From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1E2F5D2E01A for ; Wed, 23 Oct 2024 06:24:26 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 36FCF6B0085; Wed, 23 Oct 2024 02:24:26 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 2F9266B0088; Wed, 23 Oct 2024 02:24:26 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 1C1B16B0089; Wed, 23 Oct 2024 02:24:26 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id F29506B0085 for ; Wed, 23 Oct 2024 02:24:25 -0400 (EDT) Received: from smtpin04.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id EC0E71C48F9 for ; Wed, 23 Oct 2024 06:24:05 +0000 (UTC) X-FDA: 82703877354.04.445488B Received: from mail-ed1-f73.google.com (mail-ed1-f73.google.com [209.85.208.73]) by imf24.hostedemail.com (Postfix) with ESMTP id E99E518000C for ; Wed, 23 Oct 2024 06:24:20 +0000 (UTC) Authentication-Results: imf24.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=uYjxdNVN; spf=pass (imf24.hostedemail.com: domain of 3lZYYZwcKCGQFXaWMQXIQQING.EQONKPWZ-OOMXCEM.QTI@flex--dvyukov.bounces.google.com designates 209.85.208.73 as permitted sender) smtp.mailfrom=3lZYYZwcKCGQFXaWMQXIQQING.EQONKPWZ-OOMXCEM.QTI@flex--dvyukov.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1729664586; a=rsa-sha256; cv=none; b=eCflvvc7qR+mW4JGO0IYHWOmvybWXw8zoDgvSGSMSS4t2/iAKJJX6lKfhwWWhQHoNN716m ruThQpl9RPumCVrKF2c5N+MemYr4gKdDnQb7nRlWC5HWMUNxXKJsHc4xluFuIT4Y/XCmrL rFDrqQ31V/JYWDUXk0u1h9JqDzj0iKk= ARC-Authentication-Results: i=1; imf24.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=uYjxdNVN; spf=pass (imf24.hostedemail.com: domain of 3lZYYZwcKCGQFXaWMQXIQQING.EQONKPWZ-OOMXCEM.QTI@flex--dvyukov.bounces.google.com designates 209.85.208.73 as permitted sender) smtp.mailfrom=3lZYYZwcKCGQFXaWMQXIQQING.EQONKPWZ-OOMXCEM.QTI@flex--dvyukov.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1729664586; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=Kmf/1xEzbwqpAKJt9go6uvl87csSe+TqzWzUtyTAm8I=; b=aN4rxwNFmQ4Ugwjrd3DPDPaGkHlPUct8cv+m1sd/ql0vx3gSDpMY+NWt1zYrYMeucAMHXX kcH+BCpVRKrnpdE/goSx1SVwPvclULSIcM00mowk+iWwaJwFjRcUDnuHBS3qFtVgcBKTPe TuyUomsi1CPW74H3DyHjJxTjYgRhKEE= Received: by mail-ed1-f73.google.com with SMTP id 4fb4d7f45d1cf-5c937403b2bso4316454a12.1 for ; Tue, 22 Oct 2024 23:24:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1729664662; x=1730269462; darn=kvack.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=Kmf/1xEzbwqpAKJt9go6uvl87csSe+TqzWzUtyTAm8I=; b=uYjxdNVNqR5pd0nke1b082/jCFwXfwmsfpRKAUfmWNJo7kWckYnblo4iJQ2yVJZRyq 0OYoFcHBLkjiW/EbvEr+H5kwg2m6SDh4xq7sJAT8VtKpdOS42nxf8gcw37wZeMew9OwO 8PHaSFFjiLstieWzJx/ifb+UzH5OCRXukmPGtrY0fposjmIE+D200b7hnr+8+Dd4/7zX 9Y3mFeObrBBcMJi6TQgmxwU+12XzP8axMvg+ZEYEpyPS+JykEE42t6zFrn4japAnCPEt YDLBWMa88TSlGdgwjuhJuSj57WKxjawPC5pkQZuY6IOP+ZsZvkjpKLnuHmPXDR/jr69k CoiQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1729664662; x=1730269462; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=Kmf/1xEzbwqpAKJt9go6uvl87csSe+TqzWzUtyTAm8I=; b=M40bPqGFXe3J1A454eU/6kBupN5e3/RZMxPvQGVViMFZLMCAR4/tH8IkK4sNUZM3GQ ChalxqMtJZSn4wwFO3GOHQE0xGANwGY3/EW9/v2ap+Wiiud6bhPK2LJAgc85zZeDvfU2 3NDpz/rRfRBan1HRs0m7HUALfsXQW/2FdZ7ykv30AzUsyRkF7Hl7GQ6T1v+dmCLtMngV