqHe7C7pDJbANNDWcvHTrBJed/XvhfMm/hXZdRRCBXnmIBaGkUs= X-Received: by 2002:a2e:93cc:: with SMTP id p12mr57966349ljh.11.1564387571686; Mon, 29 Jul 2019 01:06:11 -0700 (PDT) MIME-Version: 1.0 References: <20190215024830.GA26477@jordon-HP-15-Notebook-PC> <20190728180611.GA20589@mail-itl> In-Reply-To: <20190728180611.GA20589@mail-itl> From: Souptick Joarder Date: Mon, 29 Jul 2019 13:35:59 +0530 Message-ID: To: =?UTF-8?Q?Marek_Marczykowski=2DG=C3=B3recki?= Subject: Re: [Xen-devel] [PATCH v4 8/9] xen/gntdev.c: Convert to use vm_map_pages() X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Juergen Gross , Michal Hocko , Russell King - ARM Linux , Matthew Wilcox , linux-kernel@vger.kernel.org, Linux-MM , xen-devel@lists.xenproject.org, Andrew Morton , robin.murphy@arm.com, Boris Ostrovsky Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" T24gU3VuLCBKdWwgMjgsIDIwMTkgYXQgMTE6MzYgUE0gTWFyZWsgTWFyY3p5a293c2tpLUfDs3Jl Y2tpCjxtYXJtYXJla0BpbnZpc2libGV0aGluZ3NsYWIuY29tPiB3cm90ZToKPgo+IE9uIEZyaSwg RmViIDE1LCAyMDE5IGF0IDA4OjE4OjMxQU0gKzA1MzAsIFNvdXB0aWNrIEpvYXJkZXIgd3JvdGU6 Cj4gPiBDb252ZXJ0IHRvIHVzZSB2bV9tYXBfcGFnZXMoKSB0byBtYXAgcmFuZ2Ugb2Yga2VybmVs Cj4gPiBtZW1vcnkgdG8gdXNlciB2bWEuCj4gPgo+ID4gbWFwLT5jb3VudCBpcyBwYXNzZWQgdG8g dm1fbWFwX3BhZ2VzKCkgYW5kIGludGVybmFsIEFQSQo+ID4gdmVyaWZ5IG1hcC0+Y291bnQgYWdh aW5zdCBjb3VudCAoIGNvdW50ID0gdm1hX3BhZ2VzKHZtYSkpCj4gPiBmb3IgcGFnZSBhcnJheSBi b3VuZGFyeSBvdmVycnVuIGNvbmRpdGlvbi4KPgo+IFRoaXMgY29tbWl0IGJyZWFrcyBnbnRkZXYg ZHJpdmVyLiBJZiB2bWEtPnZtX3Bnb2ZmID4gMCwgdm1fbWFwX3BhZ2VzCj4gd2lsbDoKPiAgLSB1 c2UgbWFwLT5wYWdlcyBzdGFydGluZyBhdCB2bWEtPnZtX3Bnb2ZmIGluc3RlYWQgb2YgMAoKVGhl IGFjdHVhbCBjb2RlIGlnbm9yZXMgdm1hLT52bV9wZ29mZiA+IDAgc2NlbmFyaW8gYW5kIG1hcHBl ZAp0aGUgZW50aXJlIG1hcC0+cGFnZXNbaV0uIFdoeSB0aGUgZW50aXJlIG1hcC0+cGFnZXNbaV0g