From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id EFC2FE77173 for ; Fri, 6 Dec 2024 16:04:03 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 694706B0298; Fri, 6 Dec 2024 11:04:03 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 643A36B0299; Fri, 6 Dec 2024 11:04:03 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3FB806B029A; Fri, 6 Dec 2024 11:04:03 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 200436B0297 for ; Fri, 6 Dec 2024 11:04:03 -0500 (EST) Received: from smtpin06.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id D3E5EB025B for ; Fri, 6 Dec 2024 16:04:02 +0000 (UTC) X-FDA: 82865004852.06.65156D7 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by imf01.hostedemail.com (Postfix) with ESMTP id 594FA40016 for ; Fri, 6 Dec 2024 16:03:47 +0000 (UTC) Authentication-Results: imf01.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=BKH62KFT; spf=pass (imf01.hostedemail.com: domain of david@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=none) header.from=redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1733501023; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=k+adP35zR2zQlyOhfBGiAnpN/hIukFG9TUTEXZ4dwEk=; b=alnIEjNxZDhzbyjupLP/eFr+jfeD50XD4F9Y9Yzs5UEIzAwyG4cq1AFSNZM5FQk5HYOJQA khw04nB8FpwtUPc4Pe6UEdUF/PCMF+OeWfFPGB8vxpIdwWGa+mVuc9u+9U2uBrz0yxwtuT F+YuoJYCxk5RQQbTXEf0T2+Qb+SDauU= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1733501023; a=rsa-sha256; cv=none; b=ShS2sePKiEKZrNW11uNWtVsAC3B486w+nLCo14hrcPDW8eX+SGMea+q46Qj47ImgFxT2pK SQK53Zk/uBkxQO+O22Zy/ypvoDTuRYr6U4hCdAlsAxJ4hj+7CkBToeGhxBcqjS83Uvt7IK jWW62VuE/vNm1jdblCkVndf5sxHtmuk= ARC-Authentication-Results: i=1; imf01.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=BKH62KFT; spf=pass (imf01.hostedemail.com: domain of david@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=none) header.from=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1733501039; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=k+adP35zR2zQlyOhfBGiAnpN/hIukFG9TUTEXZ4dwEk=; b=BKH62KFTJ7v7UPHNfrk4Dix33A7UlkyMReH7C9Bdmu0dJKH/wvL5G4XBrkH3MiotU7NFQI Gzc96g6hVQmCDOa/HjcOFed0pKQifrAo3osURxCWDSbzrnWrRinI7Ku4KOxKfOYLQmcc3u eFsiTDcxGAp+cLsvepgiPT/lGJZx8RY= Received: from mail-wm1-f69.google.com (mail-wm1-f69.google.com [209.85.128.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-35-JzOR7t_2P-Sco9BVQX6MhA-1; Fri, 06 Dec 2024 11:03:58 -0500 X-MC-Unique: JzOR7t_2P-Sco9BVQX6MhA-1 X-Mimecast-MFC-AGG-ID: JzOR7t_2P-Sco9BVQX6MhA Received: by mail-wm1-f69.google.com with SMTP id 5b1f17b1804b1-434a04437cdso14486295e9.2 for ; Fri, 06 Dec 2024 08:03:58 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1733501037; x=1734105837; h=content-transfer-encoding:in-reply-to:organization:autocrypt :content-language:from:references:cc:to:subject:user-agent :mime-version:date:message-id:x-gm-message-state:from:to:cc:subject :date:message-id:reply-to; bh=k+adP35zR2zQlyOhfBGiAnpN/hIukFG9TUTEXZ4dwEk=; b=nxRW+cwRstAnQk17oEjuSCprFswL/KozHjDgNktYmqXR8R+jSOCWOwHvL7GAO0fZfR /Vv56Y0N8lPe/ElUSompRG1rQn+k5rgrK5jL1lRYbnTzdcaHVuMD8EQP3vyqEQuH5yXi 2tCsoP0Jps94XILnwsq22T412Y12E+y8+2xRFVKRT870d3o3pA60m/67IVyeZKylu524 tXPx38ll1jAA6tkMEoLpYI2Myuxx2OQhjgtC5Qy4JD2uFbd9Wfas16VHe2kB5OwSiwav Qdv82WakSwIgfXBPQ7QLOTJrlpSjiDRAARzfFyOufCQ7RLmuam24ZFsKnyQT+aj54yeS MPgg== X-Gm-Message-State: AOJu0YxYMYfCUBbcRSarwOtABu0lEUMXE1nUM/Ke3Jhr7brrs9HFLrd5 GRRGkSbZNhHNrmJClHpRKJDTi44Bt4TLPx/tWAC6dBERDqTMrsFqpP4/Cu3qEqRRdzTA8J1/Q70 wawWN5s85gYA49IIAl3TM5I0hWI24HtjEuB9V1l7ukXY0z1QH X-Gm-Gg: ASbGncs0uFlWkQSfqgril7JhO2H4d1JfH5fR+GqHSHncedxyNIT1hXtFF/k+9qWdbsW QDThqpk1RI2cCOJ2xFBF1u8qcMLoc2YB6pzRCExheUulgF9Lz6b9ZWOUkkHRKeunzrniizgmtSy NXA+BiGzzqYeYChcnkhhBcHKvmp1z8e3gYXbSDiU9clka9mC+5YMzC1ABMPGYaSCVOCBDDKq/Sq oBEBtZOppe845U5A6+eUjPLEoZHmi2H+WOi3WWlZ789dk/KbYQnOU4C2dgYmrTslW3K2W41iKCL 7Sqv5IXcO3GSkQDiI47M/32rTlWp6mBfvLds8kBmnjkfKbGDS896v3c9L4ftEHqZTVvbQnO0+G5 kvw== X-Received: by 2002:a05:600c:1c0e:b0:434:a378:51a8 with SMTP id 5b1f17b1804b1-434dded5d0emr32151525e9.27.1733501036961; Fri, 06 Dec 2024 08:03:56 -0800 (PST) X-Google-Smtp-Source: AGHT+IGv36Qi/GQneGq9bATglVFTQS/fXeOiFfQylsx9fBe93k0Qrr1y7r5aMLEG1Pc/st3unUEnuQ== X-Received: by 2002:a05:600c:1c0e:b0:434:a378:51a8 with SMTP id 5b1f17b1804b1-434dded5d0emr32150975e9.27.1733501036502; Fri, 06 Dec 2024 08:03:56 -0800 (PST) Received: from ?IPV6:2003:cb:c71b:d000:1d1f:238e:aeaf:dbf7? (p200300cbc71bd0001d1f238eaeafdbf7.dip0.t-ipconnect.de. [2003:cb:c71b:d000:1d1f:238e:aeaf:dbf7]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-386219096adsm4974931f8f.85.2024.12.06.08.03.55 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 06 Dec 2024 08:03:55 -0800 (PST) Message-ID: <8395af7d-328a-425c-84a7-517e78a602b1@redhat.com> Date: Fri, 6 Dec 2024 17:03:55 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v4] mm/hugetlb: support FOLL_FORCE|FOLL_WRITE To: Guillaume Morin , linux-kernel@vger.kernel.org Cc: linux-mm@kvack.org, Muchun Song , Andrew Morton , Peter Xu , Eric Hagberg References: From: David Hildenbrand Autocrypt: addr=david@redhat.com; keydata= xsFNBFXLn5EBEAC+zYvAFJxCBY9Tr1xZgcESmxVNI/0ffzE/ZQOiHJl6mGkmA1R7/uUpiCjJ dBrn+lhhOYjjNefFQou6478faXE6o2AhmebqT4KiQoUQFV4R7y1KMEKoSyy8hQaK1umALTdL QZLQMzNE74ap+GDK0wnacPQFpcG1AE9RMq3aeErY5tujekBS32jfC/7AnH7I0v1v1TbbK3Gp XNeiN4QroO+5qaSr0ID2sz5jtBLRb15RMre27E1ImpaIv2Jw8NJgW0k/D1RyKCwaTsgRdwuK Kx/Y91XuSBdz0uOyU/S8kM1+ag0wvsGlpBVxRR/xw/E8M7TEwuCZQArqqTCmkG6HGcXFT0V9 PXFNNgV5jXMQRwU0O/ztJIQqsE5LsUomE//bLwzj9IVsaQpKDqW6TAPjcdBDPLHvriq7kGjt WhVhdl0qEYB8lkBEU7V2Yb+SYhmhpDrti9Fq1EsmhiHSkxJcGREoMK/63r9WLZYI3+4W2rAc UucZa4OT27U5ZISjNg3Ev0rxU5UH2/pT4wJCfxwocmqaRr6UYmrtZmND89X0KigoFD/XSeVv jwBRNjPAubK9/k5NoRrYqztM9W6sJqrH8+UWZ1Idd/DdmogJh0gNC0+N42Za9yBRURfIdKSb B3JfpUqcWwE7vUaYrHG1nw54pLUoPG6sAA7Mehl3nd4pZUALHwARAQABzSREYXZpZCBIaWxk ZW5icmFuZCA8ZGF2aWRAcmVkaGF0LmNvbT7CwZgEEwEIAEICGwMGCwkIBwMCBhUIAgkKCwQW AgMBAh4BAheAAhkBFiEEG9nKrXNcTDpGDfzKTd4Q9wD/g1oFAl8Ox4kFCRKpKXgACgkQTd4Q 9wD/g1oHcA//a6Tj7SBNjFNM1iNhWUo1lxAja0lpSodSnB2g4FCZ4R61SBR4l/psBL73xktp rDHrx4aSpwkRP6Epu6mLvhlfjmkRG4OynJ5HG1gfv7RJJfnUdUM1z5kdS8JBrOhMJS2c/gPf wv1TGRq2XdMPnfY2o0CxRqpcLkx4vBODvJGl2mQyJF/gPepdDfcT8/PY9BJ7FL6Hrq1gnAo4 3Iv9qV0JiT2wmZciNyYQhmA1V6dyTRiQ4YAc31zOo2IM+xisPzeSHgw3ONY/XhYvfZ9r7W1l pNQdc2G+o4Di9NPFHQQhDw3YTRR1opJaTlRDzxYxzU6ZnUUBghxt9cwUWTpfCktkMZiPSDGd KgQBjnweV2jw9UOTxjb4LXqDjmSNkjDdQUOU69jGMUXgihvo4zhYcMX8F5gWdRtMR7DzW/YE BgVcyxNkMIXoY1aYj6npHYiNQesQlqjU6azjbH70/SXKM5tNRplgW8TNprMDuntdvV9wNkFs 9TyM02V5aWxFfI42+aivc4KEw69SE9KXwC7FSf5wXzuTot97N9Phj/Z3+jx443jo2NR34XgF 89cct7wJMjOF7bBefo0fPPZQuIma0Zym71cP61OP/i11ahNye6HGKfxGCOcs5wW9kRQEk8P9 M/k2wt3mt/fCQnuP/mWutNPt95w9wSsUyATLmtNrwccz63XOwU0EVcufkQEQAOfX3n0g0fZz Bgm/S2zF/kxQKCEKP8ID+Vz8sy2GpDvveBq4H2Y34XWsT1zLJdvqPI4af4ZSMxuerWjXbVWb T6d4odQIG0fKx4F8NccDqbgHeZRNajXeeJ3R7gAzvWvQNLz4piHrO/B4tf8svmRBL0ZB5P5A 2uhdwLU3NZuK22zpNn4is87BPWF8HhY0L5fafgDMOqnf4guJVJPYNPhUFzXUbPqOKOkL8ojk CXxkOFHAbjstSK5Ca3fKquY3rdX3DNo+EL7FvAiw1mUtS+5GeYE+RMnDCsVFm/C7kY8c2d0G NWkB9pJM5+mnIoFNxy7YBcldYATVeOHoY4LyaUWNnAvFYWp08dHWfZo9WCiJMuTfgtH9tc75 7QanMVdPt6fDK8UUXIBLQ2TWr/sQKE9xtFuEmoQGlE1l6bGaDnnMLcYu+Asp3kDT0w4zYGsx 5r6XQVRH4+5N6eHZiaeYtFOujp5n+pjBaQK7wUUjDilPQ5QMzIuCL4YjVoylWiBNknvQWBXS lQCWmavOT9sttGQXdPCC5ynI+1ymZC1ORZKANLnRAb0NH/UCzcsstw2TAkFnMEbo9Zu9w7Kv AxBQXWeXhJI9XQssfrf4Gusdqx8nPEpfOqCtbbwJMATbHyqLt7/oz/5deGuwxgb65pWIzufa N7eop7uh+6bezi+rugUI+w6DABEBAAHCwXwEGAEIACYCGwwWIQQb2cqtc1xMOkYN/MpN3hD3 AP+DWgUCXw7HsgUJEqkpoQAKCRBN3hD3AP+DWrrpD/4qS3dyVRxDcDHIlmguXjC1Q5tZTwNB boaBTPHSy/Nksu0eY7x6HfQJ3xajVH32Ms6t1trDQmPx2iP5+7iDsb7OKAb5eOS8h+BEBDeq 3ecsQDv0fFJOA9ag5O3LLNk+3x3q7e0uo06XMaY7UHS341ozXUUI7wC7iKfoUTv03iO9El5f XpNMx/YrIMduZ2+nd9Di7o5+KIwlb2mAB9sTNHdMrXesX8eBL6T9b+MZJk+mZuPxKNVfEQMQ a5SxUEADIPQTPNvBewdeI80yeOCrN+Zzwy/Mrx9EPeu59Y5vSJOx/z6OUImD/GhX7Xvkt3kq Er5KTrJz3++B6SH9pum9PuoE/k+nntJkNMmQpR4MCBaV/J9gIOPGodDKnjdng+mXliF3Ptu6 3oxc2RCyGzTlxyMwuc2U5Q7KtUNTdDe8T0uE+9b8BLMVQDDfJjqY0VVqSUwImzTDLX9S4g/8 kC4HRcclk8hpyhY2jKGluZO0awwTIMgVEzmTyBphDg/Gx7dZU1Xf8HFuE+UZ5UDHDTnwgv7E th6RC9+WrhDNspZ9fJjKWRbveQgUFCpe1sa77LAw+XFrKmBHXp9ZVIe90RMe2tRL06BGiRZr jPrnvUsUUsjRoRNJjKKA/REq+sAnhkNPPZ/NNMjaZ5b8Tovi8C0tmxiCHaQYqj7G2rgnT0kt WNyWQQ== Organization: Red Hat In-Reply-To: X-Mimecast-Spam-Score: 0 X-Mimecast-MFC-PROC-ID: Iug0vxwoCJ68K64ZYFDcOiSTjloGqCx72yvBwTDEnPg_1733501037 X-Mimecast-Originator: redhat.