G4JdU803XZETBz/c/ZECqG55GMzVX7z0mpTRKo5Tk56Bxmj+3YenVpLtfVl1jTI7QH74 apTKjiGFrZT/+0Q7wCzsdHPJHWWVWuPW/ZBTT9lhdLMJNAkSM2QSm/e9UtieWy3za+Lw iIXQ== X-Forwarded-Encrypted: i=1; AJvYcCWCs8Vpwl+MujhERvmzCbIEeeUqgdtT6SXT9Onu1PC5u0rQRiRPsOet2D28+ScXGoPghAFcWprxMA==@kvack.org X-Gm-Message-State: AOJu0YzeD3IXuAnF6kmkIyH+gdWfJMPaqbUYZmjsJOnTFc/cok8iiOdP QkddOiuBS2WPmUiMmh2za6HYIYPsA5Q8wZdba4ehV41XzKfJt98gQZObJA/L0Mm6ioJKr24AhE9 rtggwqA== X-Google-Smtp-Source: AGHT+IH2bi6zc9dFjuEaAFUh7qdl0Clkcf7sHX1Yomy2F23FgFUOKN443WAQT8QytBDy9+TF/aj9qhft85qo X-Received: from dvyukov9.muc.corp.google.com ([2a00:79e0:9c:201:6e9d:53fb:bcc1:7c2d]) (user=dvyukov job=sendgmr) by 2002:a05:6402:3482:b0:5c9:5cbf:e5b9 with SMTP id 4fb4d7f45d1cf-5cb8b20d251mr583a12.8.1729664661613; Tue, 22 Oct 2024 23:24:21 -0700 (PDT) Date: Wed, 23 Oct 2024 08:24:17 +0200 In-Reply-To: <87a5eysmj1.fsf@mid.deneb.enyo.de> Mime-Version: 1.0 References: <87a5eysmj1.fsf@mid.deneb.enyo.de> X-Mailer: git-send-email 2.47.0.105.g07ac214952-goog Message-ID: <20241023062417.3862170-1-dvyukov@google.com> Subject: Re: [PATCH v2 0/5] implement lightweight guard pages From: Dmitry Vyukov To: fw@deneb.enyo.de Cc: James.Bottomley@HansenPartnership.com, Liam.Howlett@oracle.com, akpm@linux-foundation.org, arnd@arndb.de, brauner@kernel.org, chris@zankel.net, david@redhat.com, deller@gmx.de, hch@infradead.org, ink@jurassic.park.msu.ru, jannh@google.com, jcmvbkbc@gmail.com, jeffxu@chromium.org, jhubbard@nvidia.com, linux-alpha@vger.kernel.org, linux-api@vger.kernel.org, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-mips@vger.kernel.org, linux-mm@kvack.org, linux-parisc@vger.kernel.org, lorenzo.stoakes@oracle.com, mattst88@gmail.com, muchun.song@linux.dev, paulmck@kernel.org, richard.henderson@linaro.org, shuah@kernel.org, sidhartha.kumar@oracle.com, surenb@google.com, tsbogend@alpha.franken.de, vbabka@suse.cz, willy@infradead.org, elver@google.com Content-Type: text/plain; charset="UTF-8" X-Stat-Signature: 4pw1g61c9kpmy1mq6k3t9zx66jenqkzj X-Rspamd-Queue-Id: E99E518000C X-Rspam-User: X-Rspamd-Server: rspam10 X-HE-Tag: 1729664660-833107 X-HE-Meta: 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 FGnmG+ax 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.011233, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Florian, Lorenzo, This looks great! What I am VERY interested in is if poisoned pages cause SIGSEGV even when the access happens in the kernel. Namely, the syscall still returns EFAULT, but also SIGSEGV is queued on return to user-space. Catching bad accesses in system calls is currently the weak spot for all user-space bug detection tools (GWP-ASan, libefence, libefency, etc). It's almost possible with userfaultfd, but catching faults in the kernel requires admin capability, so not really an option for generic bug detection tools (+inconvinience of userfaultfd setup/handler). Intercepting all EFAULT from syscalls is not generally possible (w/o ptrace, usually not an option as well), and EFAULT does not always mean a bug. Triggering SIGSEGV even in syscalls would be not just a performance optimization, but a new useful capability that would allow it to catch more bugs. Thanks