From: Andrey Ryabinin <aryabinin@virtuozzo.com>
To: Mark Rutland <mark.rutland@arm.com>
Cc: Catalin Marinas <catalin.marinas@arm.com>,
Will Deacon <will.deacon@arm.com>,
linux-arm-kernel@lists.infradead.org, Yury <yury.norov@gmail.com>,
Alexey Klimov <klimov.linux@gmail.com>,
Arnd Bergmann <arnd@arndb.de>,
linux-mm@kvack.org, Linus Walleij <linus.walleij@linaro.org>,
Ard Biesheuvel <ard.biesheuvel@linaro.org>,
linux-kernel@vger.kernel.org,
David Keitel <dkeitel@codeaurora.org>,
Alexander Potapenko <glider@google.com>,
Dmitry Vyukov <dvyukov@google.com>,
"Suzuki K. Poulose" <Suzuki.Poulose@arm.com>
Subject: Re: [PATCH RFT] arm64: kasan: Make KASAN work with 16K pages + 48 bit VA
Date: Thu, 26 Nov 2015 18:47:36 +0300 [thread overview]
Message-ID: <56572998.9070102@virtuozzo.com> (raw)
In-Reply-To: <20151126144859.GE32343@leverpostej>
On 11/26/2015 05:48 PM, Mark Rutland wrote:
> Hi,
>
> On Thu, Nov 26, 2015 at 04:14:46PM +0300, Andrey Ryabinin wrote:
>> Currently kasan assumes that shadow memory covers one or more entire PGDs.
>> That's not true for 16K pages + 48bit VA space, where PGDIR_SIZE is bigger
>> than the whole shadow memory.
>>
>> This patch tries to fix that case.
>> clear_page_tables() is a new replacement of clear_pgs(). Instead of always
>> clearing pgds it clears top level page table entries that entirely belongs
>> to shadow memory.
>> In addition to 'tmp_pg_dir' we now have 'tmp_pud' which is used to store
>> puds that now might be cleared by clear_page_tables.
>>
>> Reported-by: Suzuki K. Poulose <Suzuki.Poulose@arm.com>
>> Signed-off-by: Andrey Ryabinin <aryabinin@virtuozzo.com>
>> ---
>>
>> *** THIS is not tested with 16k pages ***
>>
>> arch/arm64/mm/kasan_init.c | 87 ++++++++++++++++++++++++++++++++++++++++------
>> 1 file changed, 76 insertions(+), 11 deletions(-)
>>
>> diff --git a/arch/arm64/mm/kasan_init.c b/arch/arm64/mm/kasan_init.c
>> index cf038c7..ea9f92a 100644
>> --- a/arch/arm64/mm/kasan_init.c
>> +++ b/arch/arm64/mm/kasan_init.c
>> @@ -22,6 +22,7 @@
>> #include <asm/tlbflush.h>
>>
>> static pgd_t tmp_pg_dir[PTRS_PER_PGD] __initdata __aligned(PGD_SIZE);
>> +static pud_t tmp_pud[PAGE_SIZE/sizeof(pud_t)] __initdata __aligned(PAGE_SIZE);
>>
>> static void __init kasan_early_pte_populate(pmd_t *pmd, unsigned long addr,
>> unsigned long end)
>> @@ -92,20 +93,84 @@ asmlinkage void __init kasan_early_init(void)
>> {
>> BUILD_BUG_ON(KASAN_SHADOW_OFFSET != KASAN_SHADOW_END - (1UL << 61));
>> BUILD_BUG_ON(!IS_ALIGNED(KASAN_SHADOW_START, PGDIR_SIZE));
>> - BUILD_BUG_ON(!IS_ALIGNED(KASAN_SHADOW_END, PGDIR_SIZE));
>> + BUILD_BUG_ON(!IS_ALIGNED(KASAN_SHADOW_END, PUD_SIZE));
>
> We also assume that even in the shared PUD case, the shadow region falls
> within the same PGD entry, or we would need more than a single tmp_pud.
>
> It would be good to test for that.
>
Something like this:
#define KASAN_SHADOW_SIZE (KASAN_SHADOW_END - KASAN_SHADOW_START)
BUILD_BUG_ON(!IS_ALIGNED(KASAN_SHADOW_END, PGD_SIZE)
&& !((PGDIR_SIZE > KASAN_SHADOW_SIZE)
&& IS_ALIGNED(KASAN_SHADOW_END, PUD_SIZE)));
>> +static void __init clear_puds(pgd_t *pgd, unsigned long addr, unsigned long end)
>> +{
>> + pud_t *pud;
>> + unsigned long next;
>> +
>> + pud = pud_offset(pgd, addr);
>> +
>> + do {
>> + next = pud_addr_end(addr, end);
>> + if (IS_ALIGNED(addr, PUD_SIZE) && end - addr >= PUD_SIZE)
>> + pud_clear(pud);
>
> I think this can just be:
>
> if (next - addr == PUD_SIZE)
> pud_clear(pud);
>
> Given that next can at most be PUD_SIZE from addr, and if so we knwo
> addr is aligned.
>
Right.
>> +
>> + if (!pud_none(*pud))
>> + clear_pmds(pud, addr, next);
>
> I don't understand this. The KASAN shadow region is PUD_SIZE aligned at
> either end, so KASAN should never own a partial pud entry like this.
