Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp6787008pxb; Wed, 17 Feb 2021 13:29:10 -0800 (PST) X-Google-Smtp-Source: ABdhPJy4Ha34B6XwZkQMISDeLdkeD2UszenjXEMrCByhQi+FyqPuo1iV1dzvSGxYUAymn4WI0xsp X-Received: by 2002:aa7:c944:: with SMTP id h4mr751348edt.233.1613597350040; Wed, 17 Feb 2021 13:29:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613597350; cv=none; d=google.com; s=arc-20160816; b=STx0cvzyRh0kWGuz9JAVBF1PE8yZBlf8CMloDvNQsoPFcdWWfiNecgL9mS6+0oeFZX 63uulMYnNKutujJMlU2nWoMlmBe7xeH8jhXSS3g6yulYSQKvwqrM7joAnLg0lVJp4o8n NKhxdlDib8z+8eJRSt/oFGRN/Za9vG07aqJzVn9L8i2GxiVs0A8prZlLYG+d9aJtL1a3 RLWXUz8rteQ2kkWsxADtpF0f6xhYp06rljWM3PavHHrSb4kN1Usga/fqSXtH6mL0bMXL rfEGs12EEHpQysG7MirhVc2VzqC9MvQj/q7UXhmx0VGnXyIgrDka8AosW3X/dkYqAauO LIPg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=d1HW5swS9ZOyvERvBufh4SMfymzI+ErI982WYqgv7a0=; b=woJF7XadxSFh2XR3q1LKTAnqyLBDjcDc7nzvaaXDQZT6yLq3VKVpkhz312VLWiLYyI bmO89sGBR2qRHA5ukNACLBnPqxK6cJ3E2ttG9ZVucNNSSPBTZi3rJYBIqb5u1Rq74Rz3 lVWFUSxEFy9AItJxiBeedIUnMNh0yX4WuKmXfg3eSv2uPcQBfCQ4MqU6fyL5yTj3r+bD HtB4e9k7cUoe0hjcF29aSDF0hJury2ZQp9KLc/iA+Grg9AzGUEto/lhOgZiOspJiAInR n3Xu5Nuqac5/aYoLaB02UZ6wfEQhA2E7pompYEzBFerP2QkpDQTn9FL88R7HhUQRDKGX OpYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=bFUKdexT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z1si2310218ejm.289.2021.02.17.13.28.45; Wed, 17 Feb 2021 13:29:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=bFUKdexT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235073AbhBQUsB (ORCPT + 99 others); Wed, 17 Feb 2021 15:48:01 -0500 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:21087 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231483AbhBQUrw (ORCPT ); Wed, 17 Feb 2021 15:47:52 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1613594783; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=d1HW5swS9ZOyvERvBufh4SMfymzI+ErI982WYqgv7a0=; b=bFUKdexTAhrnjtrGNo6Q14TsHUi3PGTZSSpvLomNCvmniley5OG5BzCiXrLxTRxAajooHN kYyBj7nBAYgoCH+cwsCnP3vwKafyP3fkuaZjfn9yIgh2NcByideKhK+F5tqgzhPEIHHDUG TfOBdSVw+31NjmN7ZGyomZSNWPA7cL4= Received: from mail-qv1-f71.google.com (mail-qv1-f71.google.com [209.85.219.71]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-527-KN6VNXw9NCeA8EUIDyVGug-1; Wed, 17 Feb 2021 15:46:22 -0500 X-MC-Unique: KN6VNXw9NCeA8EUIDyVGug-1 Received: by mail-qv1-f71.google.com with SMTP id d26so10775999qve.7 for ; Wed, 17 Feb 2021 12:46:22 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=d1HW5swS9ZOyvERvBufh4SMfymzI+ErI982WYqgv7a0=; b=jEY6ChQhEvI3cQkWUkFJVETfEBcHk+shLGXRqPcc+U0X9a9hhcG58dnk30EUybaNCN hI+c8bU3esgfoyBHNgGw20NGFClR519d79kvQYpgFeoFloLE8aYUT32gd7tWMUbO8EUl wQLMm4yJTFi9UR7OCcxX420DYrAvYHHjUAy3z5D+tORsIfTzwDrFn6YiNEyLE/cGJt1N hvl0PTif4AoXmmKkJU8xK547S9+Qcd4y1CQZyVoH2fPTnsoBCUZbD9/xin/UFq4Ut6PI 0fKW9dYzchcQGqGbxkRpbIha4Y58JyTP2hU5fXt8wrLmUAfB15WqpYTYOnu867AvfYgH 7PIQ== X-Gm-Message-State: AOAM531ssGgOLQFQI5H9JXZp6MItBCqTGMK5gT9Nh6SNM/eX6V+bHAeH A/nXUO08flSzefM3z2isjkIxPZ6pvJrYdFhJMzlIohInajUOktUodMXtr1Lau4tG/CK2xmoq4U7 