[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20191016132233.GA46264@lakrids.cambridge.arm.com>
Date: Wed, 16 Oct 2019 14:22:33 +0100
From: Mark Rutland <mark.rutland@....com>
To: Andrey Ryabinin <aryabinin@...tuozzo.com>
Cc: Daniel Axtens <dja@...ens.net>, kasan-dev@...glegroups.com,
linux-mm@...ck.org, x86@...nel.org, glider@...gle.com,
luto@...nel.org, linux-kernel@...r.kernel.org, dvyukov@...gle.com,
christophe.leroy@....fr, linuxppc-dev@...ts.ozlabs.org,
gor@...ux.ibm.com
Subject: Re: [PATCH v8 1/5] kasan: support backing vmalloc space with real
shadow memory
Hi Andrey,
On Wed, Oct 16, 2019 at 03:19:50PM +0300, Andrey Ryabinin wrote:
> On 10/14/19 4:57 PM, Daniel Axtens wrote:
> >>> + /*
> >>> + * Ensure poisoning is visible before the shadow is made visible
> >>> + * to other CPUs.
> >>> + */
> >>> + smp_wmb();
> >>
> >> I'm not quite understand what this barrier do and why it needed.
> >> And if it's really needed there should be a pairing barrier
> >> on the other side which I don't see.
> >
> > Mark might be better able to answer this, but my understanding is that
> > we want to make sure that we never have a situation where the writes are
> > reordered so that PTE is installed before all the poisioning is written
> > out. I think it follows the logic in __pte_alloc() in mm/memory.c:
> >
> > /*
> > * Ensure all pte setup (eg. pte page lock and page clearing) are
> > * visible before the pte is made visible to other CPUs by being
> > * put into page tables.
> > *
> > * The other side of the story is the pointer chasing in the page
> > * table walking code (when walking the page table without locking;
> > * ie. most of the time). Fortunately, these data accesses consist
> > * of a chain of data-dependent loads, meaning most CPUs (alpha
> > * being the notable exception) will already guarantee loads are
> > * seen in-order. See the alpha page table accessors for the
> > * smp_read_barrier_depends() barriers in page table walking code.
> > */
> > smp_wmb(); /* Could be smp_wmb__xxx(before|after)_spin_lock */
> >
> > I can clarify the comment.
>
> I don't see how is this relevant here.
The problem isn't quite the same, but it's a similar shape. See below
for more details.
> barrier in __pte_alloc() for very the following case:
>
> CPU 0 CPU 1
> __pte_alloc(): pte_offset_kernel(pmd_t * dir, unsigned long address):
> pgtable_t new = pte_alloc_one(mm); pte_t *new = (pte_t *) pmd_page_vaddr(*dir) + ((address >> PAGE_SHIFT) & (PTRS_PER_PAGE - 1));
> smp_wmb(); smp_read_barrier_depends();
> pmd_populate(mm, pmd, new);
> /* do something with pte, e.g. check if (pte_none(*new)) */
>
>
> It's needed to ensure that if CPU1 sees pmd_populate() it also sees initialized contents of the 'new'.
>
> In our case the barrier would have been needed if we had the other side like this:
>
> if (!pte_none(*vmalloc_shadow_pte)) {
> shadow_addr = (unsigned long)__va(pte_pfn(*vmalloc_shadow_pte) << PAGE_SHIFT);
> smp_read_barrier_depends();
> *shadow_addr; /* read the shadow, barrier ensures that if we see installed pte, we will see initialized shadow memory. */
> }
>
>
> Without such other side the barrier is pointless.
The barrier isn't pointless, but we are relying on a subtlety that is
not captured in LKMM, as one of the observers involved is the TLB (and
associated page table walkers) of the CPU.
Until the PTE written by CPU 0 has been observed by the TLB of CPU 1, it
is not possible for CPU 1 to satisfy loads from the memory that PTE
maps, as it doesn't yet know which memory that is.
Once the PTE written by CPU has been observed by the TLB of CPU 1, it is
possible for CPU 1 to satisfy those loads. At this instant, CPU 1 must
respect the smp_wmb() before the PTE was written, and hence sees zeroes
written before this. Note that if this were not true, we could not
safely swap userspace memory.
There is the risk (as laid out in [1]) that CPU 1 attempts to hoist the
loads of the shadow memory above the load of the PTE, samples a stale
(faulting) status from the TLB, then performs the load of the PTE and
sees a valid value. In this case (on arm64) a spurious fault could be
taken when the access is architecturally performed.
It is possible on arm64 to use a barrier here to prevent the spurious
fault, but this is not smp_read_barrier_depends(), as that does nothing
for everyone but alpha. On arm64 We have a spurious fault handler to fix
this up.
Thanks,
Mark.
[1] https://lore.kernel.org/linux-arm-kernel/20190827131818.14724-1-will@kernel.org/
[2] https://lore.kernel.org/linux-mm/20191014152717.GA20438@lakrids.cambridge.arm.com/
Powered by blists - more mailing lists