Message ID | 20230127194110.533103-28-surenb@google.com (mailing list archive) |
---|---|
State | New |
Headers | show
Return-Path: <owner-linux-mm@kvack.org> X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6E4C7C61DA7 for <linux-mm@archiver.kernel.org>; Fri, 27 Jan 2023 19:42:29 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B8D226B0095; Fri, 27 Jan 2023 14:42:27 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id B3F0B6B009A; Fri, 27 Jan 2023 14:42:27 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 856A56B00A4; Fri, 27 Jan 2023 14:42:27 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id 6DD176B0095 for <linux-mm@kvack.org>; Fri, 27 Jan 2023 14:42:27 -0500 (EST) Received: from smtpin29.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 44284140F81 for <linux-mm@kvack.org>; Fri, 27 Jan 2023 19:42:27 +0000 (UTC) X-FDA: 80401600734.29.0CA99DF Received: from mail-yw1-f201.google.com (mail-yw1-f201.google.com [209.85.128.201]) by imf06.hostedemail.com (Postfix) with ESMTP id 739B618002B for <linux-mm@kvack.org>; Fri, 27 Jan 2023 19:42:19 +0000 (UTC) Authentication-Results: imf06.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=GSbfUJd9; spf=pass (imf06.hostedemail.com: domain of 3GinUYwYKCOEVXUHQEJRRJOH.FRPOLQXa-PPNYDFN.RUJ@flex--surenb.bounces.google.com designates 209.85.128.201 as permitted sender) smtp.mailfrom=3GinUYwYKCOEVXUHQEJRRJOH.FRPOLQXa-PPNYDFN.RUJ@flex--surenb.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1674848539; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=dtbb/rgJDVPG5hb8ydKzjEL35WMZYcFrpyL4j03oF8s=; b=vBfutJ+vn3qT23zOK0lER+gEysUvSY8GviFQg6C73f1lCPo4CMV1MRLMXfrWsUkvH2DlDk F8myZ4TmSDWc0rgy+21mE57TctTV+8lT0Twk+WUxwNxP7RZrPpefuNK9nI0zz95S5+l26r TdvgW5dg4xlM6DwlGptmjS8fif5dUf4= ARC-Authentication-Results: i=1; imf06.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=GSbfUJd9; spf=pass (imf06.hostedemail.com: domain of 3GinUYwYKCOEVXUHQEJRRJOH.FRPOLQXa-PPNYDFN.RUJ@flex--surenb.bounces.google.com designates 209.85.128.201 as permitted sender) smtp.mailfrom=3GinUYwYKCOEVXUHQEJRRJOH.FRPOLQXa-PPNYDFN.RUJ@flex--surenb.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1674848539; a=rsa-sha256; cv=none; b=KbLg4F7TE8OXa8annrcYIB4mLBbRT4Mk20qrM0qdB7Rku5LDtz0kO2R89VQ/HwrKCN0+9u tdfYg1Ih1fSpJ/Gy4SVwVfODHW6OxOVOyqiYKm/jvuVpcVLNWadgKhznQk8gHVDQnQBOGB P2jMtzvBo209Joj8uz/OpcjAJA30V0M= Received: by mail-yw1-f201.google.com with SMTP id 00721157ae682-4d5097a95f5so65088617b3.1 for <linux-mm@kvack.org>; Fri, 27 Jan 2023 11:42:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=dtbb/rgJDVPG5hb8ydKzjEL35WMZYcFrpyL4j03oF8s=; b=GSbfUJd90yi2xMLpxJwkNIQoO7AYaRuo1p0W3egBrsgFnTlql/QObCOWtQyWcyCJri L9IkPEewPotUja2mT2dWXCpgA9vVmlCVPbr2KFEVViPcTyej+SHFX8+fhAEaOP6xtrM/ x5eCKOKsLW06Glc5jxntDrg/hIgANLyaiKO4UzofC0FOHh/fDzJT0Gg9GuJf/nEgmEZV hix6GjSSYXSWndo4QypjFazRowiaazjUscTvm2uHMbtPJDABgUnEX51b4PI7vURt3LgP X4xLvpH0mH+5Sv/7D+0hQE/rAXv1nGKdGusu8zdXbWRFOMqJp4iPgA6p21w37iQT/eTP bctw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=dtbb/rgJDVPG5hb8ydKzjEL35WMZYcFrpyL4j03oF8s=; b=uN61KzduXT+9Lww1zT6ElPK+0hOTTEJ8mNACtZ66Q3bN1Reff/kni0CIGLwLy8E8ws mtCkHFh7duElDtJvvG+XVCv08JJDjZ1F7Dcd8Xa27q2HtvQPjNo0G0xaPlowl252uopG sWnruJSnlslY4rjW6RcIO+Yc2+A3QkF0IvVUgBxFCnJwluWxquVz/mNBchRNQ4V0ifhk a0xLxcCoTHWI+vx/WUnwEAFVzk92satjfF1LbaQz0tp7ZdzYAuFiSV5OvCCNLuplEnTT ukQPFOoPAeXXeF3geixWxs0t6Wj7gaLJE/AHWAKBjJEwBac0TLpr3pLXYZ1Ypel+SuZl zZrg== X-Gm-Message-State: AFqh2kom9Jyq+hWi7+TQ2fGdtUqDgVZ53PmZdsnfhQ/4U9wdcXt03xoE OmUDWMjcRC1FVHSJy/ZOCxllvpKfgIs= X-Google-Smtp-Source: AMrXdXszwUWrk3+ezT3vpCagEl0mvWZa9sEHax26SYGf7QapJl4fBzpxwL0/6TcVCB7ktvgIaczCkSx6r1s= X-Received: from surenb-desktop.mtv.corp.google.com ([2620:15c:211:200:4e19:be9:c5d0:8483]) (user=surenb job=sendgmr) by 2002:a0d:fc86:0:b0:4db:3ac0:78a3 with SMTP id m128-20020a0dfc86000000b004db3ac078a3mr5702708ywf.266.1674848538548; Fri, 27 Jan 2023 11:42:18 -0800 (PST) Date: Fri, 27 Jan 2023 11:41:04 -0800 In-Reply-To: <20230127194110.533103-1-surenb@google.com> Mime-Version: 1.0 References: <20230127194110.533103-1-surenb@google.com> X-Mailer: git-send-email 2.39.1.456.gfc5497dd1b-goog Message-ID: <20230127194110.533103-28-surenb@google.com> Subject: [PATCH v2 27/33] mm: prevent userfaults to be handled under per-vma lock From: Suren Baghdasaryan <surenb@google.com> To: akpm@linux-foundation.org Cc: michel@lespinasse.org, jglisse@google.com, mhocko@suse.com, vbabka@suse.cz, hannes@cmpxchg.org, mgorman@techsingularity.net, dave@stgolabs.net, willy@infradead.org, liam.howlett@oracle.com, peterz@infradead.org, ldufour@linux.ibm.com, paulmck@kernel.org, mingo@redhat.com, will@kernel.org, luto@kernel.org, songliubraving@fb.com, peterx@redhat.com, david@redhat.com, dhowells@redhat.com, hughd@google.com, bigeasy@linutronix.de, kent.overstreet@linux.dev, punit.agrawal@bytedance.com, lstoakes@gmail.com, peterjung1337@gmail.com, rientjes@google.com, axelrasmussen@google.com, joelaf@google.com, minchan@google.com, rppt@kernel.org, jannh@google.com, shakeelb@google.com, tatashin@google.com, edumazet@google.com, gthelen@google.com, gurua@google.com, arjunroy@google.com, soheil@google.com, leewalsh@google.com, posk@google.com, linux-mm@kvack.org, linux-arm-kernel@lists.infradead.org, linuxppc-dev@lists.ozlabs.org, x86@kernel.org, linux-kernel@vger.kernel.org, kernel-team@android.com, surenb@google.com Content-Type: text/plain; charset="UTF-8" X-Stat-Signature: 4q9bs888c17ao5o8aztwr1mysdiwanhb X-Rspam-User: X-Rspamd-Queue-Id: 739B618002B X-Rspamd-Server: rspam06 X-HE-Tag: 1674848539-535180 X-HE-Meta: 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 RqSPDudy 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000007, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: <linux-mm.kvack.org> |
Series |
Per-VMA locks
|
expand
|
diff --git a/mm/memory.c b/mm/memory.c index 33ecc850d3cb..55582c6fa2fd 100644 --- a/mm/memory.c +++ b/mm/memory.c @@ -5256,6 +5256,15 @@ struct vm_area_struct *lock_vma_under_rcu(struct mm_struct *mm, if (!vma_start_read(vma)) goto inval; + /* + * Due to the possibility of userfault handler dropping mmap_lock, avoid + * it for now and fall back to page fault handling under mmap_lock. + */ + if (userfaultfd_armed(vma)) { + vma_end_read(vma); + goto inval; + } + /* Check since vm_start/vm_end might change before we lock the VMA */ if (unlikely(address < vma->vm_start || address >= vma->vm_end)) { vma_end_read(vma);
Due to the possibility of handle_userfault dropping mmap_lock, avoid fault handling under VMA lock and retry holding mmap_lock. This can be handled more gracefully in the future. Signed-off-by: Suren Baghdasaryan <surenb@google.com> Suggested-by: Peter Xu <peterx@redhat.com> --- mm/memory.c | 9 +++++++++ 1 file changed, 9 insertions(+)