LKML Archive on lore.kernel.org help / color / mirror / Atom feed
From: Shuah Khan <shuah@kernel.org> To: Dave Hansen <dave.hansen@linux.intel.com>, linux-kernel@vger.kernel.org Cc: linux-mm@kvack.org, stable@kernel.org, linuxram@us.ibm.com, tglx@linutronix.de, dave.hansen@intel.com, mpe@ellerman.id.au, mingo@kernel.org, akpm@linux-foundation.org, Shuah Khan <shuahkh@osg.samsung.com>, Shuah Khan <shuah@kernel.org> Subject: Re: [PATCH 1/9] x86, pkeys: do not special case protection key 0 Date: Mon, 26 Mar 2018 11:47:26 -0600 [thread overview] Message-ID: <9c2de5f6-d9e2-3647-7aa8-86102e9fa6c3@kernel.org> (raw) In-Reply-To: <20180326172722.8CC08307@viggo.jf.intel.com> On 03/26/2018 11:27 AM, Dave Hansen wrote: > From: Dave Hansen <dave.hansen@linux.intel.com> > > mm_pkey_is_allocated() treats pkey 0 as unallocated. That is > inconsistent with the manpages, and also inconsistent with > mm->context.pkey_allocation_map. Stop special casing it and only > disallow values that are actually bad (< 0). > > The end-user visible effect of this is that you can now use > mprotect_pkey() to set pkey=0. > > This is a bit nicer than what Ram proposed because it is simpler > and removes special-casing for pkey 0. On the other hand, it does > allow applciations to pkey_free() pkey-0, but that's just a silly applications - typo. > thing to do, so we are not going to protect against it. If you plan to compare proposals, it would be nicer to include the details of what Ram proposed as well in the commit log or link to the discussion. Also what happens "pkey_free() pkey-0" - can you elaborate more on that "silliness consequences" > > Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com> > Fixes: 58ab9a088dda ("x86/pkeys: Check against max pkey to avoid overflows") > Cc: stable@kernel.org > Cc: Ram Pai <linuxram@us.ibm.com> > Cc: Thomas Gleixner <tglx@linutronix.de> > Cc: Dave Hansen <dave.hansen@intel.com> > Cc: Michael Ellermen <mpe@ellerman.id.au> > Cc: Ingo Molnar <mingo@kernel.org> > Cc: Andrew Morton <akpm@linux-foundation.org>p > Cc: Shuah Khan <shuah@kernel.org> > --- > > b/arch/x86/include/asm/mmu_context.h | 2 +- > b/arch/x86/include/asm/pkeys.h | 6 +++--- > 2 files changed, 4 insertions(+), 4 deletions(-) > > diff -puN arch/x86/include/asm/mmu_context.h~x86-pkey-0-default-allocated arch/x86/include/asm/mmu_context.h > --- a/arch/x86/include/asm/mmu_context.h~x86-pkey-0-default-allocated 2018-03-26 10:22:33.742170197 -0700 > +++ b/arch/x86/include/asm/mmu_context.h 2018-03-26 10:22:33.747170197 -0700 > @@ -192,7 +192,7 @@ static inline int init_new_context(struc > > #ifdef CONFIG_X86_INTEL_MEMORY_PROTECTION_KEYS > if (cpu_feature_enabled(X86_FEATURE_OSPKE)) { > - /* pkey 0 is the default and always allocated */ > + /* pkey 0 is the default and allocated implicitly */ > mm->context.pkey_allocation_map = 0x1; > /* -1 means unallocated or invalid */ > mm->context.execute_only_pkey = -1; > diff -puN arch/x86/include/asm/pkeys.h~x86-pkey-0-default-allocated arch/x86/include/asm/pkeys.h > --- a/arch/x86/include/asm/pkeys.h~x86-pkey-0-default-allocated 2018-03-26 10:22:33.744170197 -0700 > +++ b/arch/x86/include/asm/pkeys.h 2018-03-26 10:22:33.747170197 -0700 > @@ -49,10 +49,10 @@ bool mm_pkey_is_allocated(struct mm_stru > { > /* > * "Allocated" pkeys are those that have been returned > - * from pkey_alloc(). pkey 0 is special, and never > - * returned from pkey_alloc(). > + * from pkey_alloc() or pkey 0 which is allocated > + * implicitly when the mm is created. > */ > - if (pkey <= 0) > + if (pkey < 0) > return false; > if (pkey >= arch_max_pkey()) > return false; > _ > thanks, -- Shuah
next prev parent reply other threads:[~2018-03-26 17:49 UTC|newest] Thread overview: 28+ messages / expand[flat|nested] mbox.gz Atom feed top 2018-03-26 17:27 [PATCH 0/9] [v2] x86, pkeys: two protection keys bug fixes Dave Hansen 2018-03-26 17:27 ` [PATCH 1/9] x86, pkeys: do not special case protection key 0 Dave Hansen 2018-03-26 17:47 ` Shuah Khan [this message] 2018-03-26 17:53 ` Dave Hansen 2018-03-26 17:58 ` Shuah Khan 2018-03-26 17:27 ` [PATCH 2/9] x86, pkeys, selftests: save off 'prot' for allocations Dave Hansen 2018-03-26 17:27 ` [PATCH 3/9] x86, pkeys, selftests: add a test for pkey 0 Dave Hansen 2018-03-26 17:27 ` [PATCH 4/9] x86, pkeys: override pkey when moving away from PROT_EXEC Dave Hansen 2018-04-07 0:09 ` Ram Pai 2018-04-07 0:47 ` Dave Hansen 2018-04-07 1:09 ` Ram Pai 2018-04-26 17:57 ` Dave Hansen 2018-04-30 7:51 ` Ram Pai 2018-04-30 16:36 ` Dave Hansen 2018-04-25 22:10 ` Shakeel Butt 2018-04-26 8:55 ` Thomas Gleixner 2018-04-26 18:17 ` Dave Hansen 2018-03-26 17:27 ` [PATCH 5/9] x86, pkeys, selftests: fix pointer math Dave Hansen 2018-03-26 17:27 ` [PATCH 6/9] x86, pkeys, selftests: fix pkey exhaustion test off-by-one Dave Hansen 2018-03-26 17:27 ` [PATCH 7/9] x86, pkeys, selftests: factor out "instruction page" Dave Hansen 2018-03-26 17:27 ` [PATCH 8/9] x86, pkeys, selftests: add allow faults on unknown keys Dave Hansen 2018-03-26 17:27 ` [PATCH 9/9] x86, pkeys, selftests: add PROT_EXEC test Dave Hansen -- strict thread matches above, loose matches on Subject: below -- 2018-04-27 17:45 [PATCH 0/9] [v3] x86, pkeys: two protection keys bug fixes Dave Hansen 2018-04-27 17:45 ` [PATCH 1/9] x86, pkeys: do not special case protection key 0 Dave Hansen 2018-03-23 18:09 [PATCH 0/9] x86, pkeys: two protection keys bug fixes Dave Hansen 2018-03-23 18:09 ` [PATCH 1/9] x86, pkeys: do not special case protection key 0 Dave Hansen 2018-03-26 17:35 ` Ram Pai 2018-03-26 17:39 ` Dave Hansen 2018-03-27 2:27 ` Ram Pai 2018-03-27 4:11 ` Dave Hansen
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=9c2de5f6-d9e2-3647-7aa8-86102e9fa6c3@kernel.org \ --to=shuah@kernel.org \ --cc=akpm@linux-foundation.org \ --cc=dave.hansen@intel.com \ --cc=dave.hansen@linux.intel.com \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-mm@kvack.org \ --cc=linuxram@us.ibm.com \ --cc=mingo@kernel.org \ --cc=mpe@ellerman.id.au \ --cc=shuahkh@osg.samsung.com \ --cc=stable@kernel.org \ --cc=tglx@linutronix.de \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).