From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.6 required=3.0 tests=DKIM_INVALID,DKIM_SIGNED, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 593FAC2BD09 for ; Thu, 5 Dec 2019 14:04:18 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 0BC682464D for ; Thu, 5 Dec 2019 14:04:17 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=axtens.net header.i=@axtens.net header.b="Asq26IOS" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 0BC682464D Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=axtens.net Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 8C4556B1087; Thu, 5 Dec 2019 09:04:17 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 875C96B1088; Thu, 5 Dec 2019 09:04:17 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 764756B1089; Thu, 5 Dec 2019 09:04:17 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0042.hostedemail.com [216.40.44.42]) by kanga.kvack.org (Postfix) with ESMTP id 600A66B1087 for ; Thu, 5 Dec 2019 09:04:17 -0500 (EST) Received: from smtpin22.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with SMTP id 05153A8C5 for ; Thu, 5 Dec 2019 14:04:17 +0000 (UTC) X-FDA: 76231257354.22.sugar81_5f591b6e65e2a X-HE-Tag: sugar81_5f591b6e65e2a X-Filterd-Recvd-Size: 9444 Received: from mail-pj1-f65.google.com (mail-pj1-f65.google.com [209.85.216.65]) by imf11.hostedemail.com (Postfix) with ESMTP for ; Thu, 5 Dec 2019 14:04:15 +0000 (UTC) Received: by mail-pj1-f65.google.com with SMTP id w23so1351846pjd.2 for ; Thu, 05 Dec 2019 06:04:14 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axtens.net; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=t4U/eRKLWH+P5sMJLg1gBzVLKge0A2yZRS0R5HxW/2Q=; b=Asq26IOS4TK4UH/qiyh65Rf6Gr9j+ebjMp/2ndN/f+KYSq7JoZhW7CZZ9l0NUtx7F/ D971GvtNwZ9/Qe+xfSy1AxrMHUomDx1ah/2ishZe6/U0/f+D78ScE6nZr2haNxoGneyD 1zGIhbom3N20ZR2ykUs4QpDlxZcovOxbWDBv0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=t4U/eRKLWH+P5sMJLg1gBzVLKge0A2yZRS0R5HxW/2Q=; b=gjsAQPOmOFQQHSSZPhMD8GdIVQLigtkuRitGTgYIjqI/4J8po/P/jGhxnowyoNV/uL HKXblzVgJD1YkVdvmqc0mD3AdKpTsyPwcNgZNuhedej1ByrgvvBqzKiE530zRMIiGn3f S69Y0ebSp0gJHcvQxqFNXsNwRYy+fo4kw8g8uFdIrw5M/D/f2YxQar7vkcd8KX5VmfT0 rlN6KlPV/czFHfwKQwoKQ4EMjyURe5ogmkpNkyTyjCQCt8xEO/2kGs+S+XoDn6OMcqgh HwbWGkqT6hCRcJPY3afJw9N0HFkfjxunMHebiNBrIiXNweBnrzHzZ818icQMSmmYc63F EMxw== X-Gm-Message-State: APjAAAXNgSuKHf859lHL01WcZx5HJYxol+9cw8+9I97/ZAABvuBVooU3 8mfdyizkcI+/Zo2+GG7bPeFCsg== X-Google-Smtp-Source: APXvYqxGnHj16INKJIl3VHlcRQsBG6NIPPJh7U8CsqZ9o1m2ipnW1nsPbtHWYsdeFTLs3zRnM8rE8w== X-Received: by 2002:a17:902:54f:: with SMTP id 73mr9434121plf.213.1575554653485; Thu, 05 Dec 2019 06:04:13 -0800 (PST) Received: from localhost (2001-44b8-111e-5c00-61b9-031c-bed1-3502.static.ipv6.internode.on.net. [2001:44b8:111e:5c00:61b9:31c:bed1:3502]) by smtp.gmail.com with ESMTPSA id q185sm12628423pfq.110.2019.12.05.06.04.