lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <96d1b007b3b88c43feac58d2646d675b94daf1fb.camel@surriel.com>
Date: Fri, 03 Jan 2025 21:55:21 -0500
From: Rik van Riel <riel@...riel.com>
To: Jann Horn <jannh@...gle.com>
Cc: x86@...nel.org, linux-kernel@...r.kernel.org, kernel-team@...a.com, 
	dave.hansen@...ux.intel.com, luto@...nel.org, peterz@...radead.org, 
	tglx@...utronix.de, mingo@...hat.com, bp@...en8.de, hpa@...or.com, 
	akpm@...ux-foundation.org, nadav.amit@...il.com,
 zhengqi.arch@...edance.com, 	linux-mm@...ck.org
Subject: Re: [PATCH 09/12] x86/mm: enable broadcast TLB invalidation for
 multi-threaded processes

On Fri, 2025-01-03 at 18:36 +0100, Jann Horn wrote:
> 
> > +++ b/arch/x86/include/asm/mmu.h
> > @@ -48,6 +48,12 @@ typedef struct {
> >         unsigned long flags;
> >  #endif
> > 
> > +#ifdef CONFIG_CPU_SUP_AMD
> > +       struct list_head broadcast_asid_list;
> > +       u16 broadcast_asid;
> > +       bool asid_transition;
> 
> Please add a comment on the semantics of the "asid_transition" field
> here after addressing the comments below.

Will do. 

> 
> > +#endif
> > +
> >  #ifdef CONFIG_ADDRESS_MASKING
> >         /* Active LAM mode:  X86_CR3_LAM_U48 or X86_CR3_LAM_U57 or
> > 0 (disabled) */
> >         unsigned long lam_cr3_mask;
> [...]
> > +#ifdef CONFIG_CPU_SUP_AMD
> > +/*
> > + * Logic for AMD INVLPGB support.
> > + */
> > +static DEFINE_RAW_SPINLOCK(broadcast_asid_lock);
> > +static u16 last_broadcast_asid = TLB_NR_DYN_ASIDS;
> 
> I wonder if this should be set to MAX_ASID_AVAILABLE or such to
> ensure
> that we do a flush before we start using the broadcast ASID space the
> first time... Or is there something else that already guarantees that
> all ASIDs of the TLB are flushed during kernel boot?

That is a good idea. I don't know if the TLBs always get
flushed on every kexec, for example, and having the
wraparound code exercised early on every boot will be
good as a self test for future proofing the code.

I'll do that in the next version.

> 
> > +static u16 get_broadcast_asid(void)
> > +{
> > +       lockdep_assert_held(&broadcast_asid_lock);
> > +
> > +       do {
> > +               u16 start = last_broadcast_asid;
> > +               u16 asid = find_next_zero_bit(broadcast_asid_used,
> > MAX_ASID_AVAILABLE, start);
> > +
> > +               if (asid >= MAX_ASID_AVAILABLE) {
> > +                       reset_broadcast_asid_space();
> > +                       continue;
> 
> Can this loop endlessly without making forward progress if we have a
> few thousand processes on the system that are multi-threaded (or used
> to be multi-threaded) and race the wrong way?
> meets_broadcast_asid_threshold() checks if we have free IDs
> remaining,
> but that check happens before broadcast_asid_lock is held, so we
> could
> theoretically race such that no free IDs are available, right?

You are right, I need to duplicate that check under
the spinlock! I'll get that done in the next version.

> 
> > +       mm->context.broadcast_asid = get_broadcast_asid();
> > +       mm->context.asid_transition = true;
> 
> This looks buggy to me: 

Nadav found the same issue. I've fixed it locally
already for the next version.

> Maybe change how mm->context.asid_transition works such that it is
> immediately set on mm creation and cleared when the transition is
> done, so that you don't have to touch it here?
> 
If we want to document the ordering, won't it be better
to keep both assignments close to each other (with WRITE_ONCE),
so the code stays easier to understand for future maintenance?

> Also, please use at least WRITE_ONCE() for writes here, and add
> comments documenting ordering requirements.

I'll add a comment.

> 
> > +static void finish_asid_transition(struct flush_tlb_info *info)
> > +{
> > +       struct mm_struct *mm = info->mm;
> > +       int bc_asid = mm_broadcast_asid(mm);
> > +       int cpu;
> > +
> > +       if (!mm->context.asid_transition)
> 
> AFAIU this can be accessed concurrently - please use at least
> READ_ONCE(). (I think in the current version of the patch, this needs
> to be ordered against the preceding mm_broadcast_asid() read, but
> that's implicit on x86, so I guess writing a barrier here would be
> superfluous.)

I'll add a READ_ONCE here. Good point.

> 
> > +               return;
> > +
> > +       for_each_cpu(cpu, mm_cpumask(mm)) {
> > +               if (READ_ONCE(per_cpu(cpu_tlbstate.loaded_mm, cpu))
> > != mm)
> > +                       continue;
> 
> switch_mm_irqs_off() picks an ASID and writes CR3 before writing
> loaded_mm:
> "/* Make sure we write CR3 before loaded_mm. */"
> 
> Can we race with a concurrent switch_mm_irqs_off() on the other CPU
> such that the other CPU has already switched CR3 to our MM using the
> old ASID, but has not yet written loaded_mm, such that we skip it
> here? And then we'll think we finished the ASID transition, and the
> next time we do a flush, we'll wrongly omit the flush for that other
> CPU even though it's still using the old ASID?

That is a very good question.

I suppose we need to check against LOADED_MM_SWITCHING
too, and possibly wait to see what mm shows up on that
CPU before proceeding?

Maybe as simple as this?

        for_each_cpu(cpu, mm_cpumask(mm)) {
		while (READ_ONCE(per_cpu(cpu_tlbstate.loaded_mm, cpu)
== LOADED_MM_SWITCHING)
			cpu_relax();

                if (READ_ONCE(per_cpu(cpu_tlbstate.loaded_mm, cpu)) !=
mm)
                        continue;

                /*
                 * If at least one CPU is not using the broadcast ASID
yet,
                 * send a TLB flush IPI. The IPI should cause
stragglers
                 * to transition soon.
                 */
                if (per_cpu(cpu_tlbstate.loaded_mm_asid, cpu) !=
bc_asid) {
                        flush_tlb_multi(mm_cpumask(info->mm), info);
                        return;
                }
        }

Then the only change needed to switch_mm_irqs_off
would be to move the LOADED_MM_SWITCHING line to
before choose_new_asid, to fully close the window.

Am I overlooking anything here?


> 
> > +
> > +               /*
> > +                * If at least one CPU is not using the broadcast
> > ASID yet,
> > +                * send a TLB flush IPI. The IPI should cause
> > stragglers
> > +                * to transition soon.
> > +                */
> > +               if (per_cpu(cpu_tlbstate.loaded_mm_asid, cpu) !=
> > bc_asid) {
> 
> READ_ONCE()? Also, I think this needs a comment explaining that this
> can race with concurrent MM switches such that we wrongly think that
> there's a straggler (because we're not reading the loaded_mm and the
> loaded_mm_asid as one atomic combination).

I'll add the READ_ONCE.

Will the race still exist if we wait on
LOADED_MM_SWITCHING as proposed above?

> 
> > +                       flush_tlb_multi(mm_cpumask(info->mm),
> > info);
> > +                       return;
> > +               }
> > +       }
> > +
> > +       /* All the CPUs running this process are using the
> > broadcast ASID. */
> > +       mm->context.asid_transition = 0;
> 
> WRITE_ONCE()?
> Also: This is a bool, please use "false".

Will do.

> 
> > +}
> > +
> > +static void broadcast_tlb_flush(struct flush_tlb_info *info)
> > +{
> > +       bool pmd = info->stride_shift == PMD_SHIFT;
> > +       unsigned long maxnr = invlpgb_count_max;
> > +       unsigned long asid = info->mm->context.broadcast_asid;
> > +       unsigned long addr = info->start;
> > +       unsigned long nr;
> > +
> > +       /* Flushing multiple pages at once is not supported with
> > 1GB pages. */
> > +       if (info->stride_shift > PMD_SHIFT)
> > +               maxnr = 1;
> > +
> > +       if (info->end == TLB_FLUSH_ALL) {
> > +               invlpgb_flush_single_pcid(kern_pcid(asid));
> 
> What orders this flush with the preceding page table update? Does the
> instruction implicitly get ordered after preceding memory writes, or
> do we get that ordering from inc_mm_tlb_gen() or something like that?

I believe inc_mm_tlb_gen() should provide the ordering.

You are right that it should be documented.

> 
> > +       /* Broadcast ASIDs are always kept up to date with INVLPGB.
> > */
> > +       if (is_broadcast_asid(loaded_mm_asid))
> > +               return;
> 
> This relies on the mm_broadcast_asid() read in flush_tlb_mm_range()
> being ordered after the page table update, correct? And we get that
> required ordering from the inc_mm_tlb_gen(), which implies a full
> barrier? It might be nice if there were some more comments on this.

I will add some comments, and I hope you can review
those in the next series, because I'll no doubt
forget to explain something important.

Thank you for the thorough review!


-- 
All Rights Reversed.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