[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20180704035805.GA9833@redhat.com>
Date: Tue, 3 Jul 2018 23:58:05 -0400
From: Andrea Arcangeli <aarcange@...hat.com>
To: Janosch Frank <frankja@...ux.ibm.com>
Cc: Mike Kravetz <mike.kravetz@...cle.com>,
linux-kernel@...r.kernel.org, viro@...iv.linux.org.uk,
"linux-mm@...ck.org" <linux-mm@...ck.org>,
Andrew Morton <akpm@...ux-foundation.org>
Subject: Re: [PATCH] userfaultfd: hugetlbfs: Fix userfaultfd_huge_must_wait
pte access
Hello,
On Wed, Jun 27, 2018 at 10:47:44AM +0200, Janosch Frank wrote:
> On 26.06.2018 19:00, Mike Kravetz wrote:
> > On 06/26/2018 06:24 AM, Janosch Frank wrote:
> >> Use huge_ptep_get to translate huge ptes to normal ptes so we can
> >> check them with the huge_pte_* functions. Otherwise some architectures
> >> will check the wrong values and will not wait for userspace to bring
> >> in the memory.
> >>
> >> Signed-off-by: Janosch Frank <frankja@...ux.ibm.com>
> >> Fixes: 369cd2121be4 ("userfaultfd: hugetlbfs: userfaultfd_huge_must_wait for hugepmd ranges")
> > Adding linux-mm and Andrew on Cc:
> >
> > Thanks for catching and fixing this.
>
> Sure
> I'd be happy if we get less of these problems with time, this one was
> rather painful to debug. :)
What I thought when I read the fix is it would be more robust and we
could catch any further error like this at build time by having
huge_pte_offset return a new type "hugepte_t *" instead of the current
"pte_t *". Of course then huge_ptep_get() would take a "hugepte_t *" as
parameter. The x86 implementation would then become:
static inline pte_t huge_ptep_get(hugepte_t *ptep)
{
return *(pte_t *)ptep;
}
I haven't tried it, perhaps it's not feasible for other reasons
because there's a significant fallout from such a change (i.e. a lot
of hugetlbfs methods needs to change input type), but you said you're
actively looking to get less of these problems this could be a way if
it can be done, so I should mention it.
The need of huge_ptep_get() of course is very apparent when reading the
fix, but it was all but apparent when reading the previous code and the
previous code was correct for x86 because of course huge_ptep_get is
implemented as *ptep on x86.
For now the current fix is certainly good, any robustness cleanup is
cleaner if done orthogonal anyway.
Thanks!
Andrea
Powered by blists - more mailing lists