lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <9808b76e-a4e7-95d6-35bf-f64ae4628f0a@codeaurora.org>
Date:   Tue, 1 May 2018 12:16:53 +0530
From:   Chintan Pandya <cpandya@...eaurora.org>
To:     Andrew Morton <akpm@...ux-foundation.org>
Cc:     vbabka@...e.cz, labbott@...hat.com, catalin.marinas@....com,
        hannes@...xchg.org, f.fainelli@...il.com, xieyisheng1@...wei.com,
        ard.biesheuvel@...aro.org, richard.weiyang@...il.com,
        byungchul.park@....com, linux-mm@...ck.org,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH v2] mm: vmalloc: Clean up vunmap to avoid pgtable ops
 twice



On 5/1/2018 4:22 AM, Andrew Morton wrote:
> On Mon, 16 Apr 2018 16:29:02 +0530 Chintan Pandya <cpandya@...eaurora.org> wrote:
> 
>> vunmap does page table clear operations twice in the
>> case when DEBUG_PAGEALLOC_ENABLE_DEFAULT is enabled.
>>
>> So, clean up the code as that is unintended.
>>
>> As a perf gain, we save few us. Below ftrace data was
>> obtained while doing 1 MB of vmalloc/vfree on ARM64
>> based SoC *without* this patch applied. After this
>> patch, we can save ~3 us (on 1 extra vunmap_page_range).
>>
>>    CPU  DURATION                  FUNCTION CALLS
>>    |     |   |                     |   |   |   |
>>   6)               |  __vunmap() {
>>   6)               |    vmap_debug_free_range() {
>>   6)   3.281 us    |      vunmap_page_range();
>>   6) + 45.468 us   |    }
>>   6)   2.760 us    |    vunmap_page_range();
>>   6) ! 505.105 us  |  }
> 
> It's been a long time since I looked at the vmap code :(
> 
>> --- a/mm/vmalloc.c
>> +++ b/mm/vmalloc.c
>> @@ -603,26 +603,6 @@ static void unmap_vmap_area(struct vmap_area *va)
>>   	vunmap_page_range(va->va_start, va->va_end);
>>   }
>>   
>> -static void vmap_debug_free_range(unsigned long start, unsigned long end)
>> -{
>> -	/*
>> -	 * Unmap page tables and force a TLB flush immediately if pagealloc
>> -	 * debugging is enabled.  This catches use after free bugs similarly to
>> -	 * those in linear kernel virtual address space after a page has been
>> -	 * freed.
>> -	 *
>> -	 * All the lazy freeing logic is still retained, in order to minimise
>> -	 * intrusiveness of this debugging feature.
>> -	 *
>> -	 * This is going to be *slow* (linear kernel virtual address debugging
>> -	 * doesn't do a broadcast TLB flush so it is a lot faster).
>> -	 */
>> -	if (debug_pagealloc_enabled()) {
>> -		vunmap_page_range(start, end);
>> -		flush_tlb_kernel_range(start, end);
>> -	}
>> -}
>> -
>>   /*
>>    * lazy_max_pages is the maximum amount of virtual address space we gather up
>>    * before attempting to purge with a TLB flush.
>> @@ -756,6 +736,9 @@ static void free_unmap_vmap_area(struct vmap_area *va)
>>   {
>>   	flush_cache_vunmap(va->va_start, va->va_end);
>>   	unmap_vmap_area(va);
>> +	if (debug_pagealloc_enabled())
>> +		flush_tlb_kernel_range(va->va_start, va->va_end);
>> +
>>   	free_vmap_area_noflush(va);
>>   }
>>   
>> @@ -1142,7 +1125,6 @@ void vm_unmap_ram(const void *mem, unsigned int count)
>>   	BUG_ON(!PAGE_ALIGNED(addr));
>>   
>>   	debug_check_no_locks_freed(mem, size);
>> -	vmap_debug_free_range(addr, addr+size);
> 
> This appears to be a functional change: if (count <= VMAP_MAX_ALLOC)
> and we're in debug mode then the
> vunmap_page_range/flush_tlb_kernel_range will no longer be performed.
> Why is this ok?
> 

Yes, you are right. In vb_free(), we do vunmap_page_range() but not
flush_tlb_kernel_range(). I will add this stub for debug benefits and
share v3.

diff --git a/mm/vmalloc.c b/mm/vmalloc.c
index 6729400..781ce02 100644
--- a/mm/vmalloc.c
+++ b/mm/vmalloc.c
@@ -1036,6 +1036,10 @@ static void vb_free(const void *addr, unsigned 
long size)

         vunmap_page_range((unsigned long)addr, (unsigned long)addr + size);

+       if (debug_pagealloc_enabled())
+               flush_tlb_kernel_range((unsigned long)addr,
+                                       (unsigned long)addr + size);
+
         spin_lock(&vb->lock);

         /* Expand dirty range */



>>   	if (likely(count <= VMAP_MAX_ALLOC)) {
>>   		vb_free(mem, size);
>> @@ -1499,7 +1481,6 @@ struct vm_struct *remove_vm_area(const void *addr)
>>   		va->flags |= VM_LAZY_FREE;
>>   		spin_unlock(&vmap_area_lock);
>>   
>> -		vmap_debug_free_range(va->va_start, va->va_end);
>>   		kasan_free_shadow(vm);
>>   		free_unmap_vmap_area(va);
>>   
> 

Chintan
-- 
Qualcomm India Private Limited, on behalf of Qualcomm Innovation Center,
Inc. is a member of the Code Aurora Forum, a Linux Foundation
Collaborative Project

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