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 594FA40016 X-Rspam-User: X-Rspamd-Server: rspam07 X-Stat-Signature: fxs4e1yqeywjan4414gbk7s15rk7pktc X-HE-Tag: 1733501027-87034 X-HE-Meta: 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 Xv2VB3eL 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 06.12.24 15:49, Guillaume Morin wrote: > Eric reported that PTRACE_POKETEXT fails when applications use hugetlb > for mapping text using huge pages. Before commit 1d8d14641fd9 > ("mm/hugetlb: support write-faults in shared mappings"), PTRACE_POKETEXT > worked by accident, but it was buggy and silently ended up mapping pages > writable into the page tables even though VM_WRITE was not set. > > In general, FOLL_FORCE|FOLL_WRITE does currently not work with hugetlb. > Let's implement FOLL_FORCE|FOLL_WRITE properly for hugetlb, such that > what used to work in the past by accident now properly works, allowing > applications using hugetlb for text etc. to get properly debugged. > > This change might also be required to implement uprobes support for > hugetlb [1]. > > [1] https://lore.kernel.org/lkml/ZiK50qob9yl5e0Xz@bender.morinfr.org/ > > Cc: Muchun Song > Cc: Andrew Morton > Cc: Peter Xu > Cc: David Hildenbrand > Cc: Eric Hagberg > Signed-off-by: Guillaume Morin > --- > Changes in v2: > - Improved commit message > Changes in v3: > - Fix potential unitialized mem access in follow_huge_pud > - define pud_soft_dirty when soft dirty is not enabled > Changes in v4: > - Remove the soft dirty pud check > - Remove the pud_soft_dirty added in v3 > > mm/gup.c | 95 +++++++++++++++++++++++++--------------------------- > mm/hugetlb.c | 20 ++++++----- > 2 files changed, 57 insertions(+), 58 deletions(-) > > diff --git a/mm/gup.c b/mm/gup.c > index 746070a1d8bf..63c705ff4162 100644 > --- a/mm/gup.c > +++ b/mm/gup.c > @@ -587,6 +587,33 @@ static struct folio *try_grab_folio_fast(struct page *page, int refs, > } > #endif /* CONFIG_HAVE_GUP_FAST */ > > +/* Common code for can_follow_write_* */ > +static inline bool can_follow_write_common(struct page *page, > + struct vm_area_struct *vma, unsigned int flags) > +{ > + /* Maybe FOLL_FORCE is set to override it? */ > + if (!(flags & FOLL_FORCE)) > + return false; > + > + /* But FOLL_FORCE has no effect on shared mappings */ > + if (vma->vm_flags & (VM_MAYSHARE | VM_SHARED)) > + return false; > + > + /* ... or read-only private ones */ > + if (!