From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.3 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5F22AC433E3 for ; Thu, 14 May 2020 01:13:26 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 4D4192065D for ; Thu, 14 May 2020 01:13:26 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="b38mEvyZ" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 4D4192065D Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id A38A380046; Wed, 13 May 2020 21:13:25 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 9E8FD8003E; Wed, 13 May 2020 21:13:25 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 8FE1580046; Wed, 13 May 2020 21:13:25 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0090.hostedemail.com [216.40.44.90]) by kanga.kvack.org (Postfix) with ESMTP id 7BABA8003E for ; Wed, 13 May 2020 21:13:25 -0400 (EDT) Received: from smtpin09.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id 3696F4DC5 for ; Thu, 14 May 2020 01:13:25 +0000 (UTC) X-FDA: 76813551570.09.boys42_7522c7071c547 X-HE-Tag: boys42_7522c7071c547 X-Filterd-Recvd-Size: 2892 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf04.hostedemail.com (Postfix) with ESMTP for ; Thu, 14 May 2020 01:13:24 +0000 (UTC) Received: from devnote2 (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 18FB2205ED; Thu, 14 May 2020 01:13:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1589418804; bh=E3TK4XJbiog9RqVvd1coo4BBYDYxNPOeooso1RPW9+o=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=b38mEvyZRSzT8rHakz4cXiV/smUzpawoP/W25qu1jycv3OKF/Tee8zvKw12mAkxX2 sMGDcbWVx9Rf4NXP29meINeTtJKaxPsH/WnZQ5G2Y/aMSZwnJKOW6PoAPJkE+Y4yEJ mgEjAnRg8ItCq5lHHZoRmJZSU0MdT1D0NFPbudbQ= Date: Thu, 14 May 2020 10:13:18 +0900 From: Masami Hiramatsu To: Christoph Hellwig Cc: x86@kernel.org, Alexei Starovoitov , Daniel Borkmann , Linus Torvalds , Andrew Morton , linux-parisc@vger.kernel.org, linux-um@lists.infradead.org, netdev@vger.kernel.org, bpf@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 10/18] maccess: unify the probe kernel arch hooks Message-Id: <20200514101318.1c14647e41b7038b99b91fcd@kernel.org> In-Reply-To: <20200513160038.2482415-11-hch@lst.de> References: <20200513160038.2482415-1-hch@lst.de> <20200513160038.2482415-11-hch@lst.de> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Hi Christoph, On Wed, 13 May 2020 18:00:30 +0200 Christoph Hellwig wrote: > @@ -36,14 +50,20 @@ long __weak probe_kernel_read(void *dst, const void *src, size_t size) > * probe_kernel_read() suitable for use within regions where the caller > * already holds mmap_sem, or other locks which nest inside mmap_sem. > */ > -long __weak probe_kernel_read_strict(void *dst, const void *src, size_t size) > - __attribute__((alias("__probe_kernel_read"))); > +long probe_kernel_read_strict(void *dst, const void *src, size_t size) > +{ > + return __probe_kernel_read(dst, src, size, true); > +} > > -long __probe_kernel_read(void *dst, const void *src, size_t size) > +static long __probe_kernel_read(void *dst, const void *src, size_t size, > + bool strict) > { > long ret; > mm_segment_t old_fs = get_fs(); > > + if (!probe_kernel_read_allowed(dst, src, size, strict)) > + return -EFAULT; Could you make this return -ERANGE instead of -EFAULT so that the caller can notice that the address might be user space? Thank you, -- Masami Hiramatsu