Message ID | 20221110203132.1498183-3-peterx@redhat.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp364700wru; Thu, 10 Nov 2022 12:39:20 -0800 (PST) X-Google-Smtp-Source: AMsMyM73ehcFmoQ17Ho0riLQ+Xxa9gW9taNQNIP9yZlwhySC7edy7bhPgm1gI+awdlJoDus2IAX3 X-Received: by 2002:a05:6402:c07:b0:459:f897:7940 with SMTP id co7-20020a0564020c0700b00459f8977940mr3247067edb.168.1668112760106; Thu, 10 Nov 2022 12:39:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668112760; cv=none; d=google.com; s=arc-20160816; b=UXuVCyrGhCUENRIKNsTp5S1Pzl+x25lUz7opYOD/iaU6yUNbkCbIyIkLn/RzHxzHXJ 2wrTyfLvdKpkUIQCvehcEaCxMt8k876IU+hJEaLcLuEWZcU8LSR2BH8m/UrayC1AR/xN b3QAF0MAruNpRrSaVwWp/bK4SyCLAeVKUKZV0Oo7U879Zn01QpGfT3WN8ZpVrEzgl7su ixIhqJ+OjMVZ767YCgh1883juN+v2tq669IdB+5y5kR96Y6QqG3HQSeq8oEljzdEairY UNm2LFaCEpJxyJSKu+J2/kkQ2jrnkLMSUMrzLGqr3X9Jy54pclgvdKU8aSGmHnCk8h2w H2wA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=WQpC1KJZxfuI3Xd3ROAIVllQOpnyDtGxdSkS8bhzCN0=; b=Eo+D6kkLEjytx5aJXa4a+yrwFA2Tb8m/BpixOjVYp345kVofJzwJsCkzqBzmNLSERW f/PcvVHXX459yvf6vXArE4JQo7mQ/E1lQVNqNQKuRe+oSyIlky8cgdfBch/TBkGh1MEu aGwlWd4Gj7g6OyuQfnp3rzUvLFhRQxk2D4Nu0tWxuieo9TKE4fNOTGIHsczKPU6Z8Xlu taGTjY5kCZkyUKHeMKw5efS5trDlCp4kNSCyW5IEafVvaILSnyyQnbm/tx0hInuXBgmS veCnPZwT+xlQWplLulnK+0aGgRJUUz/eczWt6o7u87YOUM5v+q04+Z1/1KBPNlkohdw/ hJPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=VrC1zLew; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id wt13-20020a170906ee8d00b007807e613e5bsi222220ejb.933.2022.11.10.12.38.56; Thu, 10 Nov 2022 12:39:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=VrC1zLew; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231802AbiKJUcj (ORCPT <rfc822;winker.wchi@gmail.com> + 99 others); Thu, 10 Nov 2022 15:32:39 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40332 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231587AbiKJUcg (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Thu, 10 Nov 2022 15:32:36 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 864021E701 for <linux-kernel@vger.kernel.org>; Thu, 10 Nov 2022 12:31:41 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1668112300; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=WQpC1KJZxfuI3Xd3ROAIVllQOpnyDtGxdSkS8bhzCN0=; b=VrC1zLewUg/xJCLnssyU+XO5/3ytsetbqE9mKtFNQsd2Ax1rdZNl3xZyPxQCTzA/s+55zf aOixlonX9Qw1/Mj4AES5TtpGtO0+Gf+dIwq0x3R65Tu+9MAYcjq9l3l0L/e86yvg31iO4r k4Wh+k96gAbYKycmlcMTOBhGoDVp/P0= Received: from mail-qt1-f199.google.com (mail-qt1-f199.google.com [209.85.160.199]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_128_GCM_SHA256) id us-mta-318-PH6j4e1qN1uRaPbYNWd1Og-1; Thu, 10 Nov 2022 15:31:39 -0500 X-MC-Unique: PH6j4e1qN1uRaPbYNWd1Og-1 Received: by mail-qt1-f199.google.com with SMTP id u31-20020a05622a199f00b003a51fa90654so2228453qtc.19 for <linux-kernel@vger.kernel.org>; Thu, 10 Nov 2022 12:31:39 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=WQpC1KJZxfuI3Xd3ROAIVllQOpnyDtGxdSkS8bhzCN0=; b=aZs2E5TrDJUEls8dZyMJCn3RjhpaDhYra/Ml6QopASQwZA0PgvRko2Ky1U6tWob0ZZ f+uH9U0r5ZJ9CUQe8ONTZRbUGEU1wHIp9SC0VsA8LfRKTMvEj7tHl8DPPByOZab72ClR 2w869TzAihMSK/We4btw9cGbJAe8/rvk0WGie1T+wmQ8g13RmCDZFf4rnoauPev/XY3z K3b89hS5D35EKcbOekHh4xcW28XNYMKUQDynM8OQetIRSMhHtuGpJfxGrLRLHCMuiWGT W0B/R0vD7C0JSx3+Wr4pB/tnGH8jql1dAFO307u6aYttnqPq7fiqlGojooZqFWxnGbXO wBAw== X-Gm-Message-State: ACrzQf35iIpovYgn3ZTl5+jZ83QDdArFjaOykOXg/jVQmI0s4neyhUbp rKKYPntUq7dlGdFIbFL2LVq0rfBqEZIQHey1fTIPmubddBqeTuoLNZggbbSgswnzji2LQW+EYI/ ZCbVJ5rBmhtPo+OLvkivuqJKP5yc867DaxV521cPekqf0y6DvLgOAEQesW64jEvDx1GcTOQoE5g == X-Received: by 2002:a05:6214:c47:b0:4bb:85b4:fd8e with SMTP id r7-20020a0562140c4700b004bb85b4fd8emr60020951qvj.25.1668112298131; Thu, 10 Nov 2022 12:31:38 -0800 (PST) X-Received: by 2002:a05:6214:c47:b0:4bb:85b4:fd8e with SMTP id r7-20020a0562140c4700b004bb85b4fd8emr60020935qvj.25.1668112297792; Thu, 10 Nov 2022 12:31:37 -0800 (PST) Received: from x1n.redhat.com (bras-base-aurron9127w-grc-46-70-31-27-79.dsl.bell.ca. [70.31.27.79]) by smtp.gmail.com with ESMTPSA id i1-20020ac860c1000000b00399edda03dfsm123588qtm.67.2022.11.10.12.31.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 10 Nov 2022 12:31:37 -0800 (PST) From: Peter Xu <peterx@redhat.com> To: linux-kernel@vger.kernel.org, linux-mm@kvack.org Cc: peterx@redhat.com, Andrea Arcangeli <aarcange@redhat.com>, Axel Rasmussen <axelrasmussen@google.com>, Ives van Hoorne <ives@codesandbox.io>, Nadav Amit <nadav.amit@gmail.com>, Andrew Morton <akpm@linux-foundation.org>, Mike Rapoport <rppt@linux.vnet.ibm.com> Subject: [PATCH v2 2/2] mm/uffd: Sanity check write bit for uffd-wp protected ptes Date: Thu, 10 Nov 2022 15:31:32 -0500 Message-Id: <20221110203132.1498183-3-peterx@redhat.com> X-Mailer: git-send-email 2.37.3 In-Reply-To: <20221110203132.1498183-1-peterx@redhat.com> References: <20221110203132.1498183-1-peterx@redhat.com> MIME-Version: 1.0 Content-type: text/plain Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1749143005333767845?= X-GMAIL-MSGID: =?utf-8?q?1749143005333767845?= |
Series |
mm/migrate: Fix writable pte for read migration entry
|
|
Commit Message
Peter Xu
Nov. 10, 2022, 8:31 p.m. UTC
Let's add one sanity check for CONFIG_DEBUG_VM on the write bit in whatever
chance we have when walking through the pgtables. It can bring the error
earlier even before the app notices the data was corrupted on the snapshot.
Also it helps us to identify this is a wrong pgtable setup, so hopefully a
great information to have for debugging too.
Cc: Andrea Arcangeli <aarcange@redhat.com>
Signed-off-by: Peter Xu <peterx@redhat.com>
---
arch/x86/include/asm/pgtable.h | 16 +++++++++++++++-
1 file changed, 15 insertions(+), 1 deletion(-)
Comments
Hi Peter, Thank you for the patch! Yet something to improve: [auto build test ERROR on akpm-mm/mm-everything] url: https://github.com/intel-lab-lkp/linux/commits/Peter-Xu/mm-migrate-Fix-writable-pte-for-read-migration-entry/20221111-043302 base: https://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm.git mm-everything patch link: https://lore.kernel.org/r/20221110203132.1498183-3-peterx%40redhat.com patch subject: [PATCH v2 2/2] mm/uffd: Sanity check write bit for uffd-wp protected ptes config: x86_64-randconfig-a015 compiler: gcc-11 (Debian 11.3.0-8) 11.3.0 reproduce (this is a W=1 build): # https://github.com/intel-lab-lkp/linux/commit/b103eae2926a263a15e262611524ca9efa8b969e git remote add linux-review https://github.com/intel-lab-lkp/linux git fetch --no-tags linux-review Peter-Xu/mm-migrate-Fix-writable-pte-for-read-migration-entry/20221111-043302 git checkout b103eae2926a263a15e262611524ca9efa8b969e # save the config file mkdir build_dir && cp config build_dir/.config make W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash If you fix the issue, kindly add following tag where applicable | Reported-by: kernel test robot <lkp@intel.com> All errors (new ones prefixed by >>): In file included from include/linux/pgtable.h:6, from mm/hugetlb_vmemmap.c:13: arch/x86/include/asm/pgtable.h: In function 'pte_uffd_wp': >> arch/x86/include/asm/pgtable.h:306:9: error: implicit declaration of function 'VM_WARN_ON_ONCE'; did you mean 'WARN_ON_ONCE'? [-Werror=implicit-function-declaration] 306 | VM_WARN_ON_ONCE(wp && pte_write(pte)); | ^~~~~~~~~~~~~~~ | WARN_ON_ONCE cc1: some warnings being treated as errors vim +306 arch/x86/include/asm/pgtable.h 290 291 #ifdef CONFIG_HAVE_ARCH_USERFAULTFD_WP 292 static inline int pte_uffd_wp(pte_t pte) 293 { 294 bool wp = pte_flags(pte) & _PAGE_UFFD_WP; 295 296 /* 297 * Having write bit for wr-protect-marked present ptes is fatal, 298 * because it means the uffd-wp bit will be ignored and write will 299 * just go through. 300 * 301 * Use any chance of pgtable walking to verify this (e.g., when 302 * page swapped out or being migrated for all purposes). It means 303 * something is already wrong. Tell the admin even before the 304 * process crashes. We also nail it with wrong pgtable setup. 305 */ > 306 VM_WARN_ON_ONCE(wp && pte_write(pte)); 307 308 return wp; 309 } 310
Hi Peter, Thank you for the patch! Yet something to improve: [auto build test ERROR on akpm-mm/mm-everything] url: https://github.com/intel-lab-lkp/linux/commits/Peter-Xu/mm-migrate-Fix-writable-pte-for-read-migration-entry/20221111-043302 base: https://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm.git mm-everything patch link: https://lore.kernel.org/r/20221110203132.1498183-3-peterx%40redhat.com patch subject: [PATCH v2 2/2] mm/uffd: Sanity check write bit for uffd-wp protected ptes config: x86_64-randconfig-a012 compiler: clang version 14.0.6 (https://github.com/llvm/llvm-project f28c006a5895fc0e329fe15fead81e37457cb1d1) reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # https://github.com/intel-lab-lkp/linux/commit/b103eae2926a263a15e262611524ca9efa8b969e git remote add linux-review