Received: by 2002:a19:f614:0:0:0:0:0 with SMTP id x20csp62044lfe; Fri, 15 Apr 2022 19:35:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyvD/PTvoFVminYpKvmCOIQqPZgKvDir6vr9GjBPWV/CgRS+EJFW2x0EVV38UZew6A24tZh X-Received: by 2002:a17:903:240c:b0:153:c452:f282 with SMTP id e12-20020a170903240c00b00153c452f282mr1801935plo.88.1650076507103; Fri, 15 Apr 2022 19:35:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650076507; cv=none; d=google.com; s=arc-20160816; b=yzhMjHyvnwGe1lmcnnfJkPNPIFiEywfPe12XpWrWOgrbh6yzwda2OBU/4l9BinPzJ8 4abyjas1RQdpE/aEXczm28esnUojxlR3mo7AjAvsRbVzeDVMZv+t3816soLg1tzAavGB E2oU9HK5H3r8d9Cc0J/xu0Cor3ngEfILn+C79SCT4kiW8ycJYvaaCnt6mGp3Flzaxm2c x8ca8srCpyNBVHbzxtIcGIwG/Dmb1S0EGe/MbXD/5UHq8Ai38zfotg+dB8tg67TVtLa+ FrWe2h9yew6EwCUl/uOcrEWLdzg2XW9/HZD0pjjrvnbV8pMmW52geEqg3lk51FJS1VJs Pmgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=sjvoGdsG/KikCr8n11LNvQqp0y5lD8P2UoLqYicQeZY=; b=Tav8WxlPinRT1OYJ76iR1qKSWGLcHNV5SFn638av+Z2OT+4yo1d5M9sIY8/760KEjc ZJdzqzDOo6ff9m7XaRSMunpvtSK6QVrTMW3qPfwzyfdr0jOD4d7v3l50XmRYRNvBhsAH ojh/ORkaor4wuwJgMOplZPZcndU/3zOy3s43KgZpnzZagNRrZxaBOu8OcFQUeps0a9Dp 7sZq4C7wh/Np590BBzN5xxSOPcxWY1IOpashljBVjayndV+WXR/icarX1vTIsdmuYyP1 9WRaapPxfUooSDjMXPCLtlzd0QK1Mm+S1gt4fD3Sy0y7HWCprzjCO6bLuMso5StGTYEn u9bA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=Cpk0xi9b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id s8-20020a17090302c800b00156aa98a93bsi2922063plk.31.2022.04.15.19.35.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Apr 2022 19:35:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=Cpk0xi9b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id D1A6112E311; Fri, 15 Apr 2022 18:44:47 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343996AbiDNVAM (ORCPT + 99 others); Thu, 14 Apr 2022 17:00:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46286 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231129AbiDNVAL (ORCPT ); Thu, 14 Apr 2022 17:00:11 -0400 Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 51222CD648 for ; Thu, 14 Apr 2022 13:57:45 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id B1413CE2BB5 for ; Thu, 14 Apr 2022 20:57:43 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 817D9C385A1; Thu, 14 Apr 2022 20:57:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1649969862; bh=1b2MQi6pZu61G74HfcojVbbQGo/EswADqWmRfYXIXns=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=Cpk0xi9bQ7FgsOnICSYYOWirsVgI5u6BPopIIDq+x32GurXDmzVRJSqjyU735L2Yk sLx/I2JlW2Nv0mw2gfXAtSTFRB3W80FiqQ8jTZeaqtOGStPKJpBtR5bAoU1Y2X3x1Y NF3s0pUvX2MzDj2NFW0s1B1tYZpQuKyvYa+u+vWs= Date: Thu, 14 Apr 2022 13:57:40 -0700 From: Andrew Morton To: Peter Xu Cc: Marek Szyprowski , linux-kernel@vger.kernel.org, linux-mm@kvack.org, Mike Kravetz , Nadav Amit , Matthew Wilcox , Mike Rapoport , David Hildenbrand , Hugh Dickins , Jerome Glisse , "Kirill A . Shutemov" , Andrea Arcangeli , Axel Rasmussen , Alistair Popple Subject: Re: [PATCH v8 03/23] mm: Check against orig_pte for finish_fault() Message-Id: <20220414135740.42fb26be9e13d2aada35f140@linux-foundation.org> In-Reply-To: References: <20220405014646.13522-1-peterx@redhat.com> <20220405014836.14077-1-peterx@redhat.com> <710c48c9-406d-e4c5-a394-10501b951316@samsung.com> <6ccf5f5f-8dc5-16cc-f06c-78401b822a54@samsung.com> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.33; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-5.