2022-10-24 05:05:24

by Ira Weiny

[permalink] [raw]
Subject: [PATCH for rc] mm/shmem: Ensure proper fallback if page faults

From: Ira Weiny <[email protected]>

The kernel test robot flagged a recursive lock as a result of a
conversion from kmap_atomic() to kmap_local_folio()[Link]

The cause was due to the code depending on the kmap_atomic() side effect
of disabling page faults. In that case the code expects the fault to
fail and take the fallback case.

git archaeology implied that the recursion may not be an actual bug.[1]
However, the mmap_lock needed in the fault may be the one held.[2]

Add an explicit pagefault_disable() and a big comment to explain this
for future souls looking at this code.

[1] https://lore.kernel.org/all/Y1MymJ%2FINb45AdaY@iweiny-desk3/
[2] https://lore.kernel.org/all/Y1M2p9OtBGnKwGUE@x1n/

Fixes: 7a7256d5f512 ("shmem: convert shmem_mfill_atomic_pte() to use a folio")
Cc: Andrew Morton <[email protected]>
Cc: Randy Dunlap <[email protected]>
Cc: Peter Xu <[email protected]>
Cc: Andrea Arcangeli <[email protected]>
Reported-by: Matthew Wilcox (Oracle) <[email protected]>
Reported-by: kernel test robot <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Ira Weiny <[email protected]>

---
Thanks to Matt and Andrew for initial diagnosis.
Thanks to Randy for pointing out C code needs ';' :-D
Thanks to Andrew for suggesting an elaborate comment
Thanks to Peter for pointing out that the mm's may be the same.
---
mm/shmem.c | 7 +++++++
1 file changed, 7 insertions(+)

diff --git a/mm/shmem.c b/mm/shmem.c
index 8280a5cb48df..c1bca31cd485 100644
--- a/mm/shmem.c
+++ b/mm/shmem.c
@@ -2424,9 +2424,16 @@ int shmem_mfill_atomic_pte(struct mm_struct *dst_mm,

if (!zeropage) { /* COPY */
page_kaddr = kmap_local_folio(folio, 0);
+ /*
+ * The mmap_lock is held here. Disable page faults to
+ * prevent deadlock should copy_from_user() fault. The
+ * copy will be retried outside the mmap_lock.
+ */
+ pagefault_disable();
ret = copy_from_user(page_kaddr,
(const void __user *)src_addr,
PAGE_SIZE);
+ pagefault_enable();
kunmap_local(page_kaddr);

/* fallback to copy_from_user outside mmap_lock */
--
2.37.2


2022-10-24 18:17:18

by Ira Weiny

[permalink] [raw]
Subject: Re: [PATCH for rc] mm/shmem: Ensure proper fallback if page faults

On Sun, Oct 23, 2022 at 09:33:05PM -0700, Ira wrote:
> From: Ira Weiny <[email protected]>
>
> The kernel test robot flagged a recursive lock as a result of a
> conversion from kmap_atomic() to kmap_local_folio()[Link]
>
> The cause was due to the code depending on the kmap_atomic() side effect
> of disabling page faults. In that case the code expects the fault to
> fail and take the fallback case.
>
> git archaeology implied that the recursion may not be an actual bug.[1]
> However, the mmap_lock needed in the fault may be the one held.[2]
>
> Add an explicit pagefault_disable() and a big comment to explain this
> for future souls looking at this code.
>
> [1] https://lore.kernel.org/all/Y1MymJ%2FINb45AdaY@iweiny-desk3/
> [2] https://lore.kernel.org/all/Y1M2p9OtBGnKwGUE@x1n/
>
> Fixes: 7a7256d5f512 ("shmem: convert shmem_mfill_atomic_pte() to use a folio")
> Cc: Andrew Morton <[email protected]>
> Cc: Randy Dunlap <[email protected]>
> Cc: Peter Xu <[email protected]>
> Cc: Andrea Arcangeli <[email protected]>
> Reported-by: Matthew Wilcox (Oracle) <[email protected]>
> Reported-by: kernel test robot <[email protected]>
> Link: https://lore.kernel.org/r/[email protected]
> Signed-off-by: Ira Weiny <[email protected]>
>
> ---
> Thanks to Matt and Andrew for initial diagnosis.
> Thanks to Randy for pointing out C code needs ';' :-D
> Thanks to Andrew for suggesting an elaborate comment
> Thanks to Peter for pointing out that the mm's may be the same.
> ---
> mm/shmem.c | 7 +++++++
> 1 file changed, 7 insertions(+)
>
> diff --git a/mm/shmem.c b/mm/shmem.c
> index 8280a5cb48df..c1bca31cd485 100644
> --- a/mm/shmem.c
> +++ b/mm/shmem.c
> @@ -2424,9 +2424,16 @@ int shmem_mfill_atomic_pte(struct mm_struct *dst_mm,
>
> if (!zeropage) { /* COPY */
> page_kaddr = kmap_local_folio(folio, 0);
> + /*
> + * The mmap_lock is held here. Disable page faults to
> + * prevent deadlock should copy_from_user() fault. The
> + * copy will be retried outside the mmap_lock.
> + */

Offline Dave Hansen and I were discussing this and he was concerned that this
comment implies that a deadlock would always occur rather than might occur.

I was not clear on this as I was thinking the read mmap_lock was non-recursive.

So I think we have 3 cases only 1 of which will actually deadlock and is, as
Dave puts it, currently theoretical.

1) Different mm's are in play (no issue)
2) Readlock implementation is recursive and same mm is in play (no issue)
3) Readlock implementation is _not_ recursive (issue)

In both 1 and 2 lockdep is incorrectly flagging the issue but 3 is a problem
and I think this is what Andrea was thinking.

Is that the case?

If so the above comment is incorrectly worded and I should update it.

Ira

> + pagefault_disable();
> ret = copy_from_user(page_kaddr,
> (const void __user *)src_addr,
> PAGE_SIZE);
> + pagefault_enable();
> kunmap_local(page_kaddr);
>
> /* fallback to copy_from_user outside mmap_lock */
> --
> 2.37.2
>

2022-10-24 20:13:35

by Peter Xu

[permalink] [raw]
Subject: Re: [PATCH for rc] mm/shmem: Ensure proper fallback if page faults

On Mon, Oct 24, 2022 at 09:54:30AM -0700, Ira Weiny wrote:
> On Sun, Oct 23, 2022 at 09:33:05PM -0700, Ira wrote:
> > From: Ira Weiny <[email protected]>
> >
> > The kernel test robot flagged a recursive lock as a result of a
> > conversion from kmap_atomic() to kmap_local_folio()[Link]
> >
> > The cause was due to the code depending on the kmap_atomic() side effect
> > of disabling page faults. In that case the code expects the fault to
> > fail and take the fallback case.
> >
> > git archaeology implied that the recursion may not be an actual bug.[1]
> > However, the mmap_lock needed in the fault may be the one held.[2]
> >
> > Add an explicit pagefault_disable() and a big comment to explain this
> > for future souls looking at this code.
> >
> > [1] https://lore.kernel.org/all/Y1MymJ%2FINb45AdaY@iweiny-desk3/
> > [2] https://lore.kernel.org/all/Y1M2p9OtBGnKwGUE@x1n/
> >
> > Fixes: 7a7256d5f512 ("shmem: convert shmem_mfill_atomic_pte() to use a folio")
> > Cc: Andrew Morton <[email protected]>
> > Cc: Randy Dunlap <[email protected]>
> > Cc: Peter Xu <[email protected]>
> > Cc: Andrea Arcangeli <[email protected]>
> > Reported-by: Matthew Wilcox (Oracle) <[email protected]>
> > Reported-by: kernel test robot <[email protected]>
> > Link: https://lore.kernel.org/r/[email protected]
> > Signed-off-by: Ira Weiny <[email protected]>
> >
> > ---
> > Thanks to Matt and Andrew for initial diagnosis.
> > Thanks to Randy for pointing out C code needs ';' :-D
> > Thanks to Andrew for suggesting an elaborate comment
> > Thanks to Peter for pointing out that the mm's may be the same.
> > ---
> > mm/shmem.c | 7 +++++++
> > 1 file changed, 7 insertions(+)
> >
> > diff --git a/mm/shmem.c b/mm/shmem.c
> > index 8280a5cb48df..c1bca31cd485 100644
> > --- a/mm/shmem.c
> > +++ b/mm/shmem.c
> > @@ -2424,9 +2424,16 @@ int shmem_mfill_atomic_pte(struct mm_struct *dst_mm,
> >
> > if (!zeropage) { /* COPY */
> > page_kaddr = kmap_local_folio(folio, 0);
> > + /*
> > + * The mmap_lock is held here. Disable page faults to
> > + * prevent deadlock should copy_from_user() fault. The
> > + * copy will be retried outside the mmap_lock.
> > + */
>
> Offline Dave Hansen and I were discussing this and he was concerned that this
> comment implies that a deadlock would always occur rather than might occur.

