Received: by 2002:a05:6359:100d:b0:dc:7f35:3994 with SMTP id ib13csp28751rwb; Tue, 6 Dec 2022 16:21:12 -0800 (PST) X-Google-Smtp-Source: AA0mqf409g1AY2icRRsmkg3vvHQBqRgvSr8Efmi3ZcHnnoT+rSX6Cmri/Gb/rpcAHZJFx9CWBo0s X-Received: by 2002:a05:6a00:1696:b0:537:b0c3:691 with SMTP id k22-20020a056a00169600b00537b0c30691mr71556820pfc.59.1670372472061; Tue, 06 Dec 2022 16:21:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670372472; cv=none; d=google.com; s=arc-20160816; b=AmVnoi020x4HeYd8lsDFFMkwnODIG10tIz+k+2kIgmK9OiOo/ozJ8oeiT6guPbOysN e6xKXt8jdotlmlfyhlKghdWUXG5K9vqTgQNbIeNoX/WuhdIqeVznDjGnz+BSz2iG7rXM Rl/KdO9LtiQVl5Z1yPP4nY3x0uWtNDcMn7k2gF81vJlA1j6KveckDLpAEyta/gS5QWo3 MOpttsRNPt9a+zu1mB9IpbkcRKIfEwrtGQEkthtoDYVLDSBexBPT6rpFahWvsHNxLBfr VxJGEE9UznwJmmOu45/bDeR6h0GBCNdju9OvYcnibnvr4sVOcF7C9Pan4tfp5BQLsnFs jZGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=cLsuMwiJlrQl3J8JtMcNGM+h/BlzZINz+TbY2IHIMkw=; b=ushjV6Md8AzCNHGFKkDo9h9+3P3kg4jvB2BD/wv9RIEImc4Z7Ku2Np+VMRmNiZVgqE uaX6RLjiStvt/EnSJrACNY4z0wmPjd3sCvrKmI4v0JIrMppWCzcF6XSHflNJ4JqjvRJ9 dgn+DQHs565hPZwKVeoKN0Bb34v2ivWczUIZhqlZIr2hFKK+7TaJ0WUzIq6HD3nPdBB3 iKumyTKbZ4Fj18a36boyZ1PK9wey5dd1thBPnNp01XINg4HSmLSYJNJibx9ACorOv+sh h6ie2Ql1lG94QVmW4/n3gwhfVd2sMDDVlK9FkONa6UBAsGespaBpvE0z0JXSpJCq6hTm WnQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=aCMOvehg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o8-20020a17090a4b4800b00213a9e1fa86si20775292pjl.73.2022.12.06.16.21.00; Tue, 06 Dec 2022 16:21:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=aCMOvehg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229632AbiLGAIu (ORCPT + 78 others); Tue, 6 Dec 2022 19:08:50 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57442 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229452AbiLGAIs (ORCPT ); Tue, 6 Dec 2022 19:08:48 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 64E4F65C8 for ; Tue, 6 Dec 2022 16:07:48 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1670371667; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=cLsuMwiJlrQl3J8JtMcNGM+h/BlzZINz+TbY2IHIMkw=; b=aCMOvehgt42fuVvoNMC1QiORIfVeYZQcTPaD+mx7wvCxE9w0I5pHLLwrjmc16v3FvuEAlX ice2qrqouPsKZQfRo0oauFvpff9kvCPKbwpf1QueHpDYKbAkKtex2LQaEVy2zXGZuPCor9 JIn63XmvBzCDEVNjL3Ndl5hgEG+NkRA= Received: from mail-qv1-f72.google.com (mail-qv1-f72.google.com [209.85.219.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_128_GCM_SHA256) id us-mta-252-a2whKefyOAaEZhD4Ej8InQ-1; Tue, 06 Dec 2022 19:07:46 -0500 X-MC-Unique: a2whKefyOAaEZhD4Ej8InQ-1 Received: by mail-qv1-f72.google.com with SMTP id ng1-20020a0562143bc100b004bb706b3a27so36118519qvb.20 for ; Tue, 06 Dec 2022 16:07:46 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=cLsuMwiJlrQl3J8JtMcNGM+h/BlzZINz+TbY2IHIMkw=; b=E9VKVFt4k2dkdDel+m1uEaa3nwru293c8X+QZTc2RJ5tpvfWAw4kpAt+660HUt1Dqf IkpFGyCv9qKcB0UitZnEP5UgmV3wY3E45yCpvCb0gn0wRPJ2doZBo4zmAeyAEFgIyst/ pTGKX8IeySEgL4u2goNyuMnrtmq/VrBr9O9kmU7eevox3qkwW+sv+2wcWIEt7TDUVbZh 3zpswbuIxaILuivd4HPVr/iTKCUmoW9pLKcYIqa1j4LnoMZSRHhibf+15yQvFge64rdi +0Z/hCOLF3EGb061y5Vq3ddvNtcxxouTpqqyihYNV+UNtlQYQgU3A7PP90XZfuZboY2l YCCw== X-Gm-Message-State: ANoB5pmIAXXrrRLMleOQxjVQYJhg4hVS21Mt8oWdMAGGV4PnLymWt9Li ymEAM2bfyv8Vvw8gSpJfTXHWnkIoFInsiq7HjRrjwtpU8ZNxupiFSEzBxifBK6dbFc2b1aNppGS jq8/unMRLEVPpXf+lusFG29h8 X-Received: by 2002:a05:622a:5a91:b0:3a5:fb61:c899 with SMTP id fz17-20020a05622a5a9100b003a5fb61c899mr677187qtb.0.1670371665933; Tue, 06 Dec 2022 16:07:45 -0800 (PST) X-Received: by 2002:a05:622a:5a91:b0:3a5:fb61:c899 with SMTP id fz17-20020a05622a5a9100b003a5fb61c899mr677174qtb.0.1670371665654; Tue, 06 Dec 2022 16:07:45 -0800 (PST) Received: from x1n (bras-base-aurron9127w-grc-46-70-31-27-79.dsl.bell.ca. [70.31.27.79]) by smtp.gmail.com with ESMTPSA id x10-20020a05620a258a00b006bb82221013sm16003743qko.0.2022.12.06.16.07.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 06 Dec 2022 16:07:45 -0800 (PST) Date: Tue, 6 Dec 2022 19:07:43 -0500 From: Peter Xu To: John Hubbard Cc: Mike Kravetz , linux-mm@kvack.org, linux-kernel@vger.kernel.org, James Houghton , Jann Horn , Andrew Morton , Andrea Arcangeli , Rik van Riel , Nadav Amit , Miaohe Lin , Muchun Song , David Hildenbrand Subject: Re: [PATCH 08/10] mm/hugetlb: Make walk_hugetlb_range() safe to pmd unshare Message-ID: References: <20221129193526.3588187-1-peterx@redhat.com> <20221129193526.3588187-9-peterx@redhat.com> <0813b9ed-3c92-088c-4fb9-45fb648c6e73@nvidia.com> <97e3a8f2-df75-306e-2edf-85976c168955@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Dec 06, 2022 at 02:31:30PM -0800, John Hubbard wrote: > On 12/6/22 13:51, Peter Xu wrote: > > On Tue, Dec 06, 2022 at 01:03:45PM -0800, John Hubbard wrote: > > > On 12/6/22 08:45, Peter Xu wrote: > > > > I've got a fixup attached. John, since this got your attention please also > > > > have a look too in case there's further issues. > > > > > > > > > > Well, one question: Normally, the pattern of "release_lock(A); call f(); > > > acquire_lock(A);" is tricky, because one must revalidate that the state > > > protected by A has not changed while the lock was released. However, in > > > this case, it's letting page fault handling proceed, which already > > > assumes that pages might be gone, so generally that seems OK. > > > > Yes it's tricky, but not as tricky in this case. > > > > I hope my documentation supplemented that (in the fixup patch): > > > > + * @hugetlb_entry: if set, called for each hugetlb entry. Note that > > + * currently the hook function is protected by hugetlb > > + * vma lock to make sure pte_t* and the spinlock is valid > > + * to access. If the hook function needs to yield the [1] > > So far so good... > > > + * thread or retake the vma lock for some reason, it > > + * needs to properly release the vma lock manually, > > + * and retake it before the function returns. > > ...but you can actually delete this second sentence. It does not add > any real information--clearly, if you must drop the lock, then you must > "manually" drop the lock. > > And it still ignores my original question, which I don't think I've > fully communicated. Basically, what can happen to the protected data > during the time when the lock is not held? I thought I answered this one at [1] above. If not, I can extend the answer. What can happen is some thread can firstly unshare the pmd pgtable page (e.g. by clearing the PUD entry in current mm), then release the pmd pgtable page (e.g. by unmapping it) even if current thread is still accessing it. It will cause use-after-free on the pmd pgtable