From patchwork Sun Oct 2 00:23:24 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ira Weiny X-Patchwork-Id: 12996705 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 784F7C43217 for ; Sun, 2 Oct 2022 00:23:36 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id BE00C8D0002; Sat, 1 Oct 2022 20:23:33 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id B8E8B6B0075; Sat, 1 Oct 2022 20:23:33 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A585E8D0002; Sat, 1 Oct 2022 20:23:33 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 7764C6B0074 for ; Sat, 1 Oct 2022 20:23:33 -0400 (EDT) Received: from smtpin30.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 4DEB2140121 for ; Sun, 2 Oct 2022 00:23:33 +0000 (UTC) X-FDA: 79974110706.30.A223B1C Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by imf03.hostedemail.com (Postfix) with ESMTP id C67B120002 for ; Sun, 2 Oct 2022 00:23:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1664670212; x=1696206212; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=eSTT9RCqaAKsDAKHEpxgRwFsvLUWOLIZHfpn9oZ87V8=; b=PKkmlvFvARDlMFc1wqs+EBfozyiCC3NJ746ywLwREZBjdnIn4w0xl9JB QL4GIE/nuCwMdoQaZLFl5mBmf8hqTzKcTxIAvX5NA+S6wPScD2F6gRQDC mnnHNEnPPrEBG03UzujovnPjcJeL+R+SM3RcyXld8xaTylfd2chVXjivi 9TzMBPpRCBxov/i5gZGqGseD2gzUs9/ICjOUYJY4fcrOKBSIMET0DRWnA iMa0C/xjpRYZ6GaVbbd+TM1G7WEFwYvJJBeS8wAxSbltuvRtHj93bTV8h mJmWibPiJR5fzu/0VgzZdXCOttPDD7pyrWpemHw/X2Q31mSQtfkA/H+Ac g==; X-IronPort-AV: E=McAfee;i="6500,9779,10487"; a="303336308" X-IronPort-AV: E=Sophos;i="5.93,361,1654585200"; d="scan'208";a="303336308" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Oct 2022 17:23:32 -0700 X-IronPort-AV: E=McAfee;i="6500,9779,10487"; a="656347038" X-IronPort-AV: E=Sophos;i="5.93,361,1654585200"; d="scan'208";a="656347038" Received: from iweiny-desk3.amr.corp.intel.com (HELO localhost) ([10.213.181.73]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Oct 2022 17:23:31 -0700 From: ira.weiny@intel.com To: Jens Wiklander , Sumit Garg , Andrew Morton Cc: Ira Weiny , Al Viro , "Fabio M. De Francesco" , Christoph Hellwig , Linus Torvalds , op-tee@lists.trustedfirmware.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: [PATCH 2/4] tee: Remove vmalloc page support Date: Sat, 1 Oct 2022 17:23:24 -0700 Message-Id: <20221002002326.946620-3-ira.weiny@intel.com> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20221002002326.946620-1-ira.weiny@intel.com> References: <20221002002326.946620-1-ira.weiny@intel.com> MIME-Version: 1.0 ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1664670213; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=6M8BnQwKiAh4H7hkE7Tr1T+bve46bp7bpKlNRsJ+3VU=; b=ziBJWAXHLO3NgXYMviolWgRxplmiogWJl/HUaDJ5ccYmHH9ISqNysSoXLmVBZynoQFL63f Ol4hTPV51n5MFmsmoKIHEhRjreHV2Pt6K5omrQ7FDQDyIXFkaHQu5hGOUssXsdl+srSfu9 R3Du9gs3DG8e9mP8N98q7xoSmPWyGZM= ARC-Authentication-Results: i=1; imf03.hostedemail.com; dkim=none ("invalid DKIM record") header.d=intel.com header.s=Intel header.b=PKkmlvFv; spf=pass (imf03.hostedemail.com: domain of ira.weiny@intel.com designates 134.134.136.24 as permitted