Received: by 2002:a05:6a10:c7c6:0:0:0:0 with SMTP id h6csp2962574pxy; Tue, 3 Aug 2021 21:36:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwvg5cyrTVrc6celZIQTezAm6ZWlr2mDMwYQmkfrenu33ZyHpbq3Obhak9rGKQPoylYHmM/ X-Received: by 2002:a92:c503:: with SMTP id r3mr546ilg.148.1628051763709; Tue, 03 Aug 2021 21:36:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628051763; cv=none; d=google.com; s=arc-20160816; b=JrV4DTH03U4JKO/9io/5I3M+Nl0g8Fs0JGbDwqjd0xwWwtzOtjYRpjk3+wYgS6ecFH GWXGsB819RjW86BvZylssdbE9bMqLmzobmxxA7YWAzvDFLQhx/eRXyk6CpXTCGGttKG9 lNKXXasxl5amcPznvLFmjY+6VM6Q8Kp13JDN83242UNoapHvPPchG7el/pH8Dey7qYlJ xzB65gQbZK1EHo9zX/6KyAY9FTctsYc0wa3r5LsGzRduMz7bVX6+e19IZPf2nPTsYKnN yDWMH68JhmPkJJC6pS2064NaGatXpVlZW7XIa66C/UxpEdzmO/WeSTz7hYl/VKm5j9Wv gdDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=cBhFOJ4FOmMeQTu9i027/Hs48UpK35jgAvDxpu6V8xM=; b=E9sx9KIaUAb77eHQ7tRvNnhzDbs9oOW9JPo+1J+4pfsCBtZZ83Vr4J5d4dLO7nBBvK BcsSNvstFqquhS7u7pT0swnwwGOIIn4zd+EfsNX8Gj6aPFuGl/Pt9k22eMqlOqF0+uhg 5c5HKpl4GBG/XS48yDYg/dTbqzIymD8N4kD026KgiwJSVpY9xSz+wXYWs0IwqzLUUZVd Fy2lPWO5g0EckfNJWWRa52fdmacUu4sTug4/9GCgET8qjkvccAW8Hpztr6J7AdtBR4A9 uF9nxxb1MxwQiwGMgVbZXduNrLPGGoiz6Y9FKq4ic/j2gAFQendsV193QXhNFlvOSPta TV/Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q5si1048162ilt.55.2021.08.03.21.35.51; Tue, 03 Aug 2021 21:36:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235404AbhHDEdr (ORCPT + 99 others); Wed, 4 Aug 2021 00:33:47 -0400 Received: from mga14.intel.com ([192.55.52.115]:41728 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234966AbhHDEcv (ORCPT ); Wed, 4 Aug 2021 00:32:51 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10065"; a="213574631" X-IronPort-AV: E=Sophos;i="5.84,293,1620716400"; d="scan'208";a="213574631" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Aug 2021 21:32:38 -0700 X-IronPort-AV: E=Sophos;i="5.84,293,1620716400"; d="scan'208";a="511702717" Received: from iweiny-desk2.sc.intel.com (HELO localhost) ([10.3.52.147]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Aug 2021 21:32:38 -0700 From: ira.weiny@intel.com To: Dave Hansen , Dan Williams Cc: Ira Weiny , Dave Hansen , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Peter Zijlstra , Andy Lutomirski , "H. Peter Anvin" , Fenghua Yu , Rick Edgecombe , x86@kernel.org, linux-kernel@vger.kernel.org, nvdimm@lists.linux.dev, linux-mm@kvack.org Subject: [PATCH V7 15/18] kmap: Add stray access protection for devmap pages Date: Tue, 3 Aug 2021 21:32:28 -0700 Message-Id: <20210804043231.2655537-16-ira.weiny@intel.com> X-Mailer: git-send-email 2.28.0.rc0.12.gb6a658bd00c9 In-Reply-To: <20210804043231.2655537-1-ira.weiny@intel.com> References: <20210804043231.2655537-1-ira.weiny@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ira Weiny Enable PKS protection for devmap pages. The devmap protection facility wants to co-opt kmap_{local_page,atomic}() to mediate access to PKS protected pages. kmap() allows for global mappings to be established, while the PKS facility depends on thread-local access. For this reason kmap() is not supported, but it leaves a policy decision for what to do when kmap() is attempted on a protected devmap page. Neither of the 2 current DAX-capable filesystems (ext4 and xfs) perform such global mappings. The bulk of device drivers that would handle devmap pages are not using kmap(). Any future filesystems that gain DAX support, or device drivers wanting to support devmap protected pages will need to move to kmap_local_page(). In the meantime to handle these kmap() users call pgmap_protection_flag_invalid() to flag and invalid use of any potentially protected pages. This allows better debugging of invalided uses vs catching faults later on when the address is used. Direct-map exposure is already mitigated by default on HIGHMEM systems because by definition HIGHMEM systems do not have large capacities of memory in the direct map. Therefore, to reduce complexity HIGHMEM systems are not supported. Cc: Dan Williams Cc: Dave Hansen Signed-off-by: Ira Weiny --- include/linux/highmem-internal.h | 5 +++++ mm/Kconfig | 1 + 2 files changed, 6 insertions(+) diff --git a/include/linux/highmem-internal.h b/include/linux/highmem-internal.h index 7902c7d8b55f..f88bc14a643b 100644 --- a/include/linux/highmem-internal.h +++ b/include/linux/highmem-internal.h @@ -142,6 +142,7 @@ static inline struct page *kmap_to_page(void *addr) static inline void *kmap(struct page *page) { might_sleep(); + pgmap_protection_flag_invalid(page); return page_address(page); } @@ -157,6 +158,7 @@ static inline void kunmap(struct page *page) static inline void *kmap_local_page(struct page *page) { + pgmap_mk_readwrite(page); return page_address(page); } @@ -175,12 +177,14 @@ static inline void __kunmap_local(void *addr) #ifdef ARCH_HAS_FLUSH_ON_KUNMAP kunmap_flush_on_unmap(addr); #endif + pgmap_mk_noaccess(kmap_to_page(addr)); } static inline void *kmap_atomic(struct page *page) { preempt_disable(); pagefault_disable(); + pgmap_mk_readwrite(page); return page_address(page); } @@ -199,6 +203,7 @@ static inline void __kunmap_atomic(void *addr) #ifdef ARCH_HAS_FLUSH_ON_KUNMAP kunmap_flush_on_unmap(addr); #endif + pgmap_mk_noaccess(kmap_to_page(addr)); pagefault_enable(); preempt_enable(); } diff --git a/mm/Kconfig b/mm/Kconfig index 201d41269a36..4184d0a7531d 100644 --- a/mm/Kconfig +++ b/mm/Kconfig @@ -794,6 +794,7 @@ config DEVMAP_ACCESS_PROTECTION bool "Access protection for memremap_pages()" depends on NVDIMM_PFN depends on ARCH_HAS_SUPERVISOR_PKEYS + depends on !HIGHMEM select GENERAL_PKS_USER default y -- 2.28.0.rc0.12.gb6a658bd00c9