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,RDNS_NONE,SPF_HELO_NONE, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 14 Apr 2022 12:30:06 -0400 Peter Xu wrote: > > Reported-by: Marek Szyprowski > > > > Tested-by: Marek Szyprowski > > Thanks, Marek, for the fast feedback! Certainly. > I've also verified it for the uffd-wp case so the whole series keeps > running as usual and nothing else shows up after the new patch replaced. > > Andrew, any suggestion on how we proceed with the replacement patch? > E.g. do you want me to post it separately to the list? I turned it into an incremental diff and queued it against [03/23]: --- a/include/linux/mm_types.h~mm-check-against-orig_pte-for-finish_fault-fix +++ a/include/linux/mm_types.h @@ -814,6 +814,8 @@ typedef struct { * @FAULT_FLAG_UNSHARE: The fault is an unsharing request to unshare (and mark * exclusive) a possibly shared anonymous page that is * mapped R/O. + * @FAULT_FLAG_ORIG_PTE_VALID: whether the fault has vmf->orig_pte cached. + * We should only access orig_pte if this flag set. * * About @FAULT_FLAG_ALLOW_RETRY and @FAULT_FLAG_TRIED: we can specify * whether we would allow page faults to retry by specifying these two @@ -850,6 +852,7 @@ enum fault_flag { FAULT_FLAG_INSTRUCTION = 1 << 8, FAULT_FLAG_INTERRUPTIBLE = 1 << 9, FAULT_FLAG_UNSHARE = 1 << 10, + FAULT_FLAG_ORIG_PTE_VALID = 1 << 11, }; #endif /* _LINUX_MM_TYPES_H */ --- a/mm/memory.c~mm-check-against-orig_pte-for-finish_fault-fix +++ a/mm/memory.c @@ -4194,6 +4194,15 @@ void do_set_pte(struct vm_fault *vmf, st set_pte_at(vma->vm_mm, addr, vmf->pte, entry); } +static bool vmf_pte_changed(struct vm_fault *vmf) +{ + if (vmf->flags & FAULT_FLAG_ORIG_PTE_VALID) { + return !pte_same(*vmf->pte, vmf->orig_pte); + } + + return !pte_none(*vmf->pte); +} + /** * finish_fault - finish page fault once we have prepared the page to fault * @@ -4252,7 +4261,7 @@ vm_fault_t finish_fault(struct vm_fault vmf->address, &vmf->ptl); ret = 0; /* Re-check under ptl */ - if (likely(pte_same(*vmf->pte, vmf->orig_pte))) + if (likely(!vmf_pte_changed(vmf))) do_set_pte(vmf, page, vmf->address); else ret = VM_FAULT_NOPAGE; @@ -4720,13 +4729,7 @@ static vm_fault_t handle_pte_fault(struc * concurrent faults and from rmap lookups. */ vmf->pte = NULL; - /* - * Always initialize orig_pte. This matches with below - * code to have orig_pte to be the none pte if pte==NULL. - * This makes the rest code to be always safe to reference - * it, e.g. in finish_fault() we'll detect pte changes. - */ - pte_clear(vmf->vma->vm_mm, vmf->address, &vmf->orig_pte); + vmf->flags &= ~FAULT_FLAG_ORIG_PTE_VALID; } else { /* * If a huge pmd materialized under us just retry later. Use @@ -4750,6 +4753,7 @@ static vm_fault_t handle_pte_fault(struc */ vmf->pte = pte_offset_map(vmf->pmd, vmf->address); vmf->orig_pte = *vmf->pte; + vmf->flags |= FAULT_FLAG_ORIG_PTE_VALID; /* * some architectures can have larger ptes than wordsize, _