From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 340D7C38142 for ; Mon, 23 Jan 2023 09:16:47 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id BF1A06B0071; Mon, 23 Jan 2023 04:16:46 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id BA1616B0072; Mon, 23 Jan 2023 04:16:46 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A1AED6B0073; Mon, 23 Jan 2023 04:16:46 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id 91BDD6B0071 for ; Mon, 23 Jan 2023 04:16:46 -0500 (EST) Received: from smtpin11.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 50FE1C0138 for ; Mon, 23 Jan 2023 09:16:46 +0000 (UTC) X-FDA: 80385508812.11.A1C7531 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by imf30.hostedemail.com (Postfix) with ESMTP id 09E308001B for ; Mon, 23 Jan 2023 09:16:43 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=AYBf8vU+; spf=pass (imf30.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=none) header.from=redhat.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1674465404; a=rsa-sha256; cv=none; b=HFAJTKvKwJmwAbteSTWpRkW2IyzzANnxAKE9oztopm4COEOp+4uNw9T+rqjqj1nuzjCosk fxD5EDj3N0YSWro4ITMl4BTd3lf07p5s/WPbC9Pybv4PKE4JKKGjNTmPKa8xBFNWJDxn3E G38OHKf6yfKHq9WgP8Hwa1WH/xNUJuo= ARC-Authentication-Results: i=1; imf30.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=AYBf8vU+; spf=pass (imf30.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=none) header.from=redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1674465404; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=k8JcC6eIt+iMfSq8qeJsa8sN2OBxI65CeQDKnD44YXg=; b=iz1ep5GEIScdVMc70wwGACZbseBxcLPFOSNQdlqasURrci8ZpHx4OBQXAj0H3+elsjSoqG IOGylX+brwuiTkP83NxK/d/aDBy6ZNqluSeL2NMMLyQNbcO0YthDysMgIVYY9mV00opboy 4aKBjYl6FkbDkwlak2txS+NmjjEIa1A= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1674465403; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=k8JcC6eIt+iMfSq8qeJsa8sN2OBxI65CeQDKnD44YXg=; b=AYBf8vU+Xd7/EoOazxC8CWHn+8OgsIE6PrFgpnKQk21C50K6H0SIY5ZE/kbLcklQOwHAkg J3sfC9nfJAwOCxd3NPcTf/gNWnIduNcgPC37RPjOZFRlnguy39cLtn1KVAho2X1N2i3wcj e+q+LVwtjUcrPMRyusP6Eu07u8zXqPo= Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com [209.85.128.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_128_GCM_SHA256) id us-mta-108-VIMYamnfOv6dfhVT2fTsuw-1; Mon, 23 Jan 2023 04:16:42 -0500 X-MC-Unique: VIMYamnfOv6dfhVT2fTsuw-1 Received: by mail-wm1-f72.google.com with SMTP id 12-20020a05600c228c00b003db09699216so2620749wmf.1 for ; Mon, 23 Jan 2023 01:16:41 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:in-reply-to:organization:from:references :cc:to:content-language:subject:user-agent:mime-version:date :message-id:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=k8JcC6eIt+iMfSq8qeJsa8sN2OBxI65CeQDKnD44YXg=; b=EB6JgxocX9elhaNd3LA/pYGtzqmkiMsJzgS60LNSIHTSvbXTZB6IFcMNR6+AqQoBC4 +GHNZIjTG0p5qFjmjnweUBbVhqo5MzCVDxrAhPq5EkIygorMvfxf+zQxSjflZXINh6PV KqtgLo8CWIT4KUC+MguJhFHk4EVGgKzG8qIMF7dwnZp3ghiWDeE3DWx2hP/zvz5svUob kgkyXXekm/qKR0029ZOsSUbv90RNzrqqR2Tgp+Dcr3fYHProHWcUGmZuEtGvekRyLdd+ G9We68w30l50/PBCePxnZGtRz4FSmENf9F/jZ4FxipXUsz1lqFcyselytEGa/S5YnsPl HnYg== X-Gm-Message-State: AFqh2kqbNQz8hV0FjahksGehhcB2h2w/J5qBw1zupNFuP4I8cF/7zh1D o8WKR340/mgU0WtHVnj6NbT+qLMG8CEZKt+pT7svVboVXxbn7hhNiLw6QfP92mbpmK4TCcGXiwR V4B/UNQyEou8= X-Received: by 2002:a05:600c:1c86:b0:3da:fa75:ce58 with SMTP id k6-20020a05600c1c8600b003dafa75ce58mr26719046wms.21.1674465400506; Mon, 23 Jan 2023 01:16:40 -0800 (PST) X-Google-Smtp-Source: AMrXdXuupSrdeuharN/DJudQsmcwvHAen3BCVSbfnv8VMnK/LetCsRFdTz9vm9krb5wqXvP+aX6kLg== X-Received: by 2002:a05:600c:1c86:b0:3da:fa75:ce58 with SMTP id k6-20020a05600c1c8600b003dafa75ce58mr26718979wms.21.1674465400042; Mon, 23 Jan 2023 01:16:40 -0800 (PST) Received: from ?IPV6:2003:cb:c704:1100:65a0:c03a:142a:f914? (p200300cbc704110065a0c03a142af914.dip0.t-ipconnect.de. [2003:cb:c704:1100:65a0:c03a:142a:f914]) by smtp.gmail.com with ESMTPSA id bi13-20020a05600c3d8d00b003daf98d7e35sm10026313wmb.14.2023.01.23.01.16.38 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 23 Jan 2023 01:16:39 -0800 (PST) Message-ID: <5ddbd710-1b4d-71ed-8dfe-928449a6f635@redhat.com> Date: Mon, 23 Jan 2023 10:16:37 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.6.0 Subject: Re: [PATCH v5 10/39] x86/mm: Introduce _PAGE_COW To: Rick Edgecombe , x86@kernel.org, "H . Peter Anvin" , Thomas Gleixner , Ingo Molnar , linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org, Arnd Bergmann , Andy Lutomirski , Balbir Singh , Borislav Petkov , Cyrill Gorcunov , Dave Hansen , Eugene Syromiatnikov , Florian Weimer , "H . J . Lu" , Jann Horn , Jonathan Corbet , Kees Cook , Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , Randy Dunlap , Weijiang Yang , "Kirill A . Shutemov" , John Allen , kcc@google.com, eranian@google.com, rppt@kernel.org, jamorris@linux.microsoft.com, dethoma@microsoft.com, akpm@linux-foundation.org, Andrew.Cooper3@citrix.com, christina.schimpe@intel.com Cc: Yu-cheng Yu References: <20230119212317.8324-1-rick.p.edgecombe@intel.com> <20230119212317.8324-11-rick.p.edgecombe@intel.com> From: David Hildenbrand Organization: Red Hat In-Reply-To: <20230119212317.8324-11-rick.p.edgecombe@intel.com> X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Rspam-User: X-Rspamd-Queue-Id: 09E308001B X-Rspamd-Server: rspam01 X-Stat-Signature: p18azwrart45hatr76x3b84pnd6x1u7g X-HE-Tag: 1674465403-117278 X-HE-Meta: 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 OYIcruQz 7AWjgW8QaEWodnvhERjyxfyiwdkDvZpl10J2SifUE1x6/CoWOTsH2o1omIFhmLB2+DRhPYZGMkcw+DZaGLLIdik6dNuwAvaAsNMIAB4XCktKkO7qva7buiC5p2jsSdSW1DrE0x4TUGimcXVpnRB0Buy4SXGFfjJ23oEqVZYSVR10rX/XrOTBcN6W69VTG6ILxP4x6PtmH3rL2DulbqgwEd/x/4GKH+Xl1B8XXq52P7tbgVvoeic7CGshqj96jdIew8unaR4CmnpkkhcenbC9z9QWH0ShJl5jefI9t3kE3tfsKluwa+qJrKIXxEHZx0sw0XTXsOHSKm6SeuvcgCZ6ES3D7HPRaN0aLcdQyKGeb8VJv7gRbA4/01tVF3+belvQWcQoFsx2GsKe/0tT9CQrozN/GbPznIUdnHzfiddbXajlTLpqFVSPkwRUXe0Yuu2VoGF+gW6mtuZld0RH0e8mj8VU+g7nbf9DzLQ4wms+kJP8t5x1sYMg5+pVOTaayZYZ5QSPgz9SrOPmLURqAgcSw/FbepeOuBcRaYeL1DjQkQuavT/Z5V6mFPylTWmfmc2QOza4r X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 19.01.23 22:22, Rick Edgecombe wrote: > Some OSes have a greater dependence on software available bits in PTEs than > Linux. That left the hardware architects looking for a way to represent a > new memory type (shadow stack) within the existing bits. They chose to > repurpose a lightly-used state: Write=0,Dirty=1. So in order to support > shadow stack memory, Linux should avoid creating memory with this PTE bit > combination unless it intends for it to be shadow stack. > > The reason it's lightly used is that Dirty=1 is normally set by HW > _before_ a write. A write with a Write=0 PTE would typically only generate > a fault, not set Dirty=1. Hardware can (rarely) both set Dirty=1 *and* > generate the fault, resulting in a Write=0,Dirty=1 PTE. Hardware which > supports shadow stacks will no longer exhibit this oddity. > > So that leaves Write=0,Dirty=1 PTEs created in software. To achieve this, > in places where Linux normally creates Write=0,Dirty=1, it can use the > software-defined _PAGE_COW in place of the hardware _PAGE_DIRTY. In other > words, whenever Linux needs to create Write=0,Dirty=1, it instead creates > Write=0,Cow=1 except for shadow stack, which is Write=0,Dirty=1. > Further differentiated by VMA flags, these PTE bit combinations would be > set as follows for various types of memory: > > (Write=0,Cow=1,Dirty=0): > - A modified, copy-on-write (COW) page. Previously when a typical > anonymous writable mapping was made COW via fork(), the kernel would > mark it Write=0,Dirty=1. Now it will instead use the Cow bit. This > happens in copy_present_pte(). > - A R/O page that has been COW'ed. The user page is in a R/O VMA, > and get_user_pages(FOLL_FORCE) needs a writable copy. The page fault > handler creates a copy of the page and sets the new copy's PTE as > Write=0 and Cow=1. > - A shared shadow stack PTE. When a shadow stack page is being shared > among processes (this happens at fork()), its PTE is made Dirty=0, so > the next shadow stack access causes a fault, and the page is > duplicated and Dirty=1 is set again. This is the COW equivalent for > shadow stack pages, even though it's copy-on-access rather than > copy-on-write. > > (Write=0,Cow=0,Dirty=1): > - A shadow stack PTE. > - A Cow PTE created when a processor without shadow stack support set > Dirty=1. > > There are six bits left available to software in the 64-bit PTE after > consuming a bit for _PAGE_COW. No space is consumed in 32-bit kernels > because shadow stacks are not enabled there. > > Implement only the infrastructure for _PAGE_COW. Changes to start > creating _PAGE_COW PTEs will follow once other pieces are in place. > > Tested-by: Pengfei Xu > Tested-by: John Allen > Co-developed-by: Yu-cheng Yu > Signed-off-by: Yu-cheng Yu > Signed-off-by: Rick Edgecombe > --- > > v5: > - Fix log, comments and whitespace (Boris) > - Remove capitalization on shadow stack (Boris) > > v4: > - Teach pte_flags_need_flush() about _PAGE_COW bit > - Break apart patch for better bisectability > > v3: > - Add comment around _PAGE_TABLE in response to comment > from (Andrew Cooper) > - Check for PSE in pmd_shstk (Andrew Cooper) > - Get to the point quicker in commit log (Andrew Cooper) > - Clarify and reorder commit log for why the PTE bit examples have > multiple entries. Apply same changes for comment. (peterz) > - Fix comment that implied dirty bit for COW was a specific x86 thing > (peterz) > - Fix swapping of Write/Dirty (PeterZ) > > v2: > - Update commit log with comments (Dave Hansen) > - Add comments in code to explain pte modification code better (Dave) > - Clarify info on the meaning of various Write,Cow,Dirty combinations > > arch/x86/include/asm/pgtable.h | 78 ++++++++++++++++++++++++++++ > arch/x86/include/asm/pgtable_types.h | 59 +++++++++++++++++++-- > arch/x86/include/asm/tlbflush.h | 3 +- > 3 files changed, 134 insertions(+), 6 deletions(-) > > diff --git a/arch/x86/include/asm/pgtable.h b/arch/x86/include/asm/pgtable.h > index b39f16c0d507..6d2f612c04b5 100644 > --- a/arch/x86/include/asm/pgtable.h > +++ b/arch/x86/include/asm/pgtable.h > @@ -301,6 +301,44 @@ static inline pte_t pte_clear_flags(pte_t pte, pteval_t clear) > return native_make_pte(v & ~clear); > } > > +/* > + * Normally COW memory can result in Dirty=1,Write=0 PTEs. But in the case > + * of X86_FEATURE_USER_SHSTK, the software COW bit is used, since the > + * Dirty=1,Write=0 will result in the memory being treated as shadow stack > + * by the HW. So when creating COW memory, a software bit is used > + * _PAGE_BIT_COW. The following functions pte_mkcow() and pte_clear_cow() > + * take a PTE marked conventionally COW (Dirty=1) and transition it to the > + * shadow stack compatible version of COW (Cow=1). > + */ > +static inline pte_t pte_mkcow(pte_t pte) > +{ > + if (!cpu_feature_enabled(X86_FEATURE_USER_SHSTK)) > + return pte; > + > + pte = pte_clear_flags(pte, _PAGE_DIRTY); > + return pte_set_flags(pte, _PAGE_COW); > +} > + > +static inline pte_t pte_clear_cow(pte_t pte) > +{ > + /* > + * _PAGE_COW is unnecessary on !X86_FEATURE_USER_SHSTK kernels, since > + * the HW dirty bit can be used without creating shadow stack memory. > + * See the _PAGE_COW definition for more details. > + */ > + if (!cpu_feature_enabled(X86_FEATURE_USER_SHSTK)) > + return pte; > + > + /* > + * PTE is getting copied-on-write, so it will be dirtied > + * if writable, or made shadow stack if shadow stack and > + * being copied on access. Set the dirty bit for both > + * cases. > + */ > + pte = pte_set_flags(pte, _PAGE_DIRTY); > + return pte_clear_flags(pte, _PAGE_COW); > +} > + > #ifdef CONFIG_HAVE_ARCH_USERFAULTFD_WP > static inline int pte_uffd_wp(pte_t pte) > { > @@ -413,6 +451,26 @@ static inline pmd_t pmd_clear_flags(pmd_t pmd, pmdval_t clear) > return native_make_pmd(v & ~clear); > } > > +/* See comments above pte_mkcow() */ > +static inline pmd_t pmd_mkcow(pmd_t pmd) > +{ > + if (!cpu_feature_enabled(X86_FEATURE_USER_SHSTK)) > + return pmd; > + > + pmd = pmd_clear_flags(pmd, _PAGE_DIRTY); > + return pmd_set_flags(pmd, _PAGE_COW); > +} > + > +/* See comments above pte_mkcow() */ > +static inline pmd_t pmd_clear_cow(pmd_t pmd) > +{ > + if (!cpu_feature_enabled(X86_FEATURE_USER_SHSTK)) > + return pmd; > + > + pmd = pmd_set_flags(pmd, _PAGE_DIRTY); > + return pmd_clear_flags(pmd, _PAGE_COW); > +} > + > #ifdef CONFIG_HAVE_ARCH_USERFAULTFD_WP > static inline int pmd_uffd_wp(pmd_t pmd) > { > @@ -484,6 +542,26 @@ static inline pud_t pud_clear_flags(pud_t pud, pudval_t clear) > return native_make_pud(v & ~clear); > } > > +/* See comments above pte_mkcow() */ > +static inline pud_t pud_mkcow(pud_t pud) > +{ > + if (!cpu_feature_enabled(X86_FEATURE_USER_SHSTK)) > + return pud; > + > + pud = pud_clear_flags(pud, _PAGE_DIRTY); > + return pud_set_flags(pud, _PAGE_COW); > +} > + > +/* See comments above pte_mkcow() */ > +static inline pud_t pud_clear_cow(pud_t pud) > +{ > + if (!cpu_feature_enabled(X86_FEATURE_USER_SHSTK)) > + return pud; > + > + pud = pud_set_flags(pud, _PAGE_DIRTY); > + return pud_clear_flags(pud, _PAGE_COW); > +} > + > static inline pud_t pud_mkold(pud_t pud) > { > return pud_clear_flags(pud, _PAGE_ACCESSED); > diff --git a/arch/x86/include/asm/pgtable_types.h b/arch/x86/include/asm/pgtable_types.h > index 0646ad00178b..5c3f942865d9 100644 > --- a/arch/x86/include/asm/pgtable_types.h > +++ b/arch/x86/include/asm/pgtable_types.h > @@ -21,7 +21,8 @@ > #define _PAGE_BIT_SOFTW2 10 /* " */ > #define _PAGE_BIT_SOFTW3 11 /* " */ > #define _PAGE_BIT_PAT_LARGE 12 /* On 2MB or 1GB pages */ > -#define _PAGE_BIT_SOFTW4 58 /* available for programmer */ > +#define _PAGE_BIT_SOFTW4 57 /* available for programmer */ > +#define _PAGE_BIT_SOFTW5 58 /* available for programmer */ > #define _PAGE_BIT_PKEY_BIT0 59 /* Protection Keys, bit 1/4 */ > #define _PAGE_BIT_PKEY_BIT1 60 /* Protection Keys, bit 2/4 */ > #define _PAGE_BIT_PKEY_BIT2 61 /* Protection Keys, bit 3/4 */ > @@ -34,6 +35,15 @@ > #define _PAGE_BIT_SOFT_DIRTY _PAGE_BIT_SOFTW3 /* software dirty tracking */ > #define _PAGE_BIT_DEVMAP _PAGE_BIT_SOFTW4 > > +/* > + * Indicates a copy-on-write page. > + */ > +#ifdef CONFIG_X86_USER_SHADOW_STACK > +#define _PAGE_BIT_COW _PAGE_BIT_SOFTW5 /* copy-on-write */ > +#else > +#define _PAGE_BIT_COW 0 > +#endif > + > /* If _PAGE_BIT_PRESENT is clear, we use these: */ > /* - if the user mapped it with PROT_NONE; pte_present gives true */ > #define _PAGE_BIT_PROTNONE _PAGE_BIT_GLOBAL > @@ -117,6 +127,40 @@ > #define _PAGE_SOFTW4 (_AT(pteval_t, 0)) > #endif > > +/* > + * The hardware requires shadow stack to be read-only and Dirty. > + * _PAGE_COW is a software-only bit used to separate copy-on-write PTEs > + * from shadow stack PTEs: Is that really required? For anon pages, we have PG_anon_exclusive, that can tell you whether the page is "certainly exclusive" (now cow necessary) vs. "maybe shared" (cow maybe necessary). Why isn't that sufficient to make the same decisions here? -- Thanks, David / dhildenb