cBpviLsgWBQsxgXSnIhPPos5f X-Received: by 2002:a37:ef0a:: with SMTP id j10mr1109543qkk.166.1613594781710; Wed, 17 Feb 2021 12:46:21 -0800 (PST) X-Received: by 2002:a37:ef0a:: with SMTP id j10mr1109517qkk.166.1613594781445; Wed, 17 Feb 2021 12:46:21 -0800 (PST) Received: from xz-x1.redhat.com (bras-vprn-toroon474qw-lp130-20-174-93-89-182.dsl.bell.ca. [174.93.89.182]) by smtp.gmail.com with ESMTPSA id p25sm2354901qkh.79.2021.02.17.12.46.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 17 Feb 2021 12:46:20 -0800 (PST) From: Peter Xu To: linux-mm@kvack.org, linux-kernel@vger.kernel.org Cc: Mike Kravetz , peterx@redhat.com, Mike Rapoport , Andrea Arcangeli , Axel Rasmussen , Matthew Wilcox , "Kirill A . Shutemov" , Andrew Morton Subject: [PATCH v2 2/4] hugetlb/userfaultfd: Forbid huge pmd sharing when uffd enabled Date: Wed, 17 Feb 2021 15:46:17 -0500 Message-Id: <20210217204619.54761-1-peterx@redhat.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20210217204418.54259-1-peterx@redhat.com> References: <20210217204418.54259-1-peterx@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Huge pmd sharing could bring problem to userfaultfd. The thing is that userfaultfd is running its logic based on the special bits on page table entries, however the huge pmd sharing could potentially share page table entries for different address ranges. That could cause issues on either: - When sharing huge pmd page tables for an uffd write protected range, the newly mapped huge pmd range will also be write protected unexpectedly, or, - When we try to write protect a range of huge pmd shared range, we'll first do huge_pmd_unshare() in hugetlb_change_protection(), however that also means the UFFDIO_WRITEPROTECT could be silently skipped for the shared region, which could lead to data loss. Since at it, a few other things are done altogether: - Move want_pmd_share() from mm/hugetlb.c into linux/hugetlb.h, because that's definitely something that arch code would like to use too - ARM64 currently directly check against CONFIG_ARCH_WANT_HUGE_PMD_SHARE when trying to share huge pmd. Switch to the want_pmd_share() helper. Since at it, move vma_shareable() from huge_pmd_share() into want_pmd_share(). Signed-off-by: Peter Xu --- arch/arm64/mm/hugetlbpage.c | 3 +-- include/linux/hugetlb.h | 2 ++ include/linux/userfaultfd_k.h | 9 +++++++++ mm/hugetlb.c | 20 ++++++++++++++------ 4 files changed, 26 insertions(+), 8 deletions(-) diff --git a/arch/arm64/mm/hugetlbpage.c b/arch/arm64/mm/hugetlbpage.c index 6e3bcffe2837..58987a98e179 100644 --- a/arch/arm64/mm/hugetlbpage.c +++ b/arch/arm64/mm/hugetlbpage.c @@ -284,8 +284,7 @@ pte_t *huge_pte_alloc(struct mm_struct *mm, struct vm_area_struct *vma, */ ptep = pte_alloc_map(mm, pmdp, addr); } else if (sz == PMD_SIZE) { - if (IS_ENABLED(CONFIG_ARCH_WANT_HUGE_PMD_SHARE) && - pud_none(READ_ONCE(*pudp))) + if (want_pmd_share(vma, addr) && pud_none(READ_ONCE(*pudp))) ptep = huge_pmd_share(mm, vma, addr, pudp); else ptep = (pte_t *)pmd_alloc(mm, pudp, addr); diff --git a/include/linux/hugetlb.h b/include/linux/hugetlb.h index a6113fa6d21d..bc86f2f516e7 100644 --- a/include/linux/hugetlb.h +++ b/include/linux/hugetlb.h @@ -950,4 +950,6 @@ static inline __init void hugetlb_cma_check(void) } #endif +bool want_pmd_share(struct vm_area_struct *vma, unsigned long addr); + #endif /* _LINUX_HUGETLB_H */ diff --git a/include/linux/userfaultfd_k.h b/include/linux/userfaultfd_k.h index a8e5f3ea9bb2..c63ccdae3eab 100644 --- a/include/linux/userfaultfd_k.h +++ b/include/linux/userfaultfd_k.h @@ -52,6 +52,15 @@ static inline bool is_mergeable_vm_userfaultfd_ctx(struct vm_area_struct *vma, return vma->vm_userfaultfd_ctx.ctx == vm_ctx.ctx; } +/* + * Never enable huge pmd sharing on uffd-wp registered vmas, because uffd-wp + * protect information is per pgtable entry. + */ +static inline bool uffd_disable_huge_pmd_share(struct vm_area_struct *vma) +{ + return vma->vm_flags & VM_UFFD_WP; +} + static inline bool userfaultfd_missing(struct vm_area_struct *vma) { return vma->vm_flags & VM_UFFD_MISSING; diff --git a/mm/hugetlb.c b/mm/hugetlb.c index 07bb9bdc3282..8e8e2f3dfe06 100644 --- a/mm/hugetlb.c +++ b/mm/hugetlb.c @@ -5292,6 +5292,18 @@ static bool vma_shareable(struct vm_area_struct *vma, unsigned long addr) return false; } +bool want_pmd_share(struct vm_area_struct *vma, unsigned long addr) +{ +#ifndef CONFIG_ARCH_WANT_HUGE_PMD_SHARE + return false; +#endif +#ifdef CONFIG_USERFAULTFD + if (uffd_disable_huge_pmd_share(vma)) + return false; +#endif + return vma_shareable(vma, addr); +} + /* * Determine if start,end range within vma could be mapped by shared pmd. * If yes, adjust start and end to cover range associated with possible @@ -5346,9 +5358,6 @@ pte_t *huge_pmd_share(struct mm_struct *mm, struct vm_area_struct *vma, pte_t *pte; spinlock_t *ptl; - if (!vma_shareable(vma, addr)) - return (pte_t *)pmd_alloc(mm, pud, addr); - i_mmap_assert_locked(mapping); vma_interval_tree_foreach(svma, &mapping->i_mmap, idx, idx) { if (svma == vma) @@ -5412,7 +5421,7 @@ int huge_pmd_unshare(struct mm_struct *mm, struct vm_area_struct *vma, *addr = ALIGN(*addr, HPAGE_SIZE * PTRS_PER_PTE) - HPAGE_SIZE; return 1; } -#define want_pmd_share() (1) + #else /* !CONFIG_ARCH_WANT_HUGE_PMD_SHARE */ pte_t *huge_pmd_share(struct mm_struct *mm, struct vm_area_struct vma, unsigned long addr, pud_t *pud) @@ -5430,7 +5439,6 @@ void adjust_range_if_pmd_sharing_possible(struct vm_area_struct *vma, unsigned long *start, unsigned long *end) { } -#define want_pmd_share() (0) #endif /* CONFIG_ARCH_WANT_HUGE_PMD_SHARE */ #ifdef CONFIG_ARCH_WANT_GENERAL_HUGETLB @@ -5452,7 +5460,7 @@ pte_t *huge_pte_alloc(struct mm_struct *mm, struct vm_area_struct *vma, pte = (pte_t *)pud; } else { BUG_ON(sz != PMD_SIZE); - if (want_pmd_share() && pud_none(*pud)) + if (want_pmd_share(vma, addr) && pud_none(*pud)) pte = huge_pmd_share(mm, vma, addr, pud); else pte = (pte_t *)pmd_alloc(mm, pud, addr); -- 2.26.2