From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.8 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5647CC4338F for ; Wed, 4 Aug 2021 04:33:15 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 02E4760F25 for ; Wed, 4 Aug 2021 04:33:14 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 02E4760F25 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=intel.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kvack.org Received: by kanga.kvack.org (Postfix) id B57278D0026; Wed, 4 Aug 2021 00:32:43 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 897728D002C; Wed, 4 Aug 2021 00:32:43 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 792BC8D0026; Wed, 4 Aug 2021 00:32:43 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0144.hostedemail.com [216.40.44.144]) by kanga.kvack.org (Postfix) with ESMTP id 505138D002A for ; Wed, 4 Aug 2021 00:32:43 -0400 (EDT) Received: from smtpin15.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay05.hostedemail.com (Postfix) with ESMTP id 05258181D46EC for ; Wed, 4 Aug 2021 04:32:43 +0000 (UTC) X-FDA: 78436127406.15.F0A661B Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by imf16.hostedemail.com (Postfix) with ESMTP id 50150F006A8C for ; Wed, 4 Aug 2021 04:32:41 +0000 (UTC) X-IronPort-AV: E=McAfee;i="6200,9189,10065"; a="194125782" X-IronPort-AV: E=Sophos;i="5.84,293,1620716400"; d="scan'208";a="194125782" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Aug 2021 21:32:38 -0700 X-IronPort-AV: E=Sophos;i="5.84,293,1620716400"; d="scan'208";a="511702717" Received: from iweiny-desk2.sc.intel.com (HELO localhost) ([10.3.52.147]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Aug 2021 21:32:38 -0700 From: ira.weiny@intel.com To: Dave Hansen , Dan Williams Cc: Ira Weiny , Dave Hansen , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Peter Zijlstra , Andy Lutomirski , "H. Peter Anvin" , Fenghua Yu , Rick Edgecombe , x86@kernel.org, linux-kernel@vger.kernel.org, nvdimm@lists.linux.dev, linux-mm@kvack.org Subject: [PATCH V7 15/18] kmap: Add stray access protection for devmap pages Date: Tue, 3 Aug 2021 21:32:28 -0700 Message-Id: <20210804043231.2655537-16-ira.weiny@intel.com> X-Mailer: git-send-email 2.28.0.rc0.12.gb6a658bd00c9 In-Reply-To: <20210804043231.2655537-1-ira.weiny@intel.com> References: <20210804043231.2655537-1-ira.weiny@intel.com> MIME-Version: 1.0 X-Rspamd-Server: rspam06 X-Rspamd-Queue-Id: 50150F006A8C Authentication-Results: imf16.hostedemail.com; dkim=none; spf=none (imf16.hostedemail.com: domain of ira.weiny@intel.com has no SPF policy when checking 192.55.52.151) smtp.mailfrom=ira.weiny@intel.com; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=intel.com (policy=none) X-Stat-Signature: qn8qrox8586g9spdifwghtzcf7q3jxoj X-HE-Tag: 1628051561-230228 Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: From: Ira Weiny Enable PKS protection for devmap pages. The devmap protection facility wants to co-opt kmap_{local_page,atomic}() to mediate access to PKS protected pages. kmap() allows for global mappings to be established, while the PKS facility depends on thread-local access. For this reason kmap() is not supported, but it leaves a policy decision for what to do when kmap() is attempted on a protected devmap page. Neither of the 2 current DAX-capable filesystems (ext4 and xfs) perform such global mappings. The bulk of device drivers that would handle devmap pages are not using kmap(). Any future filesystems that gain DAX support, or device drivers wanting to support devmap protected pages will need to move to kmap_local_page(). In the meantime to handle these kmap() users call pgmap_protection_flag_invalid() to flag and invalid use of any potentially protected pages. This allows better debugging of invalided uses vs catching faults later on when the address is used. Direct-map exposure is already mitigated by default on HIGHMEM systems because by definition HIGHMEM systems do not have large capacities of memory in the direct map. Therefore, to reduce complexity HIGHMEM systems are not supported. Cc: Dan Williams Cc: Dave Hansen Signed-off-by: Ira Weiny --- include/linux/highmem-internal.h | 5 +++++ mm/Kconfig | 1 + 2 files changed, 6 insertions(+) diff --git a/include/linux/highmem-internal.h b/include/linux/highmem-int= ernal.h index 7902c7d8b55f..f88bc14a643b 100644 --- a/include/linux/highmem-internal.h +++ b/include/linux/highmem-internal.h @@ -142,6 +142,7 @@ static inline struct page *kmap_to_page(void *addr) static inline void *kmap(struct page *page) { might_sleep(); + pgmap_protection_flag_invalid(page); return page_address(page); } =20 @@ -157,6 +158,7 @@ static inline void kunmap(struct page *page) =20 static inline void *kmap_local_page(struct page *page) { + pgmap_mk_readwrite(page); return page_address(page); } =20 @@ -175,12 +177,14 @@ static inline void __kunmap_local(void *addr) #ifdef ARCH_HAS_FLUSH_ON_KUNMAP kunmap_flush_on_unmap(addr); #endif + pgmap_mk_noaccess(kmap_to_page(addr)); } =20 static inline void *kmap_atomic(struct page *page) { preempt_disable(); pagefault_disable(); + pgmap_mk_readwrite(page); return page_address(page); } =20 @@ -199,6 +203,7 @@ static inline void __kunmap_atomic(void *addr) #ifdef ARCH_HAS_FLUSH_ON_KUNMAP kunmap_flush_on_unmap(addr); #endif + pgmap_mk_noaccess(kmap_to_page(addr)); pagefault_enable(); preempt_enable(); } diff --git a/mm/Kconfig b/mm/Kconfig index 201d41269a36..4184d0a7531d 100644 --- a/mm/Kconfig +++ b/mm/Kconfig @@ -794,6 +794,7 @@ config DEVMAP_ACCESS_PROTECTION bool "Access protection for memremap_pages()" depends on NVDIMM_PFN depends on ARCH_HAS_SUPERVISOR_PKEYS + depends on !HIGHMEM select GENERAL_PKS_USER default y =20 --=20 2.28.0.rc0.12.gb6a658bd00c9