bmVlZHMgdG8gYmUgbWFwcGVkCmlmIHZtYS0+dm1fcGdvZmYgPiAwIChpbiBvcmlnaW5hbCBjb2Rl KSA/CgphcmUgeW91IHJlZmVycmluZyB0byBzZXQgdm1hLT52bV9wZ29mZiA9IDAgaXJyZXNwZWN0 aXZlIG9mIHZhbHVlIHBhc3NlZApmcm9tIHVzZXIgc3BhY2UgPyBJZiB5ZXMsIHVzaW5nIHZtX21h cF9wYWdlc196ZXJvKCkgaXMgYW4gYWx0ZXJuYXRlCm9wdGlvbi4KCgo+ICAtIHZlcmlmeSBtYXAt PmNvdW50IGFnYWluc3Qgdm1hX3BhZ2VzKCkrdm1hLT52bV9wZ29mZiBpbnN0ZWFkIG9mIGp1c3QK PiAgICB2bWFfcGFnZXMoKS4KCkluIG9yaWdpbmFsIGNvZGUgLT4KCmRpZmYgLS1naXQgYS9kcml2 ZXJzL3hlbi9nbnRkZXYuYyBiL2RyaXZlcnMveGVuL2dudGRldi5jCmluZGV4IDU1OWQ0YjdmODA3 ZC4uNDY5ZGZiZDZjZjkwIDEwMDY0NAotLS0gYS9kcml2ZXJzL3hlbi9nbnRkZXYuYworKysgYi9k cml2ZXJzL3hlbi9nbnRkZXYuYwpAQCAtMTA4NCw3ICsxMDg0LDcgQEAgc3RhdGljIGludCBnbnRk ZXZfbW1hcChzdHJ1Y3QgZmlsZSAqZmxpcCwgc3RydWN0CnZtX2FyZWFfc3RydWN0ICp2bWEpCmlu dCBpbmRleCA9IHZtYS0+dm1fcGdvZmY7CmludCBjb3VudCA9IHZtYV9wYWdlcyh2bWEpOwoKQ291 bnQgaXMgdXNlciBwYXNzZWQgdmFsdWUuCgpzdHJ1Y3QgZ250ZGV2X2dyYW50X21hcCAqbWFwOwot IGludCBpLCBlcnIgPSAtRUlOVkFMOworIGludCBlcnIgPSAtRUlOVkFMOwppZiAoKHZtYS0+dm1f ZmxhZ3MgJiBWTV9XUklURSkgJiYgISh2bWEtPnZtX2ZsYWdzICYgVk1fU0hBUkVEKSkKcmV0dXJu IC1FSU5WQUw7CkBAIC0xMTQ1LDEyICsxMTQ1LDkgQEAgc3RhdGljIGludCBnbnRkZXZfbW1hcChz dHJ1Y3QgZmlsZSAqZmxpcCwKc3RydWN0IHZtX2FyZWFfc3RydWN0ICp2bWEpCmdvdG8gb3V0X3B1 dF9tYXA7CmlmICghdXNlX3B0ZW1vZCkgewotIGZvciAoaSA9IDA7IGkgPCBjb3VudDsgaSsrKSB7 Ci0gZXJyID0gdm1faW5zZXJ0X3BhZ2Uodm1hLCB2bWEtPnZtX3N0YXJ0ICsgaSpQQUdFX1NJWkUs Ci0gbWFwLT5wYWdlc1tpXSk7CgphbmQgd2hlbiBjb3VudCA+IGkgLCB3ZSBlbmQgdXAgd2l0aCB0 cnlpbmcgdG8gbWFwIG1lbW9yeSBvdXRzaWRlCmJvdW5kYXJ5IG9mIG1hcC0+cGFnZXNbaV0sIHdo aWNoIHdhcyBub3QgY29ycmVjdC4KCi0gaWYgKGVycikKLSBnb3RvIG91dF9wdXRfbWFwOwotIH0K KyBlcnIgPSB2bV9tYXBfcGFnZXModm1hLCBtYXAtPnBhZ2VzLCBtYXAtPmNvdW50KTsKKyBpZiAo ZXJyKQorIGdvdG8gb3V0X3B1dF9tYXA7CgpXaXRoIHRoaXMgY29tbWl0LCBpbnNpZGUgX192bV9t