Re: [PATCH V2 1/2] mm/debug_vm_pgtable/basic: Add validation for dirtiness after write protect

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 12/2/20 4:46 PM, Steven Price wrote:
> On 01/12/2020 12:19, Anshuman Khandual wrote:
>> This adds validation tests for dirtiness after write protect conversion for
>> each page table level. There are two new separate test types involved here.
>>
>> The first test ensures that a given page table entry does not become dirty
>> after pxx_wrprotect(). This is important for platforms like arm64 which
>> transfers and drops the hardware dirty bit (!PTE_RDONLY) to the software
>> dirty bit while making it an write protected one. This test ensures that
>> no fresh page table entry could be created with hardware dirty bit set.
>> The second test ensures that a given page table entry always preserve the
>> dirty information across pxx_wrprotect().
>>
>> This adds two previously missing PUD level basic tests and while here fixes
>> pxx_wrprotect() related typos in the documentation file.
>>
>> Cc: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
>> Cc: linux-mm@xxxxxxxxx
>> Cc: linux-kernel@xxxxxxxxxxxxxxx
>> Suggested-by: Catalin Marinas <catalin.marinas@xxxxxxx>
>> Signed-off-by: Anshuman Khandual <anshuman.khandual@xxxxxxx>
>> ---
>>   Documentation/vm/arch_pgtable_helpers.rst |  8 ++---
>>   mm/debug_vm_pgtable.c                     | 42 +++++++++++++++++++++++
>>   2 files changed, 46 insertions(+), 4 deletions(-)
>>
>> diff --git a/Documentation/vm/arch_pgtable_helpers.rst b/Documentation/vm/arch_pgtable_helpers.rst
>> index f3591ee3aaa8..552567d863b8 100644
>> --- a/Documentation/vm/arch_pgtable_helpers.rst
>> +++ b/Documentation/vm/arch_pgtable_helpers.rst
>> @@ -50,7 +50,7 @@ PTE Page Table Helpers
>>   +---------------------------+--------------------------------------------------+
>>   | pte_mkwrite               | Creates a writable PTE                           |
>>   +---------------------------+--------------------------------------------------+
>> -| pte_mkwrprotect           | Creates a write protected PTE                    |
>> +| pte_wrprotect             | Creates a write protected PTE                    |
>>   +---------------------------+--------------------------------------------------+
>>   | pte_mkspecial             | Creates a special PTE                            |
>>   +---------------------------+--------------------------------------------------+
>> @@ -120,7 +120,7 @@ PMD Page Table Helpers
>>   +---------------------------+--------------------------------------------------+
>>   | pmd_mkwrite               | Creates a writable PMD                           |
>>   +---------------------------+--------------------------------------------------+
>> -| pmd_mkwrprotect           | Creates a write protected PMD                    |
>> +| pmd_wrprotect             | Creates a write protected PMD                    |
>>   +---------------------------+--------------------------------------------------+
>>   | pmd_mkspecial             | Creates a special PMD                            |
>>   +---------------------------+--------------------------------------------------+
>> @@ -186,7 +186,7 @@ PUD Page Table Helpers
>>   +---------------------------+--------------------------------------------------+
>>   | pud_mkwrite               | Creates a writable PUD                           |
>>   +---------------------------+--------------------------------------------------+
>> -| pud_mkwrprotect           | Creates a write protected PUD                    |
>> +| pud_wrprotect             | Creates a write protected PUD                    |
>>   +---------------------------+--------------------------------------------------+
>>   | pud_mkdevmap              | Creates a ZONE_DEVICE mapped PUD                 |
>>   +---------------------------+--------------------------------------------------+
>> @@ -224,7 +224,7 @@ HugeTLB Page Table Helpers
>>   +---------------------------+--------------------------------------------------+
>>   | huge_pte_mkwrite          | Creates a writable HugeTLB                       |
>>   +---------------------------+--------------------------------------------------+
>> -| huge_pte_mkwrprotect      | Creates a write protected HugeTLB                |
>> +| huge_pte_wrprotect        | Creates a write protected HugeTLB                |
>>   +---------------------------+--------------------------------------------------+
>>   | huge_ptep_get_and_clear   | Clears a HugeTLB                                 |
>>   +---------------------------+--------------------------------------------------+
>> diff --git a/mm/debug_vm_pgtable.c b/mm/debug_vm_pgtable.c
>> index c05d9dcf7891..c6fffea54522 100644
>> --- a/mm/debug_vm_pgtable.c
>> +++ b/mm/debug_vm_pgtable.c
>> @@ -63,6 +63,17 @@ static void __init pte_basic_tests(unsigned long pfn, pgprot_t prot)
>>       pte_t pte = pfn_pte(pfn, prot);
>>         pr_debug("Validating PTE basic\n");
>> +
>> +    /*
>> +     * This test needs to execute right after the given page
>> +     * table entry is created with pfn_pte() to make sure that
>> +     * protection_map[idx] does not have the dirty bit enabled
>> +     * from the beginning. This is particularly important for
>> +     * platforms like arm64 where (!PTE_RDONLY) indicate dirty
>> +     * bit being set.
>> +     */
> 
> Unless I'm seriously mistaken this comment is misleading - the likes of pte_wrprotect() take the PTE *by value* and return the modified version. So none of these tests actually modify the variable 'pte'. So there shouldn't actually be any restrictions on the ordering.
> 
> Or am I missing something?

No, you are right. Seems like I might have confused this for other page
table entry altering tests here (via pointers). Although it might still
be better to have these tests at the beginning as not to miss a freshly
created page table entry. That way the test would not be forgotten and
invalidated, in case the subsequent tests in the function change in the
future. So yes, the there is no restriction on the ordering here, as I
might have mentioned previously.

Looking at the comments again. It still seems to be applicable and valid
as it does not explicitly refer to the restriction on ordering here. It
just stresses on the point that it needs to execute right after creation
to test what was in protection_map[idx].





[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux