Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp6671985rwb; Mon, 12 Dec 2022 05:08:46 -0800 (PST) X-Google-Smtp-Source: AA0mqf5iL8QuQPRUCGoFPd1zxz0Q5USAKXlC4FTlwgyiO9f4bOuJd6rbxOm51EgsKKfBYUkLLsNN X-Received: by 2002:a05:6a20:a012:b0:a6:713d:4343 with SMTP id p18-20020a056a20a01200b000a6713d4343mr19811528pzj.5.1670850525847; Mon, 12 Dec 2022 05:08:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670850525; cv=none; d=google.com; s=arc-20160816; b=YbXbjUmVdQ5VHOOlOon8y+J1fDALnu2vh/VaK9Tsi4O55zTCi9zdj6EWo/ydVqWhit MAFxP6zBQq+fRBnvBzU0rkOS+NPS514HQrHkA7o7NEmOMIVD/Pt+r9F76FNEo2/bn/wv OuAlLUr3Q23toDTl68P2RDNAc7hoOXHsibhwTYnM3JpjCNj4p1cyrUdgfVidOqYkw5Oi QvRZ67PafKVAH/1iu8QkYSVwUR8CQ0QrFAUVgE5Yg/zDe5GJUHDsjRk8G66lrqsMEC06 p5JkZUOlhLN2h3e/pRxB4mRitiH5/O8ZQqtQX/F5WtBAcgKj+HwKW9fG9Npa9Kd+nIPd kaoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=dnOWOUcC/yhSsD6LXwOHnegXH6YrG1Sx79O9enROpBk=; b=zuITpyT8Bxui/OA5A/wYqmOXiV5g1DNiIYmFVcthKc+tFST8iofltr7iVEV0+6MQGJ SKyFGxdKB1Ap0Im1t5PVZ2vtLSyr89DN0JolPa2W9OX61SfzuzjyVe9PaWLqdJw/Nqjj BB80WVSjvyn0xzilcYXAnmgwnLUQY/X8xcz7BQA4f5qScMVSU6+m4OGLCdcQ037KnWun CLO679DOCWEhlkwy3stlT+Wrt0hbAVokTH0+CPofVuy2fljza63bSMzYvTscL+LfaCvT ZuZle+n8Jor+DwwliFuoCnpD1bl6U01s86q8V9ldZISYg/rahlAxpgAUpOe/ILygC4jF uV0Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=gs9bWw77; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 5-20020a630005000000b00479433ac8aasi3676888pga.260.2022.12.12.05.08.16; Mon, 12 Dec 2022 05:08:45 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=gs9bWw77; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231556AbiLLNFo (ORCPT + 76 others); Mon, 12 Dec 2022 08:05:44 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59792 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230079AbiLLNFn (ORCPT ); Mon, 12 Dec 2022 08:05:43 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 63B3C13D30 for ; Mon, 12 Dec 2022 05:02:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1670850144; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=dnOWOUcC/yhSsD6LXwOHnegXH6YrG1Sx79O9enROpBk=; b=gs9bWw77ktyRCOd73G1Ahywzh6f2MW4+j95CDevw8XVjsRvUkDL1woUMOlj2Xr+60j239r 49Xfx0CxLt3vLUNKRnvwgMIXAutmcFLQVmfu85qoBtrRFcOrxaX8HAoFtcz3wLd0G6WYT9 HSMsySMeiJHlJWoQZnkSrSOMTTMHjb4= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-19-ViqUhs0GP_C8R75eOVdxQQ-1; Mon, 12 Dec 2022 08:02:21 -0500 X-MC-Unique: ViqUhs0GP_C8R75eOVdxQQ-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.rdu2.redhat.com [10.11.54.2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 7564B806004; Mon, 12 Dec 2022 13:02:20 +0000 (UTC) Received: from t480s.redhat.com (unknown [10.39.193.144]) by smtp.corp.redhat.com (Postfix) with ESMTP id A3BB340ED76C; Mon, 12 Dec 2022 13:02:16 +0000 (UTC) From: David Hildenbrand To: linux-kernel@vger.kernel.org Cc: linux-mm@kvack.org, sparclinux@vger.kernel.org, David Hildenbrand , Andrew Morton , "David S. Miller" , Peter Xu , Hev , Anatoly Pugachev , Raghavendra K T , Thorsten Leemhuis , Mike Kravetz , "Kirill A. Shutemov" , Juergen Gross Subject: [PATCH v1] sparc/mm: don't unconditionally set HW writable bit when setting PTE dirty on 64bit Date: Mon, 12 Dec 2022 14:02:13 +0100 Message-Id: <20221212130213.136267-1-david@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.1 on 10.11.54.2 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On sparc64, there is no HW modified bit, therefore, SW tracks via a SW bit if the PTE is dirty via pte_mkdirty(). However, pte_mkdirty() currently also unconditionally sets the HW writable bit, which is wrong. pte_mkdirty() is not supposed to make a PTE actually writable, unless the SW writable bit (pte_write()) indicates that the PTE is not write-protected. Fortunately, sparc64 also defines a SW writable bit. For example, this already turned into a problem in the context of THP splitting as documented in commit 624a2c94f5b7 ("Partly revert "mm/thp: carry over dirty bit when thp splits on pmd") and might be an issue during page migration in mm/migrate.c:remove_migration_pte() as well where we: if (folio_test_dirty(folio) && is_migration_entry_dirty(entry)) pte = pte_mkdirty(pte); But more general, anything like: maybe_mkwrite(pte_mkdirty(pte), vma) code is broken on sparc64, because it will unconditionally set the HW writable bit even if the SW writable bit is not set. Simple reproducer that will result in a writable PTE after ptrace access, to highlight the problem and as an easy way to verify if it has been fixed: -------------------------------------------------------------------------- #include #include #include #include #include #include #include static void signal_handler(int sig) { if (sig == SIGSEGV) printf("[PASS] SIGSEGV generated\n"); else printf("[FAIL] wrong signal generated\n"); exit(0); } int main(void) { size_t pagesize = getpagesize(); char data = 1; off_t offs; int mem_fd; char *map; int ret; mem_fd = open("/proc/self/mem", O_RDWR); if (mem_fd < 0) { fprintf(stderr, "open(/proc/self/mem) failed: %d\n", errno); return 1; } map = mmap(NULL, pagesize, PROT_READ, MAP_PRIVATE|MAP_ANON, -1 ,0); if (map == MAP_FAILED) { fprintf(stderr, "mmap() failed: %d\n", errno); return 1; } printf("original: %x\n", *map); /* debug access */ offs = lseek(mem_fd, (uintptr_t) map, SEEK_SET); ret = write(mem_fd, &data, 1); if (ret != 1) { fprintf(stderr, "pwrite(/proc/self/mem) failed with %d: %d\n", ret, errno); return 1; } if (*map != data) { fprintf(stderr, "pwrite(/proc/self/mem) not visible\n"); return 1; } printf("ptrace: %x\n", *map); /* Install signal handler. */ if (signal(SIGSEGV, signal_handler) == SIG_ERR) { fprintf(stderr, "signal() failed\n"); return 1; } /* Ordinary access. */ *map = 2; printf("access: %x\n", *map); printf("[FAIL] SIGSEGV not generated\n"); return 0; } -------------------------------------------------------------------------- Without this commit (sun4u in QEMU): # ./reproducer original: 0 ptrace: 1 access: 2 [FAIL] SIGSEGV not generated Let's fix this by setting the HW writable bit only if both, the SW dirty bit and the SW writable bit are set. This matches, for example, how s390x handles pte_mkwrite() and pte_mkdirty() -- except, that they have to clear the _PAGE_PROTECT bit. We have to move pte_dirty() and pte_dirty() up. The code patching mechanism and handling constants > 22bit is a bit special on sparc64. With this commit (sun4u in QEMU): # ./reproducer original: 0 ptrace: 1 [PASS] SIGSEGV generated This handling seems to have been in place forever. Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Cc: Andrew Morton Cc: "David S. Miller" Cc: Peter Xu Cc: Hev Cc: Anatoly Pugachev Cc: Raghavendra K T Cc: Thorsten Leemhuis Cc: Mike Kravetz Cc: "Kirill A. Shutemov" Cc: Juergen Gross Signed-off-by: David Hildenbrand --- Only tested under QEMU with sun4u, as I cannot seem to get sun4v running in QEMU. Survives a simple debian 10 boot. This also tackles what's documented in: https://lkml.kernel.org/r/20221125185857.3110155-1-peterx@redhat.com and once loongarch also has been fixed, we might be able to remove all that special-casing. --- arch/sparc/include/asm/pgtable_64.h | 117 ++++++++++++++++------------ 1 file changed, 67 insertions(+), 50 deletions(-) diff --git a/arch/sparc/include/asm/pgtable_64.h b/arch/sparc/include/asm/pgtable_64.h index 3bc9736bddb1..7f2e57747563 100644 --- a/arch/sparc/include/asm/pgtable_64.h +++ b/arch/sparc/include/asm/pgtable_64.h @@ -354,6 +354,42 @@ static inline pgprot_t pgprot_noncached(pgprot_t prot) */ #define pgprot_noncached pgprot_noncached +static inline unsigned long pte_dirty(pte_t pte) +{ + unsigned long mask; + + __asm__ __volatile__( + "\n661: mov %1, %0\n" + " nop\n" + " .section .sun4v_2insn_patch, \"ax\"\n" + " .word 661b\n" + " sethi %%uhi(%2), %0\n" + " sllx %0, 32, %0\n" + " .previous\n" + : "=r" (mask) + : "i" (_PAGE_MODIFIED_4U), "i" (_PAGE_MODIFIED_4V)); + + return (pte_val(pte) & mask); +} + +static inline unsigned long pte_write(pte_t pte) +{ + unsigned long mask; + + __asm__ __volatile__( + "\n661: mov %1, %0\n" + " nop\n" + " .section .sun4v_2insn_patch, \"ax\"\n" + " .word 661b\n" + " sethi %%uhi(%2), %0\n" + " sllx %0, 32, %0\n" + " .previous\n" + : "=r" (mask) + : "i" (_PAGE_WRITE_4U), "i" (_PAGE_WRITE_4V)); + + return (pte_val(pte) & mask); +} + #if defined(CONFIG_HUGETLB_PAGE) || defined(CONFIG_TRANSPARENT_HUGEPAGE) pte_t arch_make_huge_pte(pte_t entry, unsigned int shift, vm_flags_t flags); #define arch_make_huge_pte arch_make_huge_pte @@ -415,28 +451,44 @@ static inline bool is_hugetlb_pte(pte_t pte) } #endif -static inline pte_t pte_mkdirty(pte_t pte) +static inline pte_t __pte_mkhwwrite(pte_t pte) { - unsigned long val = pte_val(pte), tmp; + unsigned long val = pte_val(pte); + /* + * Note: we only want to set the HW writable bit if the SW writable bit + * and the SW dirty bit are set. + */ __asm__ __volatile__( - "\n661: or %0, %3, %0\n" + "\n661: or %0, %2, %0\n" " nop\n" - "\n662: nop\n" + " .section .sun4v_1insn_patch, \"ax\"\n" + " .word 661b\n" + " or %0, %3, %0\n" + " .previous\n" + : "=r" (val) + : "0" (val), "i" (_PAGE_W_4U), "i" (_PAGE_W_4V)); + + return __pte(val); +} + +static inline pte_t pte_mkdirty(pte_t pte) +{ + unsigned long val = pte_val(pte), mask; + + __asm__ __volatile__( + "\n661: mov %1, %0\n" " nop\n" " .section .sun4v_2insn_patch, \"ax\"\n" " .word 661b\n" - " sethi %%uhi(%4), %1\n" - " sllx %1, 32, %1\n" - " .word 662b\n" - " or %1, %%lo(%4), %1\n" - " or %0, %1, %0\n" + " sethi %%uhi(%2), %0\n" + " sllx %0, 32, %0\n" " .previous\n" - : "=r" (val), "=r" (tmp) - : "0" (val), "i" (_PAGE_MODIFIED_4U | _PAGE_W_4U), - "i" (_PAGE_MODIFIED_4V | _PAGE_W_4V)); + : "=r" (mask) + : "i" (_PAGE_MODIFIED_4U), "i" (_PAGE_MODIFIED_4V)); - return __pte(val); + pte = __pte(val | mask); + return pte_write(pte) ? __pte_mkhwwrite(pte) : pte; } static inline pte_t pte_mkclean(pte_t pte) @@ -478,7 +530,8 @@ static inline pte_t pte_mkwrite(pte_t pte) : "=r" (mask) : "i" (_PAGE_WRITE_4U), "i" (_PAGE_WRITE_4V)); - return __pte(val | mask); + pte = __pte(val | mask); + return pte_dirty(pte) ? __pte_mkhwwrite(pte) : pte; } static inline pte_t pte_wrprotect(pte_t pte) @@ -581,42 +634,6 @@ static inline unsigned long pte_young(pte_t pte) return (pte_val(pte) & mask); } -static inline unsigned long pte_dirty(pte_t pte) -{ - unsigned long mask; - - __asm__ __volatile__( - "\n661: mov %1, %0\n" - " nop\n" - " .section .sun4v_2insn_patch, \"ax\"\n" - " .word 661b\n" - " sethi %%uhi(%2), %0\n" - " sllx %0, 32, %0\n" - " .previous\n" - : "=r" (mask) - : "i" (_PAGE_MODIFIED_4U), "i" (_PAGE_MODIFIED_4V)); - - return (pte_val(pte) & mask); -} - -static inline unsigned long pte_write(pte_t pte) -{ - unsigned long mask; - - __asm__ __volatile__( - "\n661: mov %1, %0\n" - " nop\n" - " .section .sun4v_2insn_patch, \"ax\"\n" - " .word 661b\n" - " sethi %%uhi(%2), %0\n" - " sllx %0, 32, %0\n" - " .previous\n" - : "=r" (mask) - : "i" (_PAGE_WRITE_4U), "i" (_PAGE_WRITE_4V)); - - return (pte_val(pte) & mask); -} - static inline unsigned long pte_exec(pte_t pte) { unsigned long mask; base-commit: 830b3c68c1fb1e9176028d02ef86f3cf76aa2476 -- 2.38.1