]> www.infradead.org Git - users/jedix/linux-maple.git/commitdiff
mm: avoid zeroing user movable page twice with init_on_alloc=1
authorZi Yan <ziy@nvidia.com>
Fri, 11 Oct 2024 15:03:04 +0000 (11:03 -0400)
committerAndrew Morton <akpm@linux-foundation.org>
Fri, 1 Nov 2024 04:29:07 +0000 (21:29 -0700)
Commit 6471384af2a6 ("mm: security: introduce init_on_alloc=1 and
init_on_free=1 boot options") forces allocated page to be zeroed in
post_alloc_hook() when init_on_alloc=1.

For order-0 folios, if arch does not define
vma_alloc_zeroed_movable_folio(), the default implementation again zeros
the page return from the buddy allocator.  So the page is zeroed twice.
Fix it by passing __GFP_ZERO instead to avoid double page zeroing.  At the
moment, s390,arm64,x86,alpha,m68k are not impacted since they define their
own vma_alloc_zeroed_movable_folio().

For >0 order folios (mTHP and PMD THP), folio_zero_user() is called to
zero the folio again.  Fix it by calling folio_zero_user() only if
init_on_alloc is set.  All arch are impacted.

Add alloc_zeroed() helper to encapsulate the init_on_alloc check.

Link: https://lkml.kernel.org/r/20241011150304.709590-1-ziy@nvidia.com
Signed-off-by: Zi Yan <ziy@nvidia.com>
Acked-by: Vlastimil Babka <vbabka@suse.cz>
Acked-by: David Hildenbrand <david@redhat.com>
Cc: Alexander Potapenko <glider@google.com>
Cc: "Huang, Ying" <ying.huang@intel.com>
Cc: John Hubbard <jhubbard@nvidia.com>
Cc: Kees Cook <keescook@chromium.org>
Cc: Kefeng Wang <wangkefeng.wang@huawei.com>
Cc: Matthew Wilcox <willy@infradead.org>
Cc: Miaohe Lin <linmiaohe@huawei.com>
Cc: Ryan Roberts <ryan.roberts@arm.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
include/linux/highmem.h
mm/huge_memory.c
mm/internal.h
mm/memory.c

index bec9bd715acf91cb41988464669635794f9bcfa8..6e452bd8e7e364946764e0da3d5363ee2e109349 100644 (file)
@@ -224,13 +224,7 @@ static inline
 struct folio *vma_alloc_zeroed_movable_folio(struct vm_area_struct *vma,
                                   unsigned long vaddr)
 {
-       struct folio *folio;
-
-       folio = vma_alloc_folio(GFP_HIGHUSER_MOVABLE, 0, vma, vaddr);
-       if (folio)
-               clear_user_highpage(&folio->page, vaddr);
-
-       return folio;
+       return vma_alloc_folio(GFP_HIGHUSER_MOVABLE | __GFP_ZERO, 0, vma, vaddr);
 }
 #endif
 
index afcdcbd48f66c31cd9c3f5036637e18692a2bb9a..8d4ab7cf80393fcdb932274d8a1480187e45ee4b 100644 (file)
@@ -1165,7 +1165,8 @@ static struct folio *vma_alloc_anon_folio_pmd(struct vm_area_struct *vma,
        }
        folio_throttle_swaprate(folio, gfp);
 
-       folio_zero_user(folio, addr);
+       if (!alloc_zeroed())
+               folio_zero_user(folio, addr);
        /*
         * The memory barrier inside __folio_mark_uptodate makes sure that
         * folio_zero_user writes become visible before the set_pmd_at()
index da29b9c164f0cc7dd9b022053d376dd2bdd1711a..72048d60d96aef41f20f5b354ccfc47466fcdcce 100644 (file)
@@ -1277,6 +1277,12 @@ void touch_pud(struct vm_area_struct *vma, unsigned long addr,
 void touch_pmd(struct vm_area_struct *vma, unsigned long addr,
               pmd_t *pmd, bool write);
 
+static inline bool alloc_zeroed(void)
+{
+       return static_branch_maybe(CONFIG_INIT_ON_ALLOC_DEFAULT_ON,
+                       &init_on_alloc);
+}
+
 enum {
        /* mark page accessed */
        FOLL_TOUCH = 1 << 16,
index c51bc45a70099533afccb982553d6072dca278cc..5c503a4a95a9ecb8794ba2bee7b415c3bd410ba7 100644 (file)
@@ -4719,7 +4719,8 @@ static struct folio *alloc_anon_folio(struct vm_fault *vmf)
                                goto next;
                        }
                        folio_throttle_swaprate(folio, gfp);
-                       folio_zero_user(folio, vmf->address);
+                       if (!alloc_zeroed())
+                               folio_zero_user(folio, vmf->address);
                        return folio;
                }
 next: