Will an x86_64 CPU notice that a page-table entry has changed to not-present while setting the dirty flag in the PTE?

188 views Asked by At

There is a scenario as follows:

The pte a of PAGE A set following field:

  • BIT(0) present
  • BIT(1) writable
  • BIT(M-1,12) page frame
  • dirty flag is NOT SET
CPU0                                     CPU1
                                         cached translation information 
                                         about the PTE a (TLB)
modify pte a present flags to 0.
(not exec tlb shootdown)                 
                                         write a virtual address translated by pte a

Now, will this write operation execute normally or will it cause a page fault?


The issue comes from a Linux kernel commit. Based on the code logic of the commit, I tend to believe that the situation mentioned above can cause page faults.

Information about this COMMIT:

commit d950c9477d51f0cefc2ed3cf76e695d46af0d9c1
Author: Mel Gorman <[email protected]>
Date:   Fri Sep 4 15:47:35 2015 -0700

    mm: defer flush of writable TLB entries

The code is no longer shown here, and the approximate logic is:

When kswapd was performing memory reclamation, it was found that a page could be reclaimed. First, unmap it. The unmap operation will modify the page table structures After modification, it is necessary to perform a tlb flush (may execute tlb shootdown) However, the kernel may delay the tlb flush action in order to perform batch flush (as tlb shootdown requires sending ipi, batch flush will reduce the number of ipi sent to one). But it needs to be determined whether the PTE is dirty before the clear PTE,

If it's dirty, you need to flush immediately If it weren't dirty, you can batch flush it after page_out()

I think it may be due to the following reasons:

If the page is dirty, it indicates that someone has recently accessed the page, and if there is no flush tlb remote, other CPUs may still be able to access it normally without generating PF. However, if the page is not dirty, after clearing the pte, even if other CPUs use old tlb to access it (the dirty flag in old tlb is 0), the dirty flags will be updated and a full check will be made to generate PF. (The above is my own understanding, I cannot guarantee it is correct).


If modify PTE's dirty bit 1 to 0, but not flush tlb. This situation is described in Intel SDM

If software modifies a paging-structure entry that identifies the final
 physical address for a linear address(either a PTE or a paging-structure
entry in which the PS flag is 1) to change the dirty flag from 1 to 0,
failure to perform an invalidation may result in the processor not setting
 that bit in response to a subsequent write to a linear address whose
translation uses the entry. Software cannot interpret the bit being clear as
an indication that such a write has not occurred

But regarding the issue mentioned at the beginning, it was not found in Intel SDM.


Thanks for Peter's testing suggestion. I have written a kernel module based on the Linux kernel. The testing code is not specifically presented, but the program flow is as follows(single thread):

  1. set or clear PTE dirty bit
  2. flush tlb all
  3. read the page pointed by this PTE in order to establish new tlb.
  4. clear P or RW bit of this PTE(after changing PTE, DO NOT flush TLB)
  5. write the page pointed by this PTE.

The test results are as follows:

  1. set dirty, clear present, (set RW) : normally execute
  2. set dirty, clear RW(read only), (set present) : normally execute
  3. set not dirty, clear present, (set RW) : cause #PF
  4. set not dirty, clear RW(read only), (set present) : cause #PF

NOTE

Set/clear the dirty bit is to set the initial state of TLB

my test link


According to Peter and prl's answers, it seems that CET will affect the test results But I don't know the details of CET. I do a simple test by using the RDMSR instruction to read IA32_U_CET in the kernel module and this instruction will cause a # GP, does this mean that my CPU does not support the CET function ?

1

There are 1 answers

7
prl On

The Intel SDM, volume 3, section 4.8, says:

If software on one logical processor writes to a page while software on another logical processor concurrently clears the R/W flag in the paging-structure entry that maps the page, execution on some processors may result in the entry’s dirty flag being set (due to the write on the first logical processor) and the entry’s R/W flag being clear (due to the update to the entry on the second logical processor). This will never occur on a processor that supports control-flow enforcement technology (CET). Specifically, a processor that supports CET will never set the dirty flag in a paging-structure entry in which the R/W flag is clear.