From: Kevin Brodsky <kevin.brodsky@arm.com>
To: Brendan Jackman <jackmanb@google.com>,
Borislav Petkov <bp@alien8.de>,
Dave Hansen <dave.hansen@linux.intel.com>,
Peter Zijlstra <peterz@infradead.org>,
Andrew Morton <akpm@linux-foundation.org>,
David Hildenbrand <david@kernel.org>,
Lorenzo Stoakes <lorenzo.stoakes@oracle.com>,
Vlastimil Babka <vbabka@kernel.org>, Wei Xu <weixugc@google.com>,
Johannes Weiner <hannes@cmpxchg.org>, Zi Yan <ziy@nvidia.com>
Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, x86@kernel.org,
rppt@kernel.org, Sumit Garg <sumit.garg@oss.qualcomm.com>,
derkling@google.com, reijiw@google.com,
Will Deacon <will@kernel.org>,
rientjes@google.com, "Kalyazin, Nikita" <kalyazin@amazon.co.uk>,
patrick.roy@linux.dev, "Itazuri, Takahiro" <itazur@amazon.co.uk>,
Andy Lutomirski <luto@kernel.org>,
David Kaplan <david.kaplan@amd.com>,
Thomas Gleixner <tglx@kernel.org>,
Yosry Ahmed <yosry.ahmed@linux.dev>,
Ryan Roberts <ryan.roberts@arm.com>,
Rick Edgecombe <rick.p.edgecombe@intel.com>
Subject: Re: [PATCH RFC 00/19] mm: Add __GFP_UNMAPPED
Date: Fri, 6 Mar 2026 13:31:15 +0100 [thread overview]
Message-ID: <d6db1cc9-6df5-43d7-92b3-bd60707d9538@arm.com> (raw)
In-Reply-To: <DGUZ17MAFAMD.30IHZ1KYDRM5E@google.com>
On 05/03/2026 16:58, Brendan Jackman wrote:
> On Thu Mar 5, 2026 at 2:51 PM UTC, Kevin Brodsky wrote:
>> [...]
>> This approach seems very interesting to me, and I wonder if it could be
>> applied to another use-case.
>>
>> I am working on a security feature to protect page table pages (PTPs)
>> using pkeys [1]. This relies on all PTPs being mapped with a specific
>> pkey (in the direct map). That requires changing a mapping attribute
>> rather than making it invalid, but AFAICT this is essentially the same
>> problem as the one you're trying to solve.
> Yeah, I think so:
>
> 1. The fragmentation issues seem exactly the same.
I believe so.
> 2. The TLB flushing issues are probably also basically the same, I
> assume you need to flush the TLB when you convert a page to use for
> pagetables, and without allocator integration that can happen pretty
> often and in hot paths. Correct?
Indeed. Up until v5 [2] no special allocator was used - the pkey was set
at the page level every time a PTP was allocated or freed. Clearly
suboptimal, and doesn't work at all if large mappings are used due to
the risk of recursion.
>> There are however extra challenges with mapping PTPs with special
>> attributes. The main one, which you mention in patch 17, is that
>> splitting the direct map may require allocating PTPs, which may lead to
>> recursion.
>>
>> [1] introduces a dedicated page table allocator on top of the buddy
>> allocator, which attempts to cache PMD-sized blocks if possible. It
>> ensures that no recursion occurs by using a special flag when allocating
>> PTPs while splitting the direct map, and keeping a reserve of pages
>> specifically for that situation (patch 15 and 24).
> Right, and actually just today someone pointed out mm/execmem.c to me, I
> think execmem_cache_populate() is basically doing the same thing
> (although it's also creating a separate virtual mapping).
Ah interesting I didn't know about that cache. It does have
similarities, and the motivation seems similar too.
>> There is also special
>> handling for early page tables (essentially keeping track of them and
>> setting their pkey once we can split the direct map).
>>
>> Do you think that this freetype infrastructure could be used for that
>> purpose, instead of introducing a layer on top of the buddy allocator?
> Yes!!! 100% definitely, my code certainly solves all your problems...
Almost ;)
>> I
>> expect that much of the special handling for allocating PTPs can be kept
>> separate. Ensuring that protected pages are always available to split
>> the direct map may be difficult though... This is deeply embedded in the
>> allocator I proposed.
> ...Oh, hm, well, um, good point. Thinking aloud a bit...
>
> The way this series dodges the question is (copying from the code
> comments in patch 17 for convenient reading):
>
> 1) - The direct map starts out fully mapped at boot. (This is not really
> * an assumption" as its in direct control of page_alloc.c).
> *
> 2) - Once pages in the direct map are broken down, they are not
> * re-aggregated into larger pages again.
> *
> 3) - Pagetables are never allocated with __GFP_UNMAPPED.
> *
> * Under these assumptions, a pagetable might need to be allocated while
> * _unmapping_ stuff from the direct map during a __GFP_UNMAPPED
> * allocation. But, the allocation of that pagetable never requires
> * allocating a further pagetable.
>
> In other words, we might need to allocate while we allocate (which is
> fine because I have to do locking shenanigans anyway due to x86 TLB
> shootdown requirements), but there's no further recursion after that.
>
> Can we come up with an analogue for protected PTPs? Point 3) is
> the inflexible one, and we obviously can't say "PTPs are never allocated
> as PTPs". But if we invert it and _also_ invert point 1) I think we get
> something that works in principle:
>
> 1) The direct map starts out _fully protected_ (i.e. we treat everything
> as if it's a pagetable at first).
>
> 2) We assume the direct map doesn't get reaggregated once we've broken
> things down to serve PTP allocations
>
> 3) PTPs are always PTPs...