Agreed, "prevent deadlock" might be too strong in this context.

>
> I was not clear on this as I was thinking the read mmap_lock was non-recursive.
>
> So I think we have 3 cases only 1 of which will actually deadlock and is, as
> Dave puts it, currently theoretical.
>
> 1) Different mm's are in play (no issue)
> 2) Readlock implementation is recursive and same mm is in play (no issue)
> 3) Readlock implementation is _not_ recursive (issue)
>
> In both 1 and 2 lockdep is incorrectly flagging the issue but 3 is a problem
> and I think this is what Andrea was thinking.
>
> Is that the case?

IMHO it would be good enough to just mention lockdep (as it can definitely
trigger) or just quote similarly as Andrea's original comment somehow:

If the rwsem starves writers it wasn't strictly a bug but lockdep
doesn't like it and this avoids depending on lowlevel implementation
details of the lock.

IIUC no deadlock could really trigger at that time or Andrea should have
written it in some other way. It also has actually summarized the goal
that then we won't rely on rwsem impl but just make it always work.

Thanks,

>
> If so the above comment is incorrectly worded and I should update it.
>
> Ira
>
> > + pagefault_disable();
> > ret = copy_from_user(page_kaddr,
> > (const void __user *)src_addr,
> > PAGE_SIZE);
> > + pagefault_enable();
> > kunmap_local(page_kaddr);
> >
> > /* fallback to copy_from_user outside mmap_lock */
> > --
> > 2.37.2
> >
>

--
Peter Xu

2022-10-24 21:12:00

by Matthew Wilcox

[permalink] [raw]
Subject: Re: [PATCH for rc] mm/shmem: Ensure proper fallback if page faults

On Mon, Oct 24, 2022 at 09:54:30AM -0700, Ira Weiny wrote:
> On Sun, Oct 23, 2022 at 09:33:05PM -0700, Ira wrote:
> > From: Ira Weiny <[email protected]>
> >
> > The kernel test robot flagged a recursive lock as a result of a
> > conversion from kmap_atomic() to kmap_local_folio()[Link]
> >
> > The cause was due to the code depending on the kmap_atomic() side effect
> > of disabling page faults. In that case the code expects the fault to
> > fail and take the fallback case.
> >
> > git archaeology implied that the recursion may not be an actual bug.[1]
> > However, the mmap_lock needed in the fault may be the one held.[2]
> >
> > Add an explicit pagefault_disable() and a big comment to explain this
> > for future souls looking at this code.
> >
> > [1] https://lore.kernel.org/all/Y1MymJ%2FINb45AdaY@iweiny-desk3/
> > [2] https://lore.kernel.org/all/Y1M2p9OtBGnKwGUE@x1n/
> >
> > Fixes: 7a7256d5f512 ("shmem: convert shmem_mfill_atomic_pte() to use a folio")
> > Cc: Andrew Morton <[email protected]>
> > Cc: Randy Dunlap <[email protected]>
> > Cc: Peter Xu <[email protected]>
> > Cc: Andrea Arcangeli <[email protected]>
> > Reported-by: Matthew Wilcox (Oracle) <[email protected]>
> > Reported-by: kernel test robot <[email protected]>
> > Link: https://lore.kernel.org/r/[email protected]
> > Signed-off-by: Ira Weiny <[email protected]>
> >
> > ---
> > Thanks to Matt and Andrew for initial diagnosis.
> > Thanks to Randy for pointing out C code needs ';' :-D
> > Thanks to Andrew for suggesting an elaborate comment
> > Thanks to Peter for pointing out that the mm's may be the same.
> > ---
> > mm/shmem.c | 7 +++++++
> > 1 file changed, 7 insertions(+)
> >
> > diff --git a/mm/shmem.c b/mm/shmem.c
> > index 8280a5cb48df..c1bca31cd485 100644
> > --- a/mm/shmem.c
> > +++ b/mm/shmem.c
> > @@ -2424,9 +2424,16 @@ int shmem_mfill_atomic_pte(struct mm_struct *dst_mm,
> >
> > if (!zeropage) { /* COPY */
> > page_kaddr = kmap_local_folