From patchwork Tue Mar 21 20:15:32 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ackerley Tng X-Patchwork-Id: 13183218 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8C5D1C76195 for ; Tue, 21 Mar 2023 20:15:49 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id C2B066B007D; Tue, 21 Mar 2023 16:15:48 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id BB2B86B007B; Tue, 21 Mar 2023 16:15:48 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A7B9B6B007D; Tue, 21 Mar 2023 16:15:48 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 9936C6B0078 for ; Tue, 21 Mar 2023 16:15:48 -0400 (EDT) Received: from smtpin29.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 6A058C0192 for ; Tue, 21 Mar 2023 20:15:48 +0000 (UTC) X-FDA: 80594011176.29.F4E2FF5 Received: from mail-pl1-f202.google.com (mail-pl1-f202.google.com [209.85.214.202]) by imf17.hostedemail.com (Postfix) with ESMTP id A8C9E40008 for ; Tue, 21 Mar 2023 20:15:45 +0000 (UTC) Authentication-Results: imf17.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=nkDLVeFO; spf=pass (imf17.hostedemail.com: domain of 3cBAaZAsKCCE79HBOIBVQKDDLLDIB.9LJIFKRU-JJHS79H.LOD@flex--ackerleytng.bounces.google.com designates 209.85.214.202 as permitted sender) smtp.mailfrom=3cBAaZAsKCCE79HBOIBVQKDDLLDIB.9LJIFKRU-JJHS79H.LOD@flex--ackerleytng.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1679429745; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=SASYwsYhAQSqNIE6HUln5R808O00UDaM+ugmJxC1i6Y=; b=SCVN6i0D4EUHxxGRSpMAO+M5/UaRU3NzX55Y7H7wCyQXXnUyhWXfrMSz2ic9hhQwUUFjxN 3sJlafbv9jciu6weu86kazgX/9c6Ir/oLF+3QSNuQ6egrF8uWmj5DaOBuLe1NEGfXdkgHk 44C2zUScKzn0nJD4ra/mstwYT5vmjq4= ARC-Authentication-Results: i=1; imf17.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=nkDLVeFO; spf=pass (imf17.hostedemail.com: domain of 3cBAaZAsKCCE79HBOIBVQKDDLLDIB.9LJIFKRU-JJHS79H.LOD@flex--ackerleytng.bounces.google.com designates 209.85.214.202 as permitted sender) smtp.mailfrom=3cBAaZAsKCCE79HBOIBVQKDDLLDIB.9LJIFKRU-JJHS79H.LOD@flex--ackerleytng.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1679429745; a=rsa-sha256; cv=none; b=7mXkN/7c2VHRp1y/o4e7WuMANPCfyYghDd/txSXDSHAaAORGt7DPJ1ArnqNzzFYUKNqpOc mGnCL6j4duOwrLVZnQro5Kdf/oqTaRUbqhbrvUPl9t1HF1JZxtHnV0C20JNNzL03a0CLPM WkcE8gMKKogHvo/ZfKz+Tmo9csvCbv0= Received: by mail-pl1-f202.google.com with SMTP id p9-20020a170902e74900b001a1c7b2e7afso4745069plf.0 for ; Tue, 21 Mar 2023 13:15:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; t=1679429744; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=SASYwsYhAQSqNIE6HUln5R808O00UDaM+ugmJxC1i6Y=; b=nkDLVeFOEtNHIk2/9xYa/CQ5Y+2ViSmqdwKS37RKpN9fN1MXmDMz1OU9puFW4g8bxR vii0vfViksMKRckdTjgGuQRIZo78lhmcmIzghCZBBHxvW/ndiQpVU4djvbvM+g/7wUMs +h4BMeKpfniUSkYQ2+iXYK1OzQ6Zixd18XxuCFovZYEJjKkL+JZVoFx8wgMxsnNIhhrW cwAnxft2O57Rn97HBOHm6iE115uNcFbAUa0j/WlnnPQnSn42zEaUa3fkNCQ6d75oG0jY i+hqkZSaarDOufSFczQvwQKpFfhRDRSFIn/93xiAf3T7ZrsK4NycMXJEfB2VVpheLbup 9TAw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1679429744; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=SASYwsYhAQSqNIE6HUln5R808O00UDaM+ugmJxC1i6Y=; b=0+YGn5ZikpAFzl1U5vU4fVUeR5I0eWww9lh31JivTHgNsH2KzdoOgr5gHJSxH4EMLP QMGHnTyE5eO/U/Yvd17E5R1wdglE+xjt+91rxq0aureP6zJ0BNvh1UhExeZwZXNhEhji KDqBucBMT1ERWaJuP1lsyIwAlYn7380QnIhvb/iDMWYAQ8S9X32/CtH9ExsI63gybD7t GM3e4kZIXv6U46/XCB4gUGVEho9Vf/+6GWQUYz/2TpyDYrQ2byWtmGPeXkcDopCw67Cv uXNYxjhGNIiNGeA5VzcoThywjF5aJ0gU9N4p/JFCYClde3S3r1kuyf9dXWg6lVXcJO2f e+Sw== X-Gm-Message-State: AO0yUKWFMrwNzkCRsgszR1cKVRs8s4WEF23DAhNxaqhLScjBbIS57+qT oE9L1R4fJ9PlzcFgCCWpLjGmPTzMNtdTvSv60g== X-Google-Smtp-Source: AK7set/HvJzxMftd1uCLemfdr7EZh/avv/uPbf4VraKazWicqnhqmpj6db9AHljzqSRdUL4ivIO6IsbGNBTLA3WbfA== X-Received: from ackerleytng-cloudtop.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:1f5f]) (user=ackerleytng job=sendgmr) by 2002:a17:902:b612:b0:1a0:51f7:7f5a with SMTP id b18-20020a170902b61200b001a051f77f5amr137446pls.13.1679429744410; Tue, 21 Mar 2023 13:15:44 -0700 (PDT) Date: Tue, 21 Mar 2023 20:15:32 +0000 In-Reply-To: Mime-Version: 1.0 References: X-Mailer: git-send-email 2.40.0.rc2.332.ga46443480c-goog Message-ID: <6e800e069c7fc400841b75ea49d1227bd101c1cf.1679428901.git.ackerleytng@google.com> Subject: [RFC PATCH v2 1/2] mm: restrictedmem: Allow userspace to specify mount for memfd_restricted From: Ackerley Tng To: kvm@vger.kernel.org, linux-api@vger.kernel.org, linux-arch@vger.kernel.org, linux-doc@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, qemu-devel@nongnu.org Cc: aarcange@redhat.com, ak@linux.intel.com, akpm@linux-foundation.org, arnd@arndb.de, bfields@fieldses.org, bp@alien8.de, chao.p.peng@linux.intel.com, corbet@lwn.net, dave.hansen@intel.com, david@redhat.com, ddutile@redhat.com, dhildenb@redhat.com, hpa@zytor.com, hughd@google.com, jlayton@kernel.org, jmattson@google.com, joro@8bytes.org, jun.nakajima@intel.com, kirill.shutemov@linux.intel.com, linmiaohe@huawei.com, luto@kernel.org, mail@maciej.szmigiero.name, mhocko@suse.com, michael.roth@amd.com, mingo@redhat.com, naoya.horiguchi@nec.com, pbonzini@redhat.com, qperret@google.com, rppt@kernel.org, seanjc@google.com, shuah@kernel.org, steven.price@arm.com, tabba@google.com, tglx@linutronix.de, vannapurve@google.com, vbabka@suse.cz, vkuznets@redhat.com, wanpengli@tencent.com, wei.w.wang@intel.com, x86@kernel.org, yu.c.zhang@linux.intel.com, Ackerley Tng X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: A8C9E40008 X-Rspam-User: X-Stat-Signature: ndm8ak4watocb75s8ff46ncnxx3hxbmh X-HE-Tag: 1679429745-614087 X-HE-Meta: U2FsdGVkX18GPOxnUNc2s0ZW01r6fYG6Z74A6nXMPB+c4DG/eYLwvLFYbazxQRuonJuW0IaJfRKmxIuEero6QKu1Prf7C/fEtaLdfFNm0vlWxZw/5mYGVYsNCbg+9K9TVdoUPC4ZPE1I8sxLInvFGAOw4h5suYraJArJ/wZeMK67uwKP7QYg2u8HTd/zgD4u+qLC6BxZ5ak9T3ajAEMvF9v1tzlFP6ncl8/6ghmHiwUHJpY6rkn0urtnq4y6UrYHyk7o13vhd7oZJ4m1HqVaCvPwm3X5wwn/Th8/4UPyEhkB4OZdJP6ze15PGAV88qLtwbghjawlhTF6vIvRqa5JnTMIi13QRjTDOhQH4NdoQAv6SIbmJTn8zzPrnY5KXxB+/nJxF1dqidMN6FAocQx+W0gaUWJWabVeM943Aw4F6MQngFFfQrjF3Wx8UPjdBur/3QxfpmZVZUYDzIi+FkmDKh91VmqbVR4o0PcZksgl2iYnnVxyhrOxrz/AnAVPzNGY+rPDgxzGSqHrIPip9Pd8cxWKA/hd7UYUlvack3y6GhVUdL37PAfT2cyFTIm3aOdIhTaQpxcI637EVTA12mXD9aOaQHt2/Q/AhjhCHmssbIJIitMXT+yMCFxy7RkPsVIB+EJ+NNtfTIClEc+MyjVV4gZhcU8hRkCI1yMe53D+9gte5295cMT4HmJPqxGalaYj8LLzWO23rjrtbwOCiqGTflcBoDJH8mNP8kRkVgtPKp3fRcGxnDOfEJ/4oM1BO7Nq6qzWWccYJiE56f2/oGSza1Z68RONURGvpJHQ//wCjJZOMG8LD1XW/TKmoCHVepRVFUUdtwWeeXXVqcUsysXRNZ0xIZDqHKuJ5C7FZpBdFZfU6rxHtKDS1ymE3EpFQ4VHtG3KYsceUiBQUfVlVbt2TBvw6m3ssPRZZrpEGWB/mQl9RoDsvsmzITISR01BOHlHhTApFaMAlTGuTnlrqWf NeC0FVGs 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: By default, the backing shmem file for a restrictedmem fd is created on shmem's kernel space mount. With this patch, an optional tmpfs mount can be specified via an fd, which will be used as the mountpoint for backing the shmem file associated with a restrictedmem fd. This change is modeled after how sys_open() can create an unnamed temporary file in a given directory with O_TMPFILE. This will help restrictedmem fds inherit the properties of the provided tmpfs mounts, for example, hugepage allocation hints, NUMA binding hints, etc. Signed-off-by: Ackerley Tng --- include/linux/syscalls.h | 2 +- include/uapi/linux/restrictedmem.h | 8 ++++ mm/restrictedmem.c | 63 +++++++++++++++++++++++++++--- 3 files changed, 66 insertions(+), 