On Tue, Apr 21, 2026 at 03:33:27PM +0100, Kiryl Shutsemau wrote:
> > 3) Some other stuff needs a second thought, like
> > 
> > diff --git a/mm/gup.c b/mm/gup.c
> > index 8e7dc2c6ee738..08fc18f1290d4 100644
> > --- a/mm/gup.c
> > +++ b/mm/gup.c
> > @@ -695,7 +695,8 @@ static inline bool can_follow_write_pmd(pmd_t pmd, 
> > struct page *page,
> >     /* ... and a write-fault isn't required for other reasons. */
> >     if (pmd_needs_soft_dirty_wp(vma, pmd))
> >             return false;
> > -   return !userfaultfd_huge_pmd_wp(vma, pmd);
> > +   return !userfaultfd_huge_pmd_wp(vma, pmd) &&
> > +          !userfaultfd_huge_pmd_rwp(vma, pmd);
> >  }
> > 
> > How can a pte be writable and prot_none at the same time? Maybe just 
> > confused AI
> > output that you should carefully double check before sending that out 
> > officially.
> 
> Note that this path is for !pmd_write() case to begin with. It serves
> FOLL_FORCE case. I believe this check is correct: we don't want to allow
> to write to such pages even with FOLL_FORCE.
> 
> But looking around, I missed gup_can_follow_protnone() modification. It
> has to return false for RWP.

With gup_can_follow_protnone() fixed, the checks in
can_follow_write_pmd/pte() are redundant. Will drop them.

-- 
  Kiryl Shutsemau / Kirill A. Shutemov

Reply via email to