Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp220760rwl; Thu, 23 Mar 2023 15:14:07 -0700 (PDT) X-Google-Smtp-Source: AKy350ZzoiJdsS6BTj+cPWEnKLi90hL+wKwB2pz7rW8GMdNb4/CyNj7QaAKediI4IJZQJ4T8HGG3 X-Received: by 2002:aa7:d052:0:b0:4fb:999:e052 with SMTP id n18-20020aa7d052000000b004fb0999e052mr738454edo.33.1679609647309; Thu, 23 Mar 2023 15:14:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679609647; cv=none; d=google.com; s=arc-20160816; b=tx+oCHo0RbyjRlJcXq5N/vh2fZgVyvywbVkVOjWHWSTboibhqz558twdWX6BlLof/O LpIE7hWKbhnv+WN8cDySlO/mfBHG1F8EQISaF7ksFjTrdN2mVWMrRplawvx420tNCRK9 jOIo9X970keaJtoBOFzpI/uIlarHTP33JT5mMloDk9Zl1d8MDgGr0miUjqn87wwuNRYa ARnu8jB2kI8AU+HcRyIQTNKWH0Nt3xrxJSSMxLhCQuyA/H/66YoMMRxwI8f9e6yaIIks YXPkWF8FQRq9ElDO7R5CcMfy+Gs6Mjs2psdZc+eGB3vKdaq9VIFaMtj/PSNglMC6fOwO JspQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=BdUUJpvBYjmASyn2bJRVEYYq1jXnao8uWURPAVj9ZuA=; b=PsxBOEThP5qFNaK25UHh5rWzyM6b7XrmAII69+0LZZFAuUseQg3xU+6jVQFzya9dzT cbHmoNEsIlZn2Nfkw2Xn7uHJhBa1mZH2nEAJO5VYkgAFhIaXRZeM5NWMfGFmImh/sapu GiXaImBabw77qKLOjkg7iXndOGBtNCsVqh4lbYHcJhU4Cx7V+THG/Svd5dGcuoolIzqT 6JUUFO0po5KTA6uTvINoOwqbPW6f0ihS0LhcVy0i/dTB+df3LRY7YE69zx9UcgH2iOhq Hdy6+jGsUDDt4lkVE+c1TWsV/S/FgS/R9Y1sDB230424Otc2KPYxHJttCvUpZEYi8pgC gZdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=NNVmMGso; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r9-20020aa7cb89000000b004fb4859cd4csi19545211edt.562.2023.03.23.15.13.42; Thu, 23 Mar 2023 15:14:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=NNVmMGso; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231305AbjCWWMv (ORCPT + 99 others); Thu, 23 Mar 2023 18:12:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34362 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231282AbjCWWMp (ORCPT ); Thu, 23 Mar 2023 18:12:45 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D8E4522DEC for ; Thu, 23 Mar 2023 15:12:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1679609522; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=BdUUJpvBYjmASyn2bJRVEYYq1jXnao8uWURPAVj9ZuA=; b=NNVmMGsood0Ubt6mMpXjjoMtfxhhrV9C96qaIeIj4aRAjcZHryLcLsYOLEC/a1CyfH1Jz9 abO+eZOoKxINajB07WxXxa+l0DJPgHcAcqGxEBLHYeL0u5t6m3joOCPaEIP7JUcLeI38Kl 0VN2IoqNSUEXh3w/Xu3VV6BAW6OOW5Y= Received: from mail-qk1-f199.google.com (mail-qk1-f199.google.com [209.85.222.199]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-614-5EH25rvzMs21Ill7uSPBlA-1; Thu, 23 Mar 2023 18:11:58 -0400 X-MC-Unique: 5EH25rvzMs21Ill7uSPBlA-1 Received: by mail-qk1-f199.google.com with SMTP id t21-20020a37aa15000000b00746b7fae197so2510442qke.12 for ; Thu, 23 Mar 2023 15:11:58 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1679609518; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=BdUUJpvBYjmASyn2bJRVEYYq1jXnao8uWURPAVj9ZuA=; b=1K16lBbOIryE/nQkU+lsceo8R1le07MJL4VupOVFyusNqQeYTAYZgw2SlVZeZudodk sGEcemLh2Obl/LcAT5Z/yeZq/8u9PbFbRSpgrBDKRGPSzHsB2B2x1ui88jsj68FISsHa IHgqTJtCKs8Vqo869FspiefjpABRiXVHMicJ0JLdWPumpPFZGuK/9RJKBEjHTKz78jeg /gGwCnlW/9AueBl8X/NZCqY+iokeLhLH5Lsr3gb6+MSa+e7UMnSe7p/5gLBQiheZdhlI HGNCu0g6Nl1m9bUGGz8cUXljqqBoSvnMLeoz0qMFXj0YGKz9DYa8r11YKnn7GdLMYnq3 6wfw== X-Gm-Message-State: AAQBX9dYiaN5UDpouqHvKZAjMLBGYBGG7qP//kvv5cqsf6FOm3lN5bZH lvFFlJ5AtTdwUKR3Bj9VhcNN9EnEMAR6/+xq7JrIBrI2uPhPgd4cph0xBswHaFCgp4vxitJBMKS SEjIltcIUgS19FVzArzYcU2eJ X-Received: by 2002:a05:6214:5289:b0:572:54c1:c14e with SMTP id kj9-20020a056214528900b0057254c1c14emr698353qvb.5.1679609517713; Thu, 23 Mar 2023 15:11:57 -0700 (PDT) X-Received: by 2002:a05:6214:5289:b0:572:54c1:c14e with SMTP id kj9-20020a056214528900b0057254c1c14emr698317qvb.5.1679609517384; Thu, 23 Mar 2023 15:11:57 -0700 (PDT) Received: from x1n (bras-base-aurron9127w-grc-40-70-52-229-124.dsl.bell.ca. [70.52.229.124]) by smtp.gmail.com with ESMTPSA id e7-20020ad450c7000000b005dd8b934592sm190729qvq.42.2023.03.23.15.11.