7 deletions(-) create mode 100644 include/uapi/linux/restrictedmem.h diff --git a/include/linux/syscalls.h b/include/linux/syscalls.h index f9e9e0c820c5..a23c4c385cd3 100644 --- a/include/linux/syscalls.h +++ b/include/linux/syscalls.h @@ -1056,7 +1056,7 @@ asmlinkage long sys_memfd_secret(unsigned int flags); asmlinkage long sys_set_mempolicy_home_node(unsigned long start, unsigned long len, unsigned long home_node, unsigned long flags); -asmlinkage long sys_memfd_restricted(unsigned int flags); +asmlinkage long sys_memfd_restricted(unsigned int flags, int mount_fd); /* * Architecture-specific system calls diff --git a/include/uapi/linux/restrictedmem.h b/include/uapi/linux/restrictedmem.h new file mode 100644 index 000000000000..9f108dd1ac4c --- /dev/null +++ b/include/uapi/linux/restrictedmem.h @@ -0,0 +1,8 @@ +/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ +#ifndef _UAPI_LINUX_RESTRICTEDMEM_H +#define _UAPI_LINUX_RESTRICTEDMEM_H + +/* flags for memfd_restricted */ +#define RMFD_TMPFILE 0x0001U + +#endif /* _UAPI_LINUX_RESTRICTEDMEM_H */ diff --git a/mm/restrictedmem.c b/mm/restrictedmem.c index c5d869d8c2d8..4d83b949d84e 100644 --- a/mm/restrictedmem.c +++ b/mm/restrictedmem.c @@ -1,11 +1,12 @@ // SPDX-License-Identifier: GPL-2.0 -#include "linux/sbitmap.h" +#include #include #include #include #include #include #include +#include #include struct restrictedmem { @@ -189,19 +190,20 @@ static struct file *restrictedmem_file_create(struct file *memfd) return file; } -SYSCALL_DEFINE1(memfd_restricted, unsigned int, flags) +static int restrictedmem_create(struct vfsmount *mount) { struct file *file, *restricted_file; int fd, err; - if (flags) - return -EINVAL; - fd = get_unused_fd_flags(0); if (fd < 0) return fd; - file = shmem_file_setup("memfd:restrictedmem", 0, VM_NORESERVE); + if (mount) + file = shmem_file_setup_with_mnt(mount, "memfd:restrictedmem", 0, VM_NORESERVE); + else + file = shmem_file_setup("memfd:restrictedmem", 0, VM_NORESERVE); + if (IS_ERR(file)) { err = PTR_ERR(file); goto err_fd; @@ -223,6 +225,55 @@ SYSCALL_DEFINE1(memfd_restricted, unsigned int, flags) return err; } +static bool is_shmem_mount(struct vfsmount *mnt) +{ + return mnt && mnt->mnt_sb && mnt->mnt_sb->s_magic == TMPFS_MAGIC; +} + +static int restrictedmem_create_from_file(int mount_fd) +{ + int ret; + struct fd f; + struct vfsmount *mnt; + + f = fdget_raw(mount_fd); + if (!f.file) + return -EBADF; + + mnt = f.file->f_path.mnt; + if (!is_shmem_mount(mnt)) { + ret = -EINVAL; + goto out; + } + + ret = mnt_want_write(mnt); + if (unlikely(ret)) + goto out; + + ret = restrictedmem_create(mnt); + + mnt_drop_write(mnt); +out: + fdput(f); + + return ret; +} + +SYSCALL_DEFINE2(memfd_restricted, unsigned int, flags, int, mount_fd) +{ + if (flags & ~RMFD_TMPFILE) + return -EINVAL; + + if (flags == RMFD_TMPFILE) { + if (mount_fd < 0) + return -EINVAL; + + return restrictedmem_create_from_file(mount_fd); + } else { + return restrictedmem_create(NULL); + } +} + int restrictedmem_bind(struct file *file, pgoff_t start, pgoff_t end, struct restrictedmem_notifier *notifier, bool exclusive) { From patchwork Tue Mar 21 20:15:33 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ackerley Tng X-Patchwork-Id: 13183219 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 500BFC6FD20 for ; Tue, 21 Mar 2023 20:15:50 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id C7A066B0078; Tue, 21 Mar 2023 16:15:49 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id BD9AB6B007B; Tue, 21 Mar 2023 16:15:49 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A53706B007E; Tue, 21 Mar 2023 16:15:49 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 903206B0078 for ; Tue, 21 Mar 2023 16:15:49 -0400 (EDT) Received: from smtpin22.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id 5B50BA017C for ; Tue, 21 Mar 2023 20:15:49 +0000 (UTC) X-FDA: 80594011218.22.CE4F09D Received: from mail-pl1-f201.google.com (mail-pl1-f201.google.com [209.85.214.201]) by imf24.hostedemail.com (Postfix) with ESMTP id 72D1118001B for ; Tue, 21 Mar 2023 20:15:46 +0000 (UTC) Authentication-Results: imf24.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=gOamuZL0; dmarc=pass (policy=reject) header.from=google.com; spf=pass (imf24.hostedemail.com: domain of 3chAaZAsKCCM9BJDQKDXSMFFNNFKD.BNLKHMTW-LLJU9BJ.NQF@flex--ackerleytng.bounces.google.com designates 209.85.214.201 as permitted sender) smtp.mailfrom=3chAaZAsKCCM9BJDQKDXSMFFNNFKD.BNLKHMTW-LLJU9BJ.NQF@flex--ackerleytng.bounces.google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1679429747; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=WUxn3KVcBxbFXkgOhZJm8jHzCo14A+URwIfQXLEPszQ=; b=hxCZc0BNl/USBwMHHEu6F6wnBZiIvDLBjwHsLrTwW0PK5rw9vje9h/XKAB4OY5A3FgQcD3 KpOvTdz4QPWfSz8iq7nY07glds2pRL2yRasTMwUXBeg5FeRMkZunt1P+SMj1UGvb3WP/1v 0RiREIWe0eJoaf+crN+ea9S73QR3oQs= ARC-Authentication-Results: i=1; imf24.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=gOamuZL0; dmarc=pass (policy=reject) header.from=google.com; spf=pass (imf24.hostedemail.com: domain of 3chAaZAsKCCM9BJDQKDXSMFFNNFKD.BNLKHMTW-LLJU9BJ.NQF@flex--ackerleytng.bounces.google.com designates 209.85.214.201 as permitted sender) smtp.mailfrom=3chAaZAsKCCM9BJDQKDXSMFFNNFKD.BNLKHMTW-LLJU9BJ.NQF@flex--ackerleytng.bounces.google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1679429747; a=rsa-sha256; cv=none; b=EeeM2CwxQJ1PzSgYMDfceX7EIL4KcvQXZU9IYl5mtl+ecnPOZazmcUxw3thMpwd5OIDAKo Abse5obi10mp1tRQPrO5LfOp1GpJconzXvsSD3zAEHzNp0dSiYGZhckjFPNbsk7osXAE2q qifc1PT+zOFpPbaSEUguUht0R0NY+XU= Received: by mail-pl1-f201.google.com with SMTP id az7-20020a170902a58700b001a0534b4ddbso9467813plb.15 for ; Tue, 21 Mar 2023 13:15:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; t=1679429746; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=WUxn3KVcBxbFXkgOhZJm8jHzCo14A+URwIfQXLEPszQ=; b=gOamuZL09TvaiKBWLNigfj5XfPQ9ZV+G8B5xxWIHP7ReVAgFwkb2mMOqoMmAQj4JA5 a71uvwvqvuhm9Mla+M6MKfVBfAeZv8j+Ais4qiGHYQbdzN04WOFDIvW+KHiX6/6UcG3g krfkQwX/3y0i/lIiZnvQ0cDeDcI7B671x+yj/K+Slq7czkPMQa4ZsYo4hXCLHwgEBbR6 wcEzyW5vDv1w52aGipOfZRkfsbrmcbzAncEZk/uv+Uo6h534K0mNscTMHh24KGiLks3G i+rXSGXGfinc7T1/3sxRE9aQe0lPV9r2mPkO1dm8fdQ094x0CRIh1SLftIFzpGONkFQy Gw5A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1679429746; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=WUxn3KVcBxbFXkgOhZJm8jHzCo14A+URwIfQXLEPszQ=; b=x1DR22z9l1c6JBFtacqZRgAig82CedG/ACCVnd3hgXNWoZBGTLgnn1ZkVUe6gaB9VH yhKjXZIl+jlyg0Qv91DxGaf6R22frouXJ1Q1L0Eowqfj3XWfMG2yt9j9JC5GpOc6/ZP0 Mfho5jILxGvIPeAXlbBvHyD3kUKgPUFN2h26enr2sm7w/zt1umSdzvffFibNdXImZ7Ez pOJOzAsMHZCE+qDenqZJq9WVi2p3O5OqcPzNUmCcNdA4KdERtu1RhykxDErKfRLB080S RU49+wNLERPLw2wy3LxCLr6MbABUfD6xe4GBh7Es4QInrfHdYT+Ww9p2TJWEh8wKGmBR nlgg== X-Gm-Message-State: AO0yUKVoB2GM9mr3ETmPp8ZQX/7pNklaRcik63tPO7zijJhKpydo+E/x pFCLcABxEZDWIGmGyEoewNodRvK1QIThOj9DuQ== X-Google-Smtp-Source: AK7set+dSS5L5IQsR2QM90zFjxvQz3FiYFZP+Sm9POtIwngHMs0+tu5Z0jbahBkmyz+8xgu0gtCE94fpBCegZt4AyQ== X-Received: from ackerleytng-cloudtop.