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 05 Dec 2019 06:04:12 -0800 (PST) From: Daniel Axtens To: kasan-dev@googlegroups.com, linux-mm@kvack.org, aryabinin@virtuozzo.com, glider@google.com, linux-kernel@vger.kernel.org, dvyukov@google.com Cc: daniel@iogearbox.net, cai@lca.pw, Daniel Axtens Subject: [PATCH 1/3] mm: add apply_to_existing_pages helper Date: Fri, 6 Dec 2019 01:04:05 +1100 Message-Id: <20191205140407.1874-1-dja@axtens.net> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: apply_to_page_range takes an address range, and if any parts of it are not covered by the existing page table hierarchy, it allocates memory to fill them in. In some use cases, this is not what we want - we want to be able to operate exclusively on PTEs that are already in the tables. Add apply_to_existing_pages for this. Adjust the walker functions for apply_to_page_range to take 'create', which switches them between the old and new modes. This will be used in KASAN vmalloc. Signed-off-by: Daniel Axtens --- include/linux/mm.h | 3 ++ mm/memory.c | 131 +++++++++++++++++++++++++++++++++------------ 2 files changed, 99 insertions(+), 35 deletions(-) diff --git a/include/linux/mm.h b/include/linux/mm.h index c97ea3b694e6..f4dba827d76e 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -2621,6 +2621,9 @@ static inline int vm_fault_to_errno(vm_fault_t vm_f= ault, int foll_flags) typedef int (*pte_fn_t)(pte_t *pte, unsigned long addr, void *data); extern int apply_to_page_range(struct mm_struct *mm, unsigned long addre= ss, unsigned long size, pte_fn_t fn, void *data); +extern int apply_to_existing_pages(struct mm_struct *mm, unsigned long a= ddress, + unsigned long size, pte_fn_t fn, + void *data); =20 #ifdef CONFIG_PAGE_POISONING extern bool page_poisoning_enabled(void); diff --git a/mm/memory.c b/mm/memory.c index 606da187d1de..e508ba7e0a19 100644 --- a/mm/memory.c +++ b/mm/memory.c @@ -2021,26 +2021,34 @@ EXPORT_SYMBOL(vm_iomap_memory); =20 static int apply_to_pte_range(struct mm_struct *mm, pmd_t *pmd, unsigned long addr, unsigned long end, - pte_fn_t fn, void *data) + pte_fn_t fn, void *data, bool create) { pte_t *pte; - int err; + int err =3D 0; spinlock_t *uninitialized_var(ptl); =20 - pte =3D (mm =3D=3D &init_mm) ? - pte_alloc_kernel(pmd, addr) : - pte_alloc_map_lock(mm, pmd, addr, &ptl); - if (!pte) - return -ENOMEM; + if (create) { + pte =3D (mm =3D=3D &init_mm) ? + pte_alloc_kernel(pmd, addr) : + pte_alloc_map_lock(mm, pmd, addr, &ptl); + if (!pte) + return -ENOMEM; + } else { + pte =3D (mm =3D=3D &init_mm) ? + pte_offset_kernel(pmd, addr) : + pte_offset_map_lock(mm, pmd, addr, &ptl); + } =20 BUG_ON(pmd_huge(*pmd)); =20 arch_enter_lazy_mmu_mode(); =20 do { - err =3D fn(pte++, addr, data); - if (err) - break; + if (create || !pte_none(*pte)) { + err =3D fn(pte++, addr, data); + if (err) + break; + } } while (addr +=3D PAGE_SIZE, addr !=3D end); =20 arch_leave_lazy_mmu_mode(); @@ -2052,62 +2060,83 @@ static int apply_to_pte_range(struct mm_struct *m= m, pmd_t *pmd, =20 static int apply_to_pmd_range(struct mm_struct *mm, pud_t *pud, unsigned long addr, unsigned long end, - pte_fn_t fn, void *data) + pte_fn_t fn, void *data, bool create) { pmd_t *pmd; unsigned long next; - int err; + int err =3D 0; =20 BUG_ON(pud_huge(*pud)); =20 - pmd =3D pmd_alloc(mm, pud, addr); - if (!pmd) - return -ENOMEM; + if (create) { + pmd =3D pmd_alloc(mm, pud, addr); + if (!pmd) + return -ENOMEM; + } else { + pmd =3D pmd_offset(pud, addr); + } do { next =3D pmd_addr_end(addr, end); - err =3D apply_to_pte_range(mm, pmd, addr, next, fn, data); - if (err) - break; + if (create || !pmd_none_or_clear_bad(pmd)) { + err =3D apply_to_pte_range(mm, pmd, addr, next, fn, data, + create); + if (err) + break; + } } while (pmd++, addr =3D next, addr !=3D end); return err; } =20 static int apply_to_pud_range(struct mm_struct *mm, p4d_t *p4d, unsigned long addr, unsigned long end, - pte_fn_t fn, void *data) + pte_fn_t fn, void *data, bool create) { pud_t *pud; unsigned long next; - int err; + int err =3D 0; =20 - pud =3D pud_alloc(mm, p4d, addr); - if (!pud) - return -ENOMEM; + if (create) { + pud =3D pud_alloc(mm, p4d, addr); + if (!pud) + return -ENOMEM; + } else { + pud =3D pud_offset(p4d, addr); + } do { next =3D pud_addr_end(addr, end); - err =3D apply_to_pmd_range(mm, pud, addr, next, fn, data); - if (err) - break; + if (create || !pud_none_or_clear_bad(pud)) { + err =3D apply_to_pmd_range(mm, pud, addr, next, fn, data, + create); + if (err) + break; + } } while (pud++, addr =3D next, addr !=3D end); return err; } =20 static int apply_to_p4d_range(struct mm_struct *mm, pgd_t *pgd, unsigned long addr, unsigned long end, - pte_fn_t fn, void *data) + pte_fn_t fn, void *data, bool create) { p4d_t *p4d; unsigned long next; - int err; + int err =3D 0; =20 - p4d =3D p4d_alloc(mm, pgd, addr); - if (!p4d) - return -ENOMEM; + if (create) { + p4d =3D p4d_alloc(mm, pgd, addr); + if (!p4d) + return -ENOMEM; + } else { + p4d =3D p4d_offset(pgd, addr); + } do { next =3D p4d_addr_end(addr, end); - err =3D apply_to_pud_range(mm, p4d, addr, next, fn, data); - if (err) - break; + if (create || !p4d_none_or_clear_bad(p4d)) { + err =3D apply_to_pud_range(mm, p4d, addr, next, fn, data, + create); + if (err) + break; + } } while (p4d++, addr =3D next, addr !=3D end); return err; } @@ -2130,7 +2159,7 @@ int apply_to_page_range(struct mm_struct *mm, unsig= ned long addr, pgd =3D pgd_offset(mm, addr); do { next =3D pgd_addr_end(addr, end); - err =3D apply_to_p4d_range(mm, pgd, addr, next, fn, data); + err =3D apply_to_p4d_range(mm, pgd, addr, next, fn, data, true); if (err) break; } while (pgd++, addr =3D next, addr !=3D end); @@ -2139,6 +2168,38 @@ int apply_to_page_range(struct mm_struct *mm, unsi= gned long addr, } EXPORT_SYMBOL_GPL(apply_to_page_range); =20 +/* + * Scan a region of virtual memory, calling a provided function on + * each leaf page table where it exists. + * + * Unlike apply_to_page_range, this does _not_ fill in page tables + * where they are absent. + */ +int apply_to_existing_pages(struct mm_struct *mm, unsigned long addr, + unsigned long size, pte_fn_t fn, void *data) +{ + pgd_t *pgd; + unsigned long next; + unsigned long end =3D addr + size; + int err =3D 0; + + if (WARN_ON(addr >=3D end)) + return -EINVAL; + + pgd =3D pgd_offset(mm, addr); + do { + next =3D pgd_addr_end(addr, end); + if (pgd_none_or_clear_bad(pgd)) + continue; + err =3D apply_to_p4d_range(mm, pgd, addr, next, fn, data, false); + if (err) + break; + } while (pgd++, addr =3D next, addr !=3D end); + + return err; +} +EXPORT_SYMBOL_GPL(apply_to_existing_pages); + /* * handle_pte_fault chooses page fault handler according to an entry whi= ch was * read non-atomically. Before making any commitment, on those architec= tures --=20 2.20.1