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Mar 2023 15:11:56 -0700 (PDT) Date: Thu, 23 Mar 2023 18:11:55 -0400 From: Peter Xu To: Muhammad Usama Anjum Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, Andrea Arcangeli , Andrew Morton , Axel Rasmussen , Mike Rapoport , Nadav Amit , linux-stable , David Hildenbrand Subject: Re: [PATCH] mm/hugetlb: Fix uffd wr-protection for CoW optimization path Message-ID: References: <20230321191840.1897940-1-peterx@redhat.com> <44aae7fc-fb1f-b38e-bc17-504abf054e3f@redhat.com> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="le5JTZlZZI66lfKs" Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --le5JTZlZZI66lfKs Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit On Thu, Mar 23, 2023 at 08:33:07PM +0500, Muhammad Usama Anjum wrote: > Hi Peter, > > Sorry for late reply. > > On 3/22/23 12:50 AM, Peter Xu wrote: > > On Tue, Mar 21, 2023 at 08:36:35PM +0100, David Hildenbrand wrote: > >> On 21.03.23 20:18, Peter Xu wrote: > >>> This patch fixes an issue that a hugetlb uffd-wr-protected mapping can be > >>> writable even with uffd-wp bit set. It only happens with all these > >>> conditions met: (1) hugetlb memory (2) private mapping (3) original mapping > >>> was missing, then (4) being wr-protected (IOW, pte marker installed). Then > >>> write to the page to trigger. > >>> > >>> Userfaultfd-wp trap for hugetlb was implemented in hugetlb_fault() before > >>> even reaching hugetlb_wp() to avoid taking more locks that userfault won't > >>> need. However there's one CoW optimization path for missing hugetlb page > >>> that can trigger hugetlb_wp() inside hugetlb_no_page(), that can bypass the > >>> userfaultfd-wp traps. > >>> > >>> A few ways to resolve this: > >>> > >>> (1) Skip the CoW optimization for hugetlb private mapping, considering > >>> that private mappings for hugetlb should be very rare, so it may not > >>> really be helpful to major workloads. The worst case is we only skip the > >>> optimization if userfaultfd_wp(vma)==true, because uffd-wp needs another > >>> fault anyway. > >>> > >>> (2) Move the userfaultfd-wp handling for hugetlb from hugetlb_fault() > >>> into hugetlb_wp(). The major cons is there're a bunch of locks taken > >>> when calling hugetlb_wp(), and that will make the changeset unnecessarily > >>> complicated due to the lock operations. > >>> > >>> (3) Carry over uffd-wp bit in hugetlb_wp(), so it'll need to fault again > >>> for uffd-wp privately mapped pages. > >>> > >>> This patch chose option (3) which contains the minimum changeset (simplest > >>> for backport) and also make sure hugetlb_wp() itself will start to be > >>> always safe with uffd-wp ptes even if called elsewhere in the future. > >>> > >>> This patch will be needed for v5.19+ hence copy stable. > >>> > >>> Reported-by: Muhammad Usama Anjum > >>> Cc: linux-stable > >>> Fixes: 166f3ecc0daf ("mm/hugetlb: hook page faults for uffd write protection") > >>> Signed-off-by: Peter Xu > >>> --- > >>> mm/hugetlb.c | 8 +++++--- > >>> 1 file changed, 5 insertions(+), 3 deletions(-) > >>> > >>> diff --git a/mm/hugetlb.c b/mm/hugetlb.c > >>> index 8bfd07f4c143..22337b191eae 100644 > >>> --- a/mm/hugetlb.c > >>> +++ b/mm/hugetlb.c > >>> @@ -5478,7 +5478,7 @@ static vm_fault_t hugetlb_wp(struct mm_struct *mm, struct vm_area_struct *vma, > >>> struct folio *pagecache_folio, spinlock_t *ptl) > >>> { > >>> const bool unshare = flags & FAULT_FLAG_UNSHARE; > >>> - pte_t pte; > >>> + pte_t pte, newpte; > >>> struct hstate *h = hstate_vma(vma); > >>> struct page *old_page; > >>> struct folio *new_folio; > >>> @@ -5622,8 +5622,10 @@ static vm_fault_t hugetlb_wp(struct mm_struct *mm, struct vm_area_struct *vma, > >>> mmu_notifier_invalidate_range(mm, range.start, range.end); > >>> page_remove_rmap(old_page, vma, true); > >>> hugepage_add_new_anon_rmap(new_folio, vma, haddr); > >>> - set_huge_pte_at(mm, haddr, ptep, > >>> - make_huge_pte(vma, &new_folio->page, !unshare)); > >>> + newpte = make_huge_pte(vma, &new_folio->page, !unshare); > >>> + if (huge_pte_uffd_wp(pte)) > >>> + newpte = huge_pte_mkuffd_wp(newpte); > >>> + set_huge_pte_at(mm, haddr, ptep, newpte); > >>> folio_set_hugetlb_migratable(new_folio); > >>> /* Make the old page be freed below */ > >>> new_folio = page_folio(old_page); > >> > >> Looks correct to me. Do we have a reproducer? > > > > I used a reproducer for the async mode I wrote (patch 2 attached, need to > > change to VM_PRIVATE): > > > > https://lore.kernel.org/all/ZBNr4nohj%2FTw4Zhw@x1n/ > > > > I don't think kernel kselftest can trigger it because we don't do strict > > checks yet with uffd-wp bits. I've already started looking into cleanup > > the test cases and I do plan to add new tests to cover this. > > > > Meanwhile, let's also wait for an ack from Muhammad. Even though the async > > mode is not part of the code base, it'll be a good test for verifying every > > single uffd-wp bit being set or cleared as expected. > I've tested by applying this patch. But the bug is still there. Just like > Peter has mentioned, we are using our in progress patches related to > pagemap_scan ioctl and userfaultd wp async patches to reproduce it. > > To reproduce please build kernel and run pagemap_ioctl test in mm in > hugetlb_mem_reproducer branch: > https://gitlab.collabora.com/usama.anjum/linux-mainline/-/tree/hugetlb_mem_reproducer > > In case you have any question on how to reproduce, please let me know. I'll > try to provide a cleaner alternative. Hmm, I think my current fix is incomplete if not wrong. The root cause should still be valid, however I overlooked another path: if (page_mapcount(old_page) == 1 && PageAnon(old_page)) { if (!PageAnonExclusive(old_page)) page_move_anon_rmap(old_page, vma); if (likely(!unshare)) set_huge_ptep_writable(vma, haddr, ptep); delayacct_wpcopy_end(); return 0; } We should bail out early in this path, and it'll be even easier we always bail out hugetlb_wp() as long as uffd-wp is detected because userfault should always be handled before any decision to CoW. v2 attached.. Please give it another shot. Thanks, -- Peter Xu --le5JTZlZZI66lfKs Content-Type: text/plain; charset=utf-8 Content-Disposition: attachment; filename="0001-mm-hugetlb-Fix-uffd-wr-protection-for-CoW-optimizati.patch" From 4a294f9ec5d2ba94a6a7ecf03bd096ea35902f2f