On 12/14/2017 06:37 AM, Peter Zijlstra wrote: > I'm also looking at pte_access_permitted() in handle_pte_fault(); that > looks very dodgy to me. How does that not result in endlessly CoW'ing > the same page over and over when we have a PKEY disallowing write access > on that page? I'm not seeing the pte_access_permitted() in handle_pte_fault(). I assume that's something you added in this series. But, one of the ways that we keep pkeys from causing these kinds of repeating loops when interacting with other things is this hunk in the page fault code: > static inline int > access_error(unsigned long error_code, struct vm_area_struct *vma) > { ... > /* > * Read or write was blocked by protection keys. This is > * always an unconditional error and can never result in > * a follow-up action to resolve the fault, like a COW. > */ > if (error_code & PF_PK) > return 1; That short-circuits the page fault pretty quickly. So, basically, the rule is: if the hardware says you tripped over pkey permissions, you die. We don't try to do anything to the underlying page *before* saying that you die. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>