https://github.com/intel-lab-lkp/linux git fetch --no-tags linux-review Peter-Xu/mm-migrate-Fix-writable-pte-for-read-migration-entry/20221111-043302 git checkout b103eae2926a263a15e262611524ca9efa8b969e # save the config file mkdir build_dir && cp config build_dir/.config COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash If you fix the issue, kindly add following tag where applicable | Reported-by: kernel test robot <lkp@intel.com> All errors (new ones prefixed by >>): In file included from arch/x86/kernel/early_printk.c:11: In file included from include/linux/pgtable.h:6: >> arch/x86/include/asm/pgtable.h:306:2: error: implicit declaration of function 'VM_WARN_ON_ONCE' is invalid in C99 [-Werror,-Wimplicit-function-declaration] VM_WARN_ON_ONCE(wp && pte_write(pte)); ^ 1 error generated. vim +/VM_WARN_ON_ONCE +306 arch/x86/include/asm/pgtable.h 290 291 #ifdef CONFIG_HAVE_ARCH_USERFAULTFD_WP 292 static inline int pte_uffd_wp(pte_t pte) 293 { 294 bool wp = pte_flags(pte) & _PAGE_UFFD_WP; 295 296 /* 297 * Having write bit for wr-protect-marked present ptes is fatal, 298 * because it means the uffd-wp bit will be ignored and write will 299 * just go through. 300 * 301 * Use any chance of pgtable walking to verify this (e.g., when 302 * page swapped out or being migrated for all purposes). It means 303 * something is already wrong. Tell the admin even before the 304 * process crashes. We also nail it with wrong pgtable setup. 305 */ > 306 VM_WARN_ON_ONCE(wp && pte_write(pte)); 307 308 return wp; 309 } 310
On Sat, Nov 12, 2022 at 06:06:22AM +0800, kernel test robot wrote: > vim +306 arch/x86/include/asm/pgtable.h > > 290 > 291 #ifdef CONFIG_HAVE_ARCH_USERFAULTFD_WP > 292 static inline int pte_uffd_wp(pte_t pte) > 293 { > 294 bool wp = pte_flags(pte) & _PAGE_UFFD_WP; > 295 > 296 /* > 297 * Having write bit for wr-protect-marked present ptes is fatal, > 298 * because it means the uffd-wp bit will be ignored and write will > 299 * just go through. > 300 * > 301 * Use any chance of pgtable walking to verify this (e.g., when > 302 * page swapped out or being migrated for all purposes). It means > 303 * something is already wrong. Tell the admin even before the > 304 * process crashes. We also nail it with wrong pgtable setup. > 305 */ > > 306 VM_WARN_ON_ONCE(wp && pte_write(pte)); I just saw the comment in check_pgprot() right below: /* mmdebug.h can not be included here because of dependencies */ #ifdef CONFIG_DEBUG_VM ... #endif I'll repost, will be the same as v1 code-wise.
diff --git a/arch/x86/include/asm/pgtable.h b/arch/x86/include/asm/pgtable.h index 5059799bebe3..64141acf70c8 100644 --- a/arch/x86/include/asm/pgtable.h +++ b/arch/x86/include/asm/pgtable.h @@ -291,7 +291,21 @@ static inline pte_t pte_clear_flags(pte_t pte, pteval_t clear) #ifdef CONFIG_HAVE_ARCH_USERFAULTFD_WP static inline int pte_uffd_wp(pte_t pte) { - return pte_flags(pte) & _PAGE_UFFD_WP; + bool wp = pte_flags(pte) & _PAGE_UFFD_WP; + + /* + * Having write bit for wr-protect-marked present ptes is fatal, + * because it means the uffd-wp bit will be ignored and write will + * just go through. + * + * Use any chance of pgtable walking to verify this (e.g., when + * page swapped out or being migrated for all purposes). It means + * something is already wrong. Tell the admin even before the + * process crashes. We also nail it with wrong pgtable setup. + */ + VM_WARN_ON_ONCE(wp && pte_write(pte)); + + return wp; } static inline pte_t pte_mkuffd_wp(pte_t pte)