>
> Regardless, were this case to occur, surely we'd be clearing pmd entries
> in the active page tables? We didn't copy anything at the pmd level.
>
> That doesn't seem right.
>
Just take a look at p?d_clear() macroses, under CONFIG_PGTABLE_LEVELS=2 for example.
pgd_clear() and pud_clear() is nops, and pmd_clear() is actually clears pgd.
I could replace p?d_clear() with set_p?d(p?d, __p?d(0)).
In that case going down to pmds is not needed, set_p?d() macro will do it for us.
...
>> +static void copy_pagetables(void)
>> +{
>> + pgd_t *pgd = tmp_pg_dir + pgd_index(KASAN_SHADOW_START);
>> +
>> + memcpy(tmp_pg_dir, swapper_pg_dir, sizeof(tmp_pg_dir));
>> +
>> /*
>> - * Remove references to kasan page tables from
>> - * swapper_pg_dir. pgd_clear() can't be used
>> - * here because it's nop on 2,3-level pagetable setups
>> + * If kasan shadow shares PGD with other mappings,
>> + * clear_page_tables() will clear puds instead of pgd,
>> + * so we need temporary pud table to keep early shadow mapped.
>> */
>> - for (; start < end; start += PGDIR_SIZE)
>> - set_pgd(pgd_offset_k(start), __pgd(0));
>> + if (PGDIR_SIZE > KASAN_SHADOW_END - KASAN_SHADOW_START) {
>> + pud_t *pud;
>> + pmd_t *pmd;
>> + pte_t *pte;
>> +
>> + memcpy(tmp_pud, pgd_page_vaddr(*pgd), sizeof(tmp_pud));
>> +
>> + pgd_populate(&init_mm, pgd, tmp_pud);
>> + pud = pud_offset(pgd, KASAN_SHADOW_START);
>> + pmd = pmd_offset(pud, KASAN_SHADOW_START);
>> + pud_populate(&init_mm, pud, pmd);
>> + pte = pte_offset_kernel(pmd, KASAN_SHADOW_START);
>> + pmd_populate_kernel(&init_mm, pmd, pte);
>
> I don't understand why we need to do anything below the pud level here.
> We only copy down to the pud level, and we already initialised the
> shared ptes and pmds earlier.
>
> Regardless of this patch, we currently initialise the shared tables
> repeatedly, which is redundant after the first time we initialise them.
> We could improve that.
>
Sure, just pgd_populate() will work here, because this code is only for 16K+48-bit,
which has 4-level pagetables.
But it wouldn't work if 16k+48-bit would have > 4-level.
Because pgd_populate() in nop in such case, so we need to go down to actually set 'tmp_pud'
I just tried to avoid assumptions about number of pagetables levels in that code.
>> + }
>> }
>>
>> static void __init cpu_set_ttbr1(unsigned long ttbr1)
>> @@ -123,16 +188,16 @@ void __init kasan_init(void)
>>
>> /*
>> * We are going to perform proper setup of shadow memory.
>> - * At first we should unmap early shadow (clear_pgds() call bellow).
>> + * At first we should unmap early shadow (clear_page_tables()).
>> * However, instrumented code couldn't execute without shadow memory.
>> * tmp_pg_dir used to keep early shadow mapped until full shadow
>> * setup will be finished.
>> */
>> - memcpy(tmp_pg_dir, swapper_pg_dir, sizeof(tmp_pg_dir));
>> + copy_pagetables();
>> cpu_set_ttbr1(__pa(tmp_pg_dir));
>> flush_tlb_all();
>
> As a heads-up, I will shortly have patches altering the swap of TTBR1,
> as it risks conflicting TLB entries and misses barriers.
>
> Otherwise, we need a dsb(ishst) between the memcpy and writing to the
> TTBR to ensure that the tables are visible to the MMU.
>
Thanks.
> Thanks,
> Mark.
>
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
next prev parent reply other threads:[~2015-11-26 15:47 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-11-26 13:14 [PATCH RFT] arm64: kasan: Make KASAN work with 16K pages + 48 bit VA Andrey Ryabinin
2015-11-26 14:48 ` Mark Rutland
2015-11-26 15:47 ` Andrey Ryabinin [this message]
2015-11-26 16:21 ` Mark Rutland
2015-11-26 16:40 ` Andrey Ryabinin
2015-11-26 17:08 ` Mark Rutland
2015-11-26 16:40 ` Ard Biesheuvel
2015-11-27 8:12 ` Andrey Ryabinin
2015-11-27 9:35 ` Catalin Marinas
2015-11-27 10:02 ` Will Deacon
2015-11-27 10:39 ` Ard Biesheuvel
2015-11-27 14:11 ` Catalin Marinas
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=56572998.9070102@virtuozzo.com \
--to=aryabinin@virtuozzo.com \
--cc=Suzuki.Poulose@arm.com \
--cc=ard.biesheuvel@linaro.org \
--cc=arnd@arndb.de \
--cc=catalin.marinas@arm.com \
--cc=dkeitel@codeaurora.org \
--cc=dvyukov@google.com \
--cc=glider@google.com \
--cc=klimov.linux@gmail.com \
--cc=linus.walleij@linaro.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=mark.rutland@arm.com \
--cc=will.deacon@arm.com \
--cc=yury.norov@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).