Mon Sep 17 00:00:00 2001 From: Peter Xu Date: Tue, 21 Mar 2023 14:58:42 -0400 Subject: [PATCH v2] mm/hugetlb: Fix uffd wr-protection for CoW optimization path This patch fixes an issue that a hugetlb uffd-wr-protected mapping can be writable even with uffd-wp bit set. It only happens with hugetlb private mappings, when someone firstly wr-protects a missing pte (which will install a pte marker), followed by a write to the page. That will trigger a missing fault and an optimized CoW in the same fault stack. Userfaultfd-wp trap for hugetlb was implemented in hugetlb_fault() before even reaching hugetlb_wp() to avoid taking more locks that userfault won't need. However there's one CoW optimization path for missing hugetlb page that can trigger hugetlb_wp() inside hugetlb_no_page(), that can bypass the userfaultfd-wp traps. A few ways to resolve this: (1) Skip the CoW optimization for hugetlb private mapping, considering that private mappings for hugetlb should be very rare, so it may not really be helpful to major workloads. The worst case is we only skip the optimization if userfaultfd_wp(vma)==true, because uffd-wp needs another fault anyway. (2) Move the userfaultfd-wp handling for hugetlb from hugetlb_fault() into hugetlb_wp(). The major cons is there're a bunch of locks taken when calling hugetlb_wp(), and that will make the changeset unnecessarily complicated due to the lock operations. (3) Skip hugetlb_wp() when uffd-wp bit is still set. It means it requires another hugetlb_fault() to resolve the uffd-wp bit first. This patch chose option (3) which contains the minimum changeset (simplest for backport) and also make sure hugetlb_wp() itself will start to be always safe with uffd-wp ptes even if called elsewhere in the future. This patch will be needed for v5.19+ hence copy stable. Reported-by: Muhammad Usama Anjum Cc: linux-stable Fixes: 166f3ecc0daf ("mm/hugetlb: hook page faults for uffd write protection") Signed-off-by: Peter Xu --- mm/hugetlb.c | 14 ++++++++++++-- 1 file changed, 12 insertions(+), 2 deletions(-) diff --git a/mm/hugetlb.c b/mm/hugetlb.c index 8bfd07f4c143..b60959f2a3f0 100644 --- a/mm/hugetlb.c +++ b/mm/hugetlb.c @@ -5478,7 +5478,7 @@ static vm_fault_t hugetlb_wp(struct mm_struct *mm, struct vm_area_struct *vma, struct folio *pagecache_folio, spinlock_t *ptl) { const bool unshare = flags & FAULT_FLAG_UNSHARE; - pte_t pte; + pte_t pte = huge_ptep_get(ptep); struct hstate *h = hstate_vma(vma); struct page *old_page; struct folio *new_folio; @@ -5487,6 +5487,17 @@ static vm_fault_t hugetlb_wp(struct mm_struct *mm, struct vm_area_struct *vma, unsigned long haddr = address & huge_page_mask(h); struct mmu_notifier_range range; + /* + * Never handle CoW for uffd-wp protected pages. It should be only + * handled when the uffd-wp protection is removed. + * + * Note that only the CoW optimization path can trigger this and + * got skipped, because hugetlb_fault() will always resolve uffd-wp + * bit first. + */ + if (huge_pte_uffd_wp(pte)) + return 0; + /* * hugetlb does not support FOLL_FORCE-style write faults that keep the * PTE mapped R/O such as maybe_mkwrite() would do. @@ -5500,7 +5511,6 @@ static vm_fault_t hugetlb_wp(struct mm_struct *mm, struct vm_area_struct *vma, return 0; } - pte = huge_ptep_get(ptep); old_page = pte_page(pte); delayacct_wpcopy_start(); -- 2.39.1 --le5JTZlZZI66lfKs--