YXBfcGFnZXMoKSwgd2UgaGF2ZSBhZGRyZXNzZWQgdGhpcyBzY2VuYXJpby4KCitzdGF0aWMgaW50 IF9fdm1fbWFwX3BhZ2VzKHN0cnVjdCB2bV9hcmVhX3N0cnVjdCAqdm1hLCBzdHJ1Y3QgcGFnZSAq KnBhZ2VzLAorIHVuc2lnbmVkIGxvbmcgbnVtLCB1bnNpZ25lZCBsb25nIG9mZnNldCkKK3sKKyB1 bnNpZ25lZCBsb25nIGNvdW50ID0gdm1hX3BhZ2VzKHZtYSk7CisgdW5zaWduZWQgbG9uZyB1YWRk ciA9IHZtYS0+dm1fc3RhcnQ7CisgaW50IHJldCwgaTsKKworIC8qIEZhaWwgaWYgdGhlIHVzZXIg cmVxdWVzdGVkIG9mZnNldCBpcyBiZXlvbmQgdGhlIGVuZCBvZiB0aGUgb2JqZWN0ICovCisgaWYg KG9mZnNldCA+IG51bSkKKyByZXR1cm4gLUVOWElPOworCisgLyogRmFpbCBpZiB0aGUgdXNlciBy ZXF1ZXN0ZWQgc2l6ZSBleGNlZWRzIGF2YWlsYWJsZSBvYmplY3Qgc2l6ZSAqLworIGlmIChjb3Vu dCA+IG51bSAtIG9mZnNldCkKKyByZXR1cm4gLUVOWElPOwoKQnkgY2hlY2tpbmcgY291bnQgPiBu dW0gLW9mZnNldC4gKGNvbnNpZGVyaW5nIHZtYS0+dm1fcGdvZmYgIT0gMCBhcyB3ZWxsKS4KU28g d2Ugd2lsbCBuZXZlciBjcm9zcyB0aGUgYm91bmRhcnkgb2YgbWFwLT5wYWdlc1tpXS4KCgo+Cj4g SW4gcHJhY3RpY2UsIHRoaXMgYnJlYWtzIHVzaW5nIGEgc2luZ2xlIGdudGRldiBGRCBmb3IgbWFw cGluZyBtdWx0aXBsZQo+IGdyYW50cy4KCkhvdyA/Cgo+Cj4gSXQgbG9va3MgbGlrZSB2bV9tYXBf cGFnZXMoKSBpcyBub3QgYSBnb29kIGZpdCBmb3IgdGhpcyBjb2RlIGFuZCBJTU8gaXQKPiBzaG91 bGQgYmUgcmV2ZXJ0ZWQuCgpEaWQgeW91IGhpdCBhbnkgaXNzdWUgYXJvdW5kIHRoaXMgY29kZSBp biByZWFsIHRpbWUgPwoKCj4KPiA+IFNpZ25lZC1vZmYtYnk6IFNvdXB0aWNrIEpvYXJkZXIgPGpy ZHIubGludXhAZ21haWwuY29tPgo+ID4gUmV2aWV3ZWQtYnk6IEJvcmlzIE9zdHJvdnNreSA8Ym9y aXMub3N0cm92c2t5QG9yYWNsZS5jb20+Cj4gPiAtLS0KPiA+ICBkcml2ZXJzL3hlbi9nbnRkZXYu YyB8IDExICsrKystLS0tLS0tCj4gPiAgMSBmaWxlIGNoYW5nZWQsIDQgaW5zZXJ0aW9ucygrKSwg NyBkZWxldGlvbnMoLSkKPiA+Cj4gPiBkaWZmIC0tZ2l0IGEvZHJpdmVycy94ZW4vZ250ZGV2LmMg Yi9kcml2ZXJzL3hlbi9nbnRkZXYuYwo+ID4gaW5kZXggNWVmYzVlZS4uNWQ2NDI2MiAxMDA2NDQK PiA+IC0tLSBhL2RyaXZlcnMveGVuL2dudGRldi5jCj4gPiArKysgYi9kcml2ZXJzL3hlbi9nbnRk ZXYuYwo+ID4gQEAgLTEwODQsNyArMTA4NCw3IEBAIHN0YXRpYyBpbnQgZ250ZGV2X21tYXAoc3Ry