lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5b734809fef4d76944490d5ac3ea816f0756b90a.camel@surriel.com>
Date:   Sat, 26 Mar 2022 16:14:54 -0400
From:   Rik van Riel <riel@...riel.com>
To:     Miaohe Lin <linmiaohe@...wei.com>
Cc:     linux-mm@...ck.org, kernel-team@...com,
        Oscar Salvador <osalvador@...e.de>,
        Naoya Horiguchi <naoya.horiguchi@....com>,
        Mel Gorman <mgorman@...e.de>,
        Johannes Weiner <hannes@...xchg.org>,
        Andrew Morton <akpm@...ux-foundation.org>,
        stable@...r.kernel.org, linux-kernel <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] mm,hwpoison: unmap poisoned page before invalidation

On Sat, 2022-03-26 at 15:48 +0800, Miaohe Lin wrote:
> On 2022/3/26 4:14, Rik van Riel wrote:
> > 
> > +++ b/mm/memory.c
> > @@ -3918,14 +3918,18 @@ static vm_fault_t __do_fault(struct
> > vm_fault *vmf)
> >                 return ret;
> >  
> >         if (unlikely(PageHWPoison(vmf->page))) {
> > +               struct page *page = vmf->page;
> >                 vm_fault_t poisonret = VM_FAULT_HWPOISON;
> >                 if (ret & VM_FAULT_LOCKED) {
> > +                       if (page_mapped(page))
> > +                               unmap_mapping_pages(page_mapping(pa
> > ge),
> > +                                                   page->index, 1,
> > false);
> 
> It seems this unmap_mapping_pages also helps the success rate of the
> below invalidate_inode_page.
> 

That is indeed what it is supposed to do.

It isn't fool proof, since you can still end up
with dirty pages that don't get cleaned immediately,
but it seems to turn infinite loops of a program
being killed every time it's started into a more
manageable situation where the task succeeds again
pretty quickly.

> >                         /* Retry if a clean page was removed from
> > the cache. */
> > -                       if (invalidate_inode_page(vmf->page))
> > -                               poisonret = 0;
> > -                       unlock_page(vmf->page);
> > +                       if (invalidate_inode_page(page))
> > +                               poisonret = VM_FAULT_NOPAGE;
> > +                       unlock_page(page);
> >                 }
> > -               put_page(vmf->page);
> > +               put_page(page);
> 
> Do we use page instead of vmf->page just for simplicity? Or there is
> some other concern?
> 

Just a simplification, and not dereferencing the same thing
6 times.

> >                 vmf->page = NULL;
> 
> We return either VM_FAULT_NOPAGE or VM_FAULT_HWPOISON with vmf->page
> = NULL. If any case,
> finish_fault won't be called later. So I think your fix is right.

Want to send in a Reviewed-by or Acked-by? :)

-- 
All Rights Reversed.

Download attachment "signature.asc" of type "application/pgp-signature" (489 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