sender) smtp.mailfrom=ira.weiny@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1664670213; a=rsa-sha256; cv=none; b=bl355UKuwzGnHs5xTPbYAwXIL0ByME6dlTQ+NCDGUiFgpv3bXUfJK6NHBehWHnKPOJMusf LIw0vZJritD+k3UsP+0zZV6MdcnY4+blIdfoSWxIElXTa/PMc4hqfIPiFkXuOLL3Pqt7xg pIaJ8cREPB5EAyHJ+uPgHGNEVaE9TSw= X-Rspam-User: X-Rspamd-Server: rspam12 X-Rspamd-Queue-Id: C67B120002 Authentication-Results: imf03.hostedemail.com; dkim=none ("invalid DKIM record") header.d=intel.com header.s=Intel header.b=PKkmlvFv; spf=pass (imf03.hostedemail.com: domain of ira.weiny@intel.com designates 134.134.136.24 as permitted sender) smtp.mailfrom=ira.weiny@intel.com; dmarc=pass (policy=none) header.from=intel.com X-Stat-Signature: xpcknbp571tppp8pdieqmdo88abxj3ch X-HE-Tag: 1664670212-266300 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: From: Ira Weiny The kernel pages used by shm_get_kernel_pages() are allocated using GFP_KERNEL through the following call stack: trusted_instantiate() trusted_payload_alloc() -> GFP_KERNEL tee_shm_register_kernel_buf() register_shm_helper() shm_get_kernel_pages() Where is one of: trusted_key_unseal() trusted_key_get_random() trusted_key_seal() Remove the vmalloc page support from shm_get_kernel_pages(). Replace with a warn on once. Cc: Jens Wiklander Cc: Al Viro Cc: "Fabio M. De Francesco" Cc: Christoph Hellwig Cc: Linus Torvalds Signed-off-by: Ira Weiny Reviewed-by: Jens Wiklander --- Jens I went with the suggestion from Linus and Christoph and rejected vmalloc addresses. I did not hear back from you regarding Linus' question if the vmalloc page support was required by an up coming patch set or not. So I assumed it was something out of tree. --- drivers/tee/tee_shm.c | 36 ++++++++++++------------------------ 1 file changed, 12 insertions(+), 24 deletions(-) diff --git a/drivers/tee/tee_shm.c b/drivers/tee/tee_shm.c index 27295bda3e0b..527a6eabc03e 100644 --- a/drivers/tee/tee_shm.c +++ b/drivers/tee/tee_shm.c @@ -24,37 +24,25 @@ static void shm_put_kernel_pages(struct page **pages, size_t page_count) static int shm_get_kernel_pages(unsigned long start, size_t page_count, struct page **pages) { + struct kvec *kiov; size_t n; int rc; - if (is_vmalloc_addr((void *)start)) { - struct page *page; - - for (n = 0; n < page_count; n++) { - page = vmalloc_to_page((void *)(start + PAGE_SIZE * n)); - if (!page) - return -ENOMEM; - - get_page(page); - pages[n] = page; - } - rc = page_count; - } else { - struct kvec *kiov; - - kiov = kcalloc(page_count, sizeof(*kiov), GFP_KERNEL); - if (!kiov) - return -ENOMEM; + if (WARN_ON_ONCE(is_vmalloc_addr((void *)start))) + return -EINVAL; - for (n = 0; n < page_count; n++) { - kiov[n].iov_base = (void *)(start + n * PAGE_SIZE); - kiov[n].iov_len = PAGE_SIZE; - } + kiov = kcalloc(page_count, sizeof(*kiov), GFP_KERNEL); + if (!kiov) + return -ENOMEM; - rc = get_kernel_pages(kiov, page_count, 0, pages); - kfree(kiov); + for (n = 0; n < page_count; n++) { + kiov[n].iov_base = (void *)(start + n * PAGE_SIZE); + kiov[n].iov_len = PAGE_SIZE; } + rc = get_kernel_pages(kiov, page_count, 0, pages); + kfree(kiov); + return rc; }