>
> But... this is a bit silly, since what it means is we'll then go through
> ~all the pagetblocks in the system (except the ones that _are_ actually
> used for PTPs) and flip their pkey, breaking down the physmap to
> pageblock granularity as we go. And... if we're gonna do that, we might
> as well just say the physmap has to be at pageblock granularity to begin
> with.
Having to change the pkey of every pageblock when allocating it for
anything but page tables seems rather unreasonable... And in case of
memory pressure, where fragmentation is high, we may not have any
protected pageblock left. The allocator I proposed falls back to order-2
allocations if necessary (which is sufficient to replenish the page
reserve even if PMD+PTE pages are allocated for splitting).
> (Could we do that? Maybe - Mike Rapoport has previously argued that
> physmap fragmentation is not a very big deal, so I guess the question
> is whether we're ready to really lean into that analysis, it would be
> quite painful if it turned out to be wrong).
>
> Another potential "dodge": Is it really important that the PTPs are
> always protected from the very moment they are created?
> Coz this feature still seems pretty useful even if there's an awkward
> fallback case where, under specific memory pressure patterns, we
> temporarily use unprotected pagetables to set up protected pagetables.
> That still makes exploiting a pagetable overwrite an order of magnitude
> harder than before, right? Similar to how there's probably ways to
> exploit bugs if you can get them to race with the intended pagetable
> update paths that flip the pkey register, or if you can get a ROP chain
> to flip that register for you or whatever.
I considered this - I agree that having page tables unprotected inside a
small window may be acceptable, considering that this is hardening and
not bullet-proof isolation. That said, I'm not sure it helps all that
much. You'd need a mechanism to defer setting the pkey for those PTPs.
Once you decide to set the pkey, you may very well end up splitting the
direct map again, deferring new PTPs... This could go on, and every time
fragmentation increases. I think it is really desirable to have that
reserve of pages so that splitting the direct map does not become
recursive (whether deferred or not).
- Kevin
[2]
https://lore.kernel.org/linux-hardening/20250815085512.2182322-1-kevin.brodsky@arm.com/
next prev parent reply other threads:[~2026-03-06 12:31 UTC|newest]
Thread overview: 31+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-02-25 16:34 Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 01/19] x86/mm: split out preallocate_sub_pgd() Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 02/19] x86/mm: Generalize LDT remap into "mm-local region" Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 03/19] x86/tlb: Expose some flush function declarations to modules Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 04/19] x86/mm: introduce the mermap Brendan Jackman
2026-02-27 10:47 ` Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 05/19] mm: KUnit tests for " Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 06/19] mm: introduce for_each_free_list() Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 07/19] mm/page_alloc: don't overload migratetype in find_suitable_fallback() Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 08/19] mm: introduce freetype_t Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 09/19] mm: move migratetype definitions to freetype.h Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 10/19] mm: add definitions for allocating unmapped pages Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 11/19] mm: rejig pageblock mask definitions Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 12/19] mm: encode freetype flags in pageblock flags Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 13/19] mm/page_alloc: remove ifdefs from pindex helpers Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 14/19] mm/page_alloc: separate pcplists by freetype flags Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 15/19] mm/page_alloc: rename ALLOC_NON_BLOCK back to _HARDER Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 16/19] mm/page_alloc: introduce ALLOC_NOBLOCK Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 17/19] mm/page_alloc: implement __GFP_UNMAPPED allocations Brendan Jackman
2026-02-27 10:56 ` Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 18/19] mm/page_alloc: implement __GFP_UNMAPPED|__GFP_ZERO allocations Brendan Jackman
2026-02-27 11:04 ` Brendan Jackman
2026-02-25 16:34 ` [PATCH RFC 19/19] mm: Minimal KUnit tests for some new page_alloc logic Brendan Jackman
2026-03-02 15:36 ` [PATCH RFC 00/19] mm: Add __GFP_UNMAPPED Vlastimil Babka (SUSE)
2026-03-05 11:16 ` Brendan Jackman
2026-03-06 14:41 ` Borislav Petkov
2026-03-05 14:51 ` Kevin Brodsky
2026-03-05 15:58 ` Brendan Jackman
2026-03-06 12:31 ` Kevin Brodsky [this message]
2026-03-06 18:17 ` Mike Rapoport
2026-03-06 17:38 ` Edgecombe, Rick P
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=d6db1cc9-6df5-43d7-92b3-bd60707d9538@arm.com \
--to=kevin.brodsky@arm.com \
--cc=akpm@linux-foundation.org \
--cc=bp@alien8.de \
--cc=dave.hansen@linux.intel.com \
--cc=david.kaplan@amd.com \
--cc=david@kernel.org \
--cc=derkling@google.com \
--cc=hannes@cmpxchg.org \
--cc=itazur@amazon.co.uk \
--cc=jackmanb@google.com \
--cc=kalyazin@amazon.co.uk \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=lorenzo.stoakes@oracle.com \
--cc=luto@kernel.org \
--cc=patrick.roy@linux.dev \
--cc=peterz@infradead.org \
--cc=reijiw@google.com \
--cc=rick.p.edgecombe@intel.com \
--cc=rientjes@google.com \
--cc=rppt@kernel.org \
--cc=ryan.roberts@arm.com \
--cc=sumit.garg@oss.qualcomm.com \
--cc=tglx@kernel.org \
--cc=vbabka@kernel.org \
--cc=weixugc@google.com \
--cc=will@kernel.org \
--cc=x86@kernel.org \
--cc=yosry.ahmed@linux.dev \
--cc=ziy@nvidia.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox