From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-io0-f197.google.com (mail-io0-f197.google.com [209.85.223.197]) by kanga.kvack.org (Postfix) with ESMTP id 0278F6B025F for ; Tue, 15 Aug 2017 01:02:16 -0400 (EDT) Received: by mail-io0-f197.google.com with SMTP id c74so2284612iod.4 for ; Mon, 14 Aug 2017 22:02:15 -0700 (PDT) Received: from ozlabs.org (ozlabs.org. [103.22.144.67]) by mx.google.com with ESMTPS id t83si4932914pgb.350.2017.08.14.22.02.14 for (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 14 Aug 2017 22:02:14 -0700 (PDT) From: Michael Ellerman Subject: Re: [PATCH v7 7/9] mm: Add address parameter to arch_validate_prot() In-Reply-To: <2e97b439-dd71-8997-4824-15f2b1f53787@oracle.com> References: <43c120f0cbbebd1398997b9521013ced664e5053.1502219353.git.khalid.aziz@oracle.com> <87tw1flftz.fsf@concordia.ellerman.id.au> <2e97b439-dd71-8997-4824-15f2b1f53787@oracle.com> Date: Tue, 15 Aug 2017 15:02:08 +1000 Message-ID: <877ey5v2y7.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Sender: owner-linux-mm@kvack.org List-ID: To: Khalid Aziz , akpm@linux-foundation.org, benh@kernel.crashing.org, paulus@samba.org, davem@davemloft.net, dave.hansen@linux.intel.com Cc: bsingharora@gmail.com, dja@axtens.net, tglx@linutronix.de, mgorman@suse.de, aarcange@redhat.com, kirill.shutemov@linux.intel.com, heiko.carstens@de.ibm.com, ak@linux.intel.com, linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, sparclinux@vger.kernel.org, Khalid Aziz Khalid Aziz writes: > On 08/10/2017 07:20 AM, Michael Ellerman wrote: >> Khalid Aziz writes: >>=20 >>> A protection flag may not be valid across entire address space and >>> hence arch_validate_prot() might need the address a protection bit is >>> being set on to ensure it is a valid protection flag. For example, sparc >>> processors support memory corruption detection (as part of ADI feature) >>> flag on memory addresses mapped on to physical RAM but not on PFN mapped >>> pages or addresses mapped on to devices. This patch adds address to the >>> parameters being passed to arch_validate_prot() so protection bits can >>> be validated in the relevant context. >>> >>> Signed-off-by: Khalid Aziz >>> Cc: Khalid Aziz >>> --- >>> v7: >>> - new patch >>> >>> arch/powerpc/include/asm/mman.h | 2 +- >>> arch/powerpc/kernel/syscalls.c | 2 +- >>> include/linux/mman.h | 2 +- >>> mm/mprotect.c | 2 +- >>> 4 files changed, 4 insertions(+), 4 deletions(-) >>> >>> diff --git a/arch/powerpc/include/asm/mman.h b/arch/powerpc/include/asm= /mman.h >>> index 30922f699341..bc74074304a2 100644 >>> --- a/arch/powerpc/include/asm/mman.h >>> +++ b/arch/powerpc/include/asm/mman.h >>> @@ -40,7 +40,7 @@ static inline bool arch_validate_prot(unsigned long p= rot) >>> return false; >>> return true; >>> } >>> -#define arch_validate_prot(prot) arch_validate_prot(prot) >>> +#define arch_validate_prot(prot, addr) arch_validate_prot(prot) >>=20 >> This can be simpler, as just: >>=20 >> #define arch_validate_prot arch_validate_prot >>=20 > > Hi Michael, > > Thanks for reviewing! > > My patch expands parameter list for arch_validate_prot() from one to two= =20 > parameters. Existing powerpc version of arch_validate_prot() is written=20 > with one parameter. If I use the above #define, compilation fails with: > > mm/mprotect.c: In function =E2=80=98do_mprotect_pkey=E2=80=99: > mm/mprotect.c:399: error: too many arguments to function=20 > =E2=80=98arch_validate_prot=E2=80=99 > > Another way to solve it would be to add the new addr parameter to=20 > powerpc version of arch_validate_prot() but I chose the less disruptive=20 > solution of tackling it through #define and expanded the existing=20 > #define to include the new parameter. Make sense? Yes, it makes sense. But it's a bit gross. At first glance it looks like our arch_validate_prot() has an incorrect signature. I'd prefer you just updated it to have the correct signature, I think you'll have to change one more line in do_mmap2(). So it's not very intrusive. cheers -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org