page on this thread in various ways. One way to trigger this is when the current thread tries to take the pgtable lock and it'll trigger warning like the call stack referenced in the cover letter of this series: https://lore.kernel.org/r/20221129193526.3588187-1-peterx@redhat.com Please also feel free to read the reproducer attached in the cover letter, it has details on how this can trigger (even though it's so hard to trigger so I added a delay in the kernel to make it trigger). The idea should be the same. > > > > > The vma lock here makes sure the pte_t and the pgtable spinlock being > > stable. Without the lock, they're prone to be freed in parallel. > > > > Yes, but think about this: if the vma lock protects against the pte > going away, then: > > lock() > get a pte > unlock() > > ...let hmm_vma_fault() cond_resched() run... > > lock() > ...whoops, something else release the pte that I'd previously > retrieved. Here the pte_t* is never referenced again after hugetlb_entry() returned. The loop looks like: do { next = hugetlb_entry_end(h, addr, end); pte = hugetlb_walk(vma, addr & hmask, sz); if (pte) err = ops->hugetlb_entry(pte, hmask, addr, next, walk); else if (ops->pte_hole) err = ops->pte_hole(addr, next, -1, walk); if (err) break; } while (addr = next, addr != end); After hugetlb_entry() returned, we'll _never_ touch that pte again we got from either huge_pte_offset() or hugetlb_walk() after this patchset applied. If we touch it, it's a potential bug as you mentioned. But we didn't. Hope it explains. > > > > > > > However, I'm lagging behind on understanding what the vma lock actually > > > protects. It seems to be a hugetlb-specific protection for concurrent > > > freeing of the page tables? > > > > Not exactly freeing, but unsharing. Mike probably has more to say. The > > series is here: > > > > https://lore.kernel.org/all/20220914221810.95771-1-mike.kravetz@oracle.com/#t > > > > > If so, then running a page fault handler seems safe. If there's something > > > else it protects, then we might need to revalidate that after > > > re-acquiring the vma lock. > > > > Nothing to validate here. The only reason to take the vma lock is to match > > with the caller who assumes the lock taken, so either it'll be released > > very soon or it prepares for the next hugetlb pgtable walk (huge_pte_offset). > > > > ummm, see above. :) > > > > > > > Also, scattering hugetlb-specific locks throughout mm seems like an > > > unfortuate thing, I wonder if there is a longer term plan to Not Do > > > That? > > > > So far HMM is really the only one - normally hugetlb_entry() hook is pretty > > light, so not really throughout the whole mm yet. It's even not urgently > > needed for the other two places calling cond_sched(), I added it mostly > > just for completeness, and with the slight hope that maybe we can yield > > earlier for some pmd unsharers. > > > > But yes it's unfortunate, I just didn't come up with a good solution. > > Suggestion is always welcomed. > > > > I guess it's on me to think of something cleaner, so if I do I'll pipe > up. :) That'll be very much appricated. It's really that I don't know how to make this better, or I can rework the series as long as it hasn't land upstream. Thanks, -- Peter Xu