lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 29 Jul 2008 12:00:09 +1000 From: Nick Piggin <nickpiggin@...oo.com.au> To: Jack Steiner <steiner@....com> Cc: Nick Piggin <npiggin@...e.de>, Andrew Morton <akpm@...ux-foundation.org>, Linux Memory Management List <linux-mm@...ck.org>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org> Subject: Re: GRU driver feedback On Tuesday 29 July 2008 03:36, Jack Steiner wrote: > I appreciate the thorough review. The GRU is a complicated device. I > tried to provide comments in the code but I know it is still difficult > to understand. > > You appear to have a pretty good idea of how it works. I've added a > few new comments to the code to make it clearer in a few cases. Hi Jack, Thanks very much for your thorough comments in return. I will take longer to digest them, but quick reply now because you're probably rushing to get things merged... So I think you've resolved all my concerns except one. > > - GRU driver -- gru_intr finds mm to fault pages from, does an "atomic > > pte lookup" which looks up the pte atomically using similar lockless > > pagetable walk from get_user_pages_fast. This only works because it can > > guarantee page table existence by disabling interrupts on the CPU where > > mm is currently running. It looks like atomic pte lookup can be run on > > mms which are not presently running on the local CPU. This would have > > been noticed if it had been using a specialised function in > > arch/*/mm/gup.c, because it would not have provided an mm_struct > > parameter ;) > > Existence of the mm is guaranteed thru an indirect path. The mm > struct cannot go away until the GRU context that caused the interrupt > is unloaded. When the GRU hardware sends an interrupt, it locks the > context & prevents it from being unloaded until the interrupt is > serviced. If the atomic pte is successful, the subsequent TLB dropin > will unlock the context to allow it to be unloaded. The mm can't go > away until the context is unloaded. It is not existence of the mm that I am worried about, but existence of the page tables. get_user_pages_fast works the way it does on x86 because x86's pagetable shootdown and TLB flushing requires that an IPI be sent to all running threads of a process before page tables are freed. So if `current` is one such thread, and wants to do a page table walk of its own mm, then it can guarantee page table existence by turning off interrupts (and so blocking the IPI). This will not work if you are trying to walk down somebody else's page tables because there is nothing to say the processor you are running on will get an IPI. This is why get_user_pages_fast can not work if task != current or mm != current->mm. So I think there is still a problem. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists