lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CA+CK2bDdytE67t=3g9k-yo7dEHf=zWA8T4Ty4J9iKKsYV9g0vQ@mail.gmail.com>
Date:   Mon, 24 Jul 2023 13:17:20 -0400
From:   Pasha Tatashin <pasha.tatashin@...een.com>
To:     Andrew Morton <akpm@...ux-foundation.org>
Cc:     Kemeng Shi <shikemeng@...weicloud.com>, linux-mm@...ck.org,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH 0/8] Remove unused parameters in page_table_check

On Mon, Jul 24, 2023 at 1:02 PM Andrew Morton <akpm@...ux-foundation.org> wrote:
>
> On Sat, 22 Jul 2023 17:48:31 -0400 Pasha Tatashin <pasha.tatashin@...een.com> wrote:
>
> > On Thu, Jul 13, 2023 at 5:25 AM Kemeng Shi <shikemeng@...weicloud.com> wrote:
> > >
> > > Hi all, this series remove unused parameters in functions from
> > > page_table_check. The first 2 patches remove unused mm and addr
> > > parameters in static common functions page_table_check_clear and
> > > page_table_check_set. The last 6 patches remove unused addr parameter
> > > in some externed functions which only need addr for cleaned
> > > page_table_check_clear or page_table_check_set. There is no intended
> > > functional change. Thanks!
> >
> > NAK
> >
> > Both, mm and addr are common arguments that are used for PTE handling
> > in many parts of memory management even when they are not used in
> > every function.
> >
> > Currently, they are not used in page table check, but it is possible
> > we may need to use them in the future when support for other arches or
> > different types of page tables (i.e. extended page table) is added. It
> > is going to be hard to again modify all arch dependent code to add
> > these arguments back.
> >
> > Also, internally at Google we are using these arguments, as we have a
> > module that maps user memory in a way that is incompatible with
> > upstream, and these arguments are used to support this module.
> >
>
> I don't think these are very good arguments for carrying cruft in the
> mainline kernel.
>
> If such an architecture is introduced in the future or if google
> upstreams that module then we can restore one or both of these
> arguments at that time.  This is hardly insurmountable:

There is another argument: as a follow-up to
https://lore.kernel.org/linux-mm/20230722231508.1030269-1-pasha.tatashin@soleen.com/,
I plan to improve the debugging message instead of simple WARN_ON(), I
want to print more information about what went wrong, what it means,
and what was expected behaviour. Having more data about the mm, and
the addr, is going to be useful for this extended warning message.

set_p**_at functions have prototype like this: set_p**_at(mm, addr,
ptep, pte), in these functions mm, and addr are also not used, as they
call something like: set_pte(ptep, pte); directly, yet having access
to mm, and addr is useful during debugging instead of rewriting them
all over the kernel.

Thank you,
Pasha

>
>  arch/arm64/include/asm/pgtable.h | 12 +++---
>  arch/riscv/include/asm/pgtable.h | 12 +++---
>  arch/x86/include/asm/pgtable.h   | 16 ++++----
>  include/linux/page_table_check.h | 66 ++++++++++++--------------------
>  include/linux/pgtable.h          |  6 +--
>  mm/page_table_check.c            | 50 +++++++++---------------
>  6 files changed, 65 insertions(+), 97 deletions(-)
>
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