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:1f5f]) (user=ackerleytng job=sendgmr) by 2002:a05:6a00:99d:b0:628:fc:9049 with SMTP id u29-20020a056a00099d00b0062800fc9049mr654427pfg.4.1679429746071; Tue, 21 Mar 2023 13:15:46 -0700 (PDT) Date: Tue, 21 Mar 2023 20:15:33 +0000 In-Reply-To: Mime-Version: 1.0 References: X-Mailer: git-send-email 2.40.0.rc2.332.ga46443480c-goog Message-ID: <4db33a8976193f3eff80dbd4515335c36aeeb416.1679428901.git.ackerleytng@google.com> Subject: [RFC PATCH v2 2/2] selftests: restrictedmem: Check hugepage-ness of shmem file backing restrictedmem fd From: Ackerley Tng To: kvm@vger.kernel.org, linux-api@vger.kernel.org, linux-arch@vger.kernel.org, linux-doc@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, qemu-devel@nongnu.org Cc: aarcange@redhat.com, ak@linux.intel.com, akpm@linux-foundation.org, arnd@arndb.de, bfields@fieldses.org, bp@alien8.de, chao.p.peng@linux.intel.com, corbet@lwn.net, dave.hansen@intel.com, david@redhat.com, ddutile@redhat.com, dhildenb@redhat.com, hpa@zytor.com, hughd@google.com, jlayton@kernel.org, jmattson@google.com, joro@8bytes.org, jun.nakajima@intel.com, kirill.shutemov@linux.intel.com, linmiaohe@huawei.com, luto@kernel.org, mail@maciej.szmigiero.name, mhocko@suse.com, michael.roth@amd.com, mingo@redhat.com, naoya.horiguchi@nec.com, pbonzini@redhat.com, qperret@google.com, rppt@kernel.org, seanjc@google.com, shuah@kernel.org, steven.price@arm.com, tabba@google.com, tglx@linutronix.de, vannapurve@google.com, vbabka@suse.cz, vkuznets@redhat.com, wanpengli@tencent.com, wei.w.wang@intel.com, x86@kernel.org, yu.c.zhang@linux.intel.com, Ackerley Tng X-Rspam-User: X-Rspamd-Server: rspam02 X-Rspamd-Queue-Id: 72D1118001B X-Stat-Signature: 4k1oby8g5s9u88tj8mzababchtjaxt61 X-HE-Tag: 1679429746-966959 X-HE-Meta: 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 6L0dfcxn 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: For memfd_restricted() calls without a userspace mount, the backing file should be the shmem mount in the kernel, and the size of backing pages should be as defined by system-wide shmem configuration. If a userspace mount is provided, the size of backing pages should be as defined in the mount. Signed-off-by: Ackerley Tng --- tools/testing/selftests/Makefile | 1 + .../selftests/restrictedmem/.gitignore | 3 + .../testing/selftests/restrictedmem/Makefile | 15 + .../testing/selftests/restrictedmem/common.c | 9 + .../testing/selftests/restrictedmem/common.h | 8 + .../restrictedmem_hugepage_test.c | 459 ++++++++++++++++++ 6 files changed, 495 insertions(+) create mode 100644 tools/testing/selftests/restrictedmem/.gitignore create mode 100644 tools/testing/selftests/restrictedmem/Makefile create mode 100644 tools/testing/selftests/restrictedmem/common.c create mode 100644 tools/testing/selftests/restrictedmem/common.h create mode 100644 tools/testing/selftests/restrictedmem/restrictedmem_hugepage_test.c diff --git a/tools/testing/selftests/Makefile b/tools/testing/selftests/Makefile index f07aef7c592c..44078eeefb79 100644 --- a/tools/testing/selftests/Makefile +++ b/tools/testing/selftests/Makefile @@ -60,6 +60,7 @@ TARGETS += pstore TARGETS += ptrace TARGETS += openat2 TARGETS += resctrl +TARGETS += restrictedmem TARGETS += rlimits TARGETS += rseq TARGETS += rtc diff --git a/tools/testing/selftests/restrictedmem/.gitignore b/tools/testing/selftests/restrictedmem/.gitignore new file mode 100644 index 000000000000..2581bcc8ff29 --- /dev/null +++ b/tools/testing/selftests/restrictedmem/.gitignore @@ -0,0 +1,3 @@ +# SPDX-License-Identifier: GPL-2.0-only + +restrictedmem_hugepage_test diff --git a/tools/testing/selftests/restrictedmem/Makefile b/tools/testing/selftests/restrictedmem/Makefile new file mode 100644 index 000000000000..8e5378d20226 --- /dev/null +++ b/tools/testing/selftests/restrictedmem/Makefile @@ -0,0 +1,15 @@ +# SPDX-License-Identifier: GPL-2.0 + +CFLAGS = $(KHDR_INCLUDES) +CFLAGS += -Wall -Wstrict-prototypes -Wuninitialized -std=gnu99 + +TEST_GEN_PROGS += restrictedmem_hugepage_test + +include ../lib.mk + +EXTRA_CLEAN = $(OUTPUT)/common.o + +$(OUTPUT)/common.o: common.c + $(CC) $(CFLAGS) $(CPPFLAGS) $(TARGET_ARCH) -c -ffreestanding $< -o $@ + +$(TEST_GEN_PROGS): $(OUTPUT)/common.o diff --git a/tools/testing/selftests/restrictedmem/common.c b/tools/testing/selftests/restrictedmem/common.c new file mode 100644 index 000000000000..03dac843404f --- /dev/null +++ b/tools/testing/selftests/restrictedmem/common.c @@ -0,0 +1,9 @@ +// SPDX-License-Identifier: GPL-2.0-only + +#include +#include + +int memfd_restricted(unsigned int flags, int mount_fd) +{ + return syscall(__NR_memfd_restricted, flags, mount_fd); +} diff --git a/tools/testing/selftests/restrictedmem/common.h b/tools/testing/selftests/restrictedmem/common.h new file mode 100644 index 000000000000..06284ed86baf --- /dev/null +++ b/tools/testing/selftests/restrictedmem/common.h @@ -0,0 +1,8 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ + +#ifndef SELFTESTS_RESTRICTEDMEM_COMMON_H +#define SELFTESTS_RESTRICTEDMEM_COMMON_H + +int memfd_restricted(unsigned int flags, int mount_fd); + +#endif // SELFTESTS_RESTRICTEDMEM_COMMON_H diff --git a/tools/testing/selftests/restrictedmem/restrictedmem_hugepage_test.c b/tools/testing/selftests/restrictedmem/restrictedmem_hugepage_test.c new file mode 100644 index 000000000000..ae37148342fe --- /dev/null +++ b/tools/testing/selftests/restrictedmem/restrictedmem_hugepage_test.c @@ -0,0 +1,459 @@ +// SPDX-License-Identifier: GPL-2.0-only + +#define _GNU_SOURCE /* for O_PATH */ +#define _POSIX_C_SOURCE /* for PATH_MAX */ +#include +#include +#include +#include +#include +#include +#include + +#include "linux/restrictedmem.h" + +#include "common.h" +#include "../kselftest_harness.h" + +/* + * Expect policy to be one of always, within_size, advise, never, + * deny, force + */ +#define POLICY_BUF_SIZE 12 + +static int get_hpage_pmd_size(void) +{ + FILE *fp; + char buf[100]; + char *ret; + int size; + + fp = fopen("/sys/kernel/mm/transparent_hugepage/hpage_pmd_size", "r"); + if (!fp) + return -1; + + ret = fgets(buf, 100, fp); + if (ret != buf) { + size = -1; + goto out; + } + + if (sscanf(buf, "%d\n", &size) != 1) + size = -1; + +out: + fclose(fp); + + return size; +} + +static bool is_valid_shmem_thp_policy(char *policy) +{ + if (strcmp(policy, "always") == 0) + return true; + if (strcmp(policy, "within_size") == 0) + return true; + if (strcmp(policy, "advise") == 0) + return true; + if (strcmp(policy, "never") == 0) + return true; + if (strcmp(policy, "deny") == 0) + return true; + if (strcmp(policy, "force") == 0) + return true; + + return false; +} + +static int get_shmem_thp_policy(char *policy) +{ + FILE *fp; + char buf[100]; + char *left = NULL; + char *right = NULL; + int ret = -1; + + fp = fopen("/sys/kernel/mm/transparent_hugepage/shmem_enabled", "r"); + if (!fp) + return -1; + + if (fgets(buf, 100, fp) != buf) + goto out; + + /* + * Expect shmem_enabled to be of format like "always within_size advise + * [never] deny force" + */ + left = memchr(buf, '[', 100); + if (!left) + goto out; + + right = memchr(buf, ']', 100); + if (!right) + goto out; + + memcpy(policy, left + 1, right - left - 1); + + ret = !is_valid_shmem_thp_policy(policy); + +out: + fclose(fp); + return ret; +} + +static int write_string_to_file(const char *path, const char *string) +{ + FILE *fp; + size_t len = strlen(string); + int ret = -1; + + fp = fopen(path, "w"); + if (!fp) + return ret; + + if (fwrite(string, 1, len, fp) != len) + goto out; + + ret = 0; + +out: + fclose(fp); + return ret; +} + +static int set_shmem_thp_policy(char *policy) +{ + int ret = -1; + /* +1 for newline */ + char to_write[POLICY_BUF_SIZE + 1] = { 0 }; + + if (!is_valid_shmem_thp_policy(policy)) + return ret; + + ret = snprintf(to_write, POLICY_BUF_SIZE + 1, "%s\n", policy); + if (ret != strlen(policy) + 1) + return -1; + + ret = write_string_to_file( + "/sys/kernel/mm/transparent_hugepage/shmem_enabled", to_write); + + return ret; +} + +FIXTURE(reset_shmem_enabled) +{ + char shmem_enabled[POLICY_BUF_SIZE]; +}; + +FIXTURE_SETUP(reset_shmem_enabled) +{ + memset(self->shmem_enabled, 0, POLICY_BUF_SIZE); + ASSERT_EQ(0, get_shmem_thp_policy(self->shmem_enabled)); +} + +FIXTURE_TEARDOWN(reset_shmem_enabled) +{ + ASSERT_EQ(0, set_shmem_thp_policy(self->shmem_enabled)); +} + +TEST_F(reset_shmem_enabled, restrictedmem_fstat_shmem_enabled_never) +{ + int fd = -1; + struct stat stat; + + ASSERT_EQ(0, set_shmem_thp_policy("never")); + + fd = memfd_restricted(0, -1); + ASSERT_NE(-1, fd); + + ASSERT_EQ(0, fstat(fd, &stat)); + + /* + * st_blksize is set based on the superblock's s_blocksize_bits. For + * shmem, this is set to PAGE_SHIFT + */ + ASSERT_EQ(stat.st_blksize, getpagesize()); + + close(fd); +} + +TEST_F(reset_shmem_enabled, restrictedmem_fstat_shmem_enabled_always) +{ + int fd = -1; + struct stat stat; + + ASSERT_EQ(0, set_shmem_thp_policy("always")); + + fd = memfd_restricted(0, -1); + ASSERT_NE(-1, fd); + + ASSERT_EQ(0, fstat(fd, &stat)); + + ASSERT_EQ(stat.st_blksize, get_hpage_pmd_size()); + + close(fd); +} + +TEST(restrictedmem_tmpfile_invalid_fd) +{ + int fd = memfd_restricted(RMFD_TMPFILE, -2); + + ASSERT_EQ(-1, fd); + ASSERT_EQ(EINVAL, errno); +} + +TEST(restrictedmem_tmpfile_fd_not_a_mount) +{ + int fd = memfd_restricted(RMFD_TMPFILE, STDOUT_FILENO); + + ASSERT_EQ(-1, fd); + ASSERT_EQ(EINVAL, errno); +} + +TEST(restrictedmem_tmpfile_not_tmpfs_mount) +{ + int fd = -1; + int mfd = -1; + + mfd = open("/proc", O_PATH); + ASSERT_NE(-1, mfd); + + fd = memfd_restricted(RMFD_TMPFILE, mfd); + + ASSERT_EQ(-1, fd); + ASSERT_EQ(EINVAL, errno); +} + +FIXTURE(tmpfs_hugepage_sfd) +{ + int sfd; +}; + +FIXTURE_SETUP(tmpfs_hugepage_sfd) +{ + self->sfd = fsopen("tmpfs", 0); + ASSERT_NE(-1, self->sfd); +} + +FIXTURE_TEARDOWN(tmpfs_hugepage_sfd) +{ + close(self->sfd); +} + +TEST_F(tmpfs_hugepage_sfd, restrictedmem_fstat_tmpfs_huge_always) +{ + int ret = -1; + int fd = -1; + int mfd = -1; + struct stat stat; + + fsconfig(self->sfd, FSCONFIG_SET_STRING, "huge", "always", 0); + fsconfig(self->sfd, FSCONFIG_CMD_CREATE, NULL, NULL, 0); + + mfd = fsmount(self->sfd, 0, 0); + ASSERT_NE(-1, mfd); + + fd = memfd_restricted(RMFD_TMPFILE, mfd); + ASSERT_NE(-1, fd); + + /* User can close reference to mount */ + ret = close(mfd); + ASSERT_EQ(0, ret); + + ret = fstat(fd, &stat); + ASSERT_EQ(0, ret); + ASSERT_EQ(stat.st_blksize, get_hpage_pmd_size()); + + close(fd); +} + +TEST_F(tmpfs_hugepage_sfd, restrictedmem_fstat_tmpfs_huge_never) +{ + int ret = -1; + int fd = -1; + int mfd = -1; + struct stat stat; + + fsconfig(self->sfd, FSCONFIG_SET_STRING, "huge", "never", 0); + fsconfig(self->sfd, FSCONFIG_CMD_CREATE, NULL, NULL, 0); + + mfd = fsmount(self->sfd, 0, 0); + ASSERT_NE(-1, mfd); + + fd = memfd_restricted(RMFD_TMPFILE, mfd); + ASSERT_NE(-1, fd); + + /* User can close reference to mount */ + ret = close(mfd); + ASSERT_EQ(0, ret); + + ret = fstat(fd, &stat); + ASSERT_EQ(0, ret); + ASSERT_EQ(stat.st_blksize, getpagesize()); + + close(fd); +} + +static bool directory_exists(const char *path) +{ + struct stat sb; + + return stat(path, &sb) == 0 && S_ISDIR(sb.st_mode); +} + +FIXTURE(tmpfs_hugepage_mount_path) +{ + char *mount_path; +}; + +FIXTURE_SETUP(tmpfs_hugepage_mount_path) +{ + int ret = -1; + + /* /tmp is an FHS-mandated world-writable directory */ + self->mount_path = "/tmp/restrictedmem-selftest-mnt"; + + if (!directory_exists(self->mount_path)) { + ret = mkdir(self->mount_path, 0777); + ASSERT_EQ(0, ret); + } +} + +FIXTURE_TEARDOWN(tmpfs_hugepage_mount_path) +{ + int ret = -1; + + if (!directory_exists(self->mount_path)) + return; + + ret = umount2(self->mount_path, MNT_FORCE); + EXPECT_EQ(0, ret); + if (ret == -1 && errno == EINVAL) + fprintf(stderr, "%s was not mounted\n", self->mount_path); + + ret = rmdir(self->mount_path); + EXPECT_EQ(0, ret); + if (ret == -1) + fprintf(stderr, "rmdir(%s) failed\n", self->mount_path); +} + +/* + * When the restrictedmem's fd is open, a user should not be able to unmount or + * remove the mounted directory + */ +TEST_F(tmpfs_hugepage_mount_path, restrictedmem_umount_rmdir_while_file_open) +{ + int ret = -1; + int fd = -1; + int mfd = -1; + struct stat stat; + + ret = mount("name", self->mount_path, "tmpfs", 0, "huge=always"); + ASSERT_EQ(0, ret); + + mfd = open(self->mount_path, O_PATH); + ASSERT_NE(-1, mfd); + + fd = memfd_restricted(RMFD_TMPFILE, mfd); + ASSERT_NE(-1, fd); + + /* We don't need this reference to the mount anymore */ + ret = close(mfd); + ASSERT_EQ(0, ret); + + /* restrictedmem's fd should still be usable */ + ret = fstat(fd, &stat); + ASSERT_EQ(0, ret); + ASSERT_EQ(stat.st_blksize, get_hpage_pmd_size()); + + /* User should not be able to unmount directory */ + ret = umount2(self->mount_path, MNT_FORCE); + ASSERT_EQ(-1, ret); + ASSERT_EQ(EBUSY, errno); + + ret = rmdir(self->mount_path); + ASSERT_EQ(-1, ret); + ASSERT_EQ(EBUSY, errno); + + close(fd); +} + +/* The fd of a file on the mount can be provided as mount_fd */ +TEST_F(tmpfs_hugepage_mount_path, restrictedmem_provide_fd_of_file) +{ + int ret = -1; + int fd = -1; + int ffd = -1; + char tmp_file_path[PATH_MAX] = { 0 }; + struct stat stat; + + ret = mount("name", self->mount_path, "tmpfs", 0, "huge=always"); + ASSERT_EQ(0, ret); + + snprintf(tmp_file_path, PATH_MAX, "%s/tmp-file", self->mount_path); + ret = write_string_to_file(tmp_file_path, "filler\n"); + ASSERT_EQ(0, ret); + + ffd = open(tmp_file_path, O_RDWR); + ASSERT_NE(-1, ffd); + + fd = memfd_restricted(RMFD_TMPFILE, ffd); + ASSERT_NE(-1, fd); + + /* We don't need this reference anymore */ + ret = close(ffd); + ASSERT_EQ(0, ret); + + ret = fstat(fd, &stat); + ASSERT_EQ(0, ret); + ASSERT_EQ(stat.st_blksize, get_hpage_pmd_size()); + + close(fd); + remove(tmp_file_path); +} + +/* + * The fd of any file on the mount (including subdirectories) can be provided as + * mount_fd + */ +TEST_F(tmpfs_hugepage_mount_path, restrictedmem_provide_fd_of_file_in_subdir) +{ + int ret = -1; + int fd = -1; + int ffd = -1; + char tmp_dir_path[PATH_MAX] = { 0 }; + char tmp_file_path[PATH_MAX] = { 0 }; + struct stat stat; + + ret = mount("name", self->mount_path, "tmpfs", 0, "huge=always"); + ASSERT_EQ(0, ret); + + snprintf(tmp_dir_path, PATH_MAX, "%s/tmp-subdir", self->mount_path); + ret = mkdir(tmp_dir_path, 0777); + ASSERT_EQ(0, ret); + + snprintf(tmp_file_path, PATH_MAX, "%s/tmp-subdir/tmp-file", + self->mount_path); + ret = write_string_to_file(tmp_file_path, "filler\n"); + ASSERT_EQ(0, ret); + + ffd = open(tmp_file_path, O_RDWR); + ASSERT_NE(-1, ffd); + + fd = memfd_restricted(RMFD_TMPFILE, ffd); + ASSERT_NE(-1, fd); + + /* We don't need this reference anymore */ + ret = close(ffd); + ASSERT_EQ(0, ret); + + ret = fstat(fd, &stat); + ASSERT_EQ(0, ret); + ASSERT_EQ(stat.st_blksize, get_hpage_pmd_size()); + + close(fd); + remove(tmp_file_path); + rmdir(tmp_dir_path); +} + +TEST_HARNESS_MAIN