(vma->vm_flags & VM_MAYWRITE)) > + return false; > + > + /* ... or already writable ones that just need to take a write fault */ > + if (vma->vm_flags & VM_WRITE) > + return false; > + > + /* > + * See can_change_pte_writable(): we broke COW and could map the page > + * writable if we have an exclusive anonymous page ... > + */ > + return page && PageAnon(page) && PageAnonExclusive(page); > +} > + > static struct page *no_page_table(struct vm_area_struct *vma, > unsigned int flags, unsigned long address) > { > @@ -613,6 +640,18 @@ static struct page *no_page_table(struct vm_area_struct *vma, > } > > #ifdef CONFIG_PGTABLE_HAS_HUGE_LEAVES > +/* FOLL_FORCE can write to even unwritable PUDs in COW mappings. */ > +static inline bool can_follow_write_pud(pud_t pud, struct page *page, > + struct vm_area_struct *vma, > + unsigned int flags) > +{ > + /* If the pud is writable, we can write to the page. */ > + if (pud_write(pud)) > + return true; > + > + return can_follow_write_common(page, vma, flags); > +} > + > static struct page *follow_huge_pud(struct vm_area_struct *vma, > unsigned long addr, pud_t *pudp, > int flags, struct follow_page_context *ctx) > @@ -625,13 +664,16 @@ static struct page *follow_huge_pud(struct vm_area_struct *vma, > > assert_spin_locked(pud_lockptr(mm, pudp)); > > - if ((flags & FOLL_WRITE) && !pud_write(pud)) > + pfn += (addr & ~PUD_MASK) >> PAGE_SHIFT; > + page = pfn_to_page(pfn); > + > + if ((flags & FOLL_WRITE) && > + !can_follow_write_pud(pud, page, vma, flags)) > return NULL; > > if (!pud_present(pud)) > return NULL; > > - pfn += (addr & ~PUD_MASK) >> PAGE_SHIFT; That looks wrong. See follow_huge_pmd() for reference (1) You must not do a pfn_to_page() before we verified that we have a present PUD. (2) can_follow_write_pud() must be called with the first mapped page. It would currently with hugetlb not be strictly required, but is not future proof. It must be likely be something like: if (!pud_present(pud)) return NULL; if ((flags & FOLL_WRITE) && !can_follow_write_pud(pud, pfn_to_page(pfn), vma, flags)) return NULL; pfn += (addr & ~PUD_MASK) >> PAGE_SHIFT; page = pfn_to_page(pfn); > > delayacct_wpcopy_end(); > return 0; > @@ -5943,7 +5944,8 @@ static vm_fault_t hugetlb_wp(struct folio *pagecache_folio, > spin_lock(vmf->ptl); > vmf->pte = hugetlb_walk(vma, vmf->address, huge_page_size(h)); > if (likely(vmf->pte && pte_same(huge_ptep_get(mm, vmf->address, vmf->pte), pte))) { > - pte_t newpte = make_huge_pte(vma, &new_folio->page, !unshare); > + const bool writable = !unshare && (vma->vm_flags & VM_WRITE); > + pte_t newpte = make_huge_pte(vma, &new_folio->page, writable); ); You probably missed my earlier comment. After the recent changes to make_huge_pte() that are already in mm/mm-unstable, this hunk can be dropped and left unchanged. make_huge_pte() will perform the VM_WRITE check. -- Cheers, David / dhildenb