dWN0IGZpbGUgKmZsaXAsIHN0cnVjdCB2bV9hcmVhX3N0cnVjdCAqdm1hKQo+ID4gICAgICAgaW50 IGluZGV4ID0gdm1hLT52bV9wZ29mZjsKPiA+ICAgICAgIGludCBjb3VudCA9IHZtYV9wYWdlcyh2 bWEpOwo+ID4gICAgICAgc3RydWN0IGdudGRldl9ncmFudF9tYXAgKm1hcDsKPiA+IC0gICAgIGlu dCBpLCBlcnIgPSAtRUlOVkFMOwo+ID4gKyAgICAgaW50IGVyciA9IC1FSU5WQUw7Cj4gPgo+ID4g ICAgICAgaWYgKCh2bWEtPnZtX2ZsYWdzICYgVk1fV1JJVEUpICYmICEodm1hLT52bV9mbGFncyAm IFZNX1NIQVJFRCkpCj4gPiAgICAgICAgICAgICAgIHJldHVybiAtRUlOVkFMOwo+ID4gQEAgLTEx NDUsMTIgKzExNDUsOSBAQCBzdGF0aWMgaW50IGdudGRldl9tbWFwKHN0cnVjdCBmaWxlICpmbGlw LCBzdHJ1Y3Qgdm1fYXJlYV9zdHJ1Y3QgKnZtYSkKPiA+ICAgICAgICAgICAgICAgZ290byBvdXRf cHV0X21hcDsKPiA+Cj4gPiAgICAgICBpZiAoIXVzZV9wdGVtb2QpIHsKPiA+IC0gICAgICAgICAg ICAgZm9yIChpID0gMDsgaSA8IGNvdW50OyBpKyspIHsKPiA+IC0gICAgICAgICAgICAgICAgICAg ICBlcnIgPSB2bV9pbnNlcnRfcGFnZSh2bWEsIHZtYS0+dm1fc3RhcnQgKyBpKlBBR0VfU0laRSwK PiA+IC0gICAgICAgICAgICAgICAgICAgICAgICAgICAgIG1hcC0+cGFnZXNbaV0pOwo+ID4gLSAg ICAgICAgICAgICAgICAgICAgIGlmIChlcnIpCj4gPiAtICAgICAgICAgICAgICAgICAgICAgICAg ICAgICBnb3RvIG91dF9wdXRfbWFwOwo+ID4gLSAgICAgICAgICAgICB9Cj4gPiArICAgICAgICAg ICAgIGVyciA9IHZtX21hcF9wYWdlcyh2bWEsIG1hcC0+cGFnZXMsIG1hcC0+Y291bnQpOwo+ID4g KyAgICAgICAgICAgICBpZiAoZXJyKQo+ID4gKyAgICAgICAgICAgICAgICAgICAgIGdvdG8gb3V0 X3B1dF9tYXA7Cj4gPiAgICAgICB9IGVsc2Ugewo+ID4gICNpZmRlZiBDT05GSUdfWDg2Cj4gPiAg ICAgICAgICAgICAgIC8qCj4KPiAtLQo+IEJlc3QgUmVnYXJkcywKPiBNYXJlayBNYXJjenlrb3dz a2ktR8OzcmVja2kKPiBJbnZpc2libGUgVGhpbmdzIExhYgo+IEE6IEJlY2F1c2UgaXQgbWVzc2Vz IHVwIHRoZSBvcmRlciBpbiB3aGljaCBwZW9wbGUgbm9ybWFsbHkgcmVhZCB0ZXh0Lgo+IFE6IFdo eSBpcyB0b3AtcG9zdGluZyBzdWNoIGEgYmFkIHRoaW5nPwoKX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLWRldmVsIG1haWxpbmcgbGlzdApYZW4tZGV2 ZWxAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0cy54ZW5wcm9qZWN0Lm9yZy9tYWls bWFuL2xpc3RpbmZvL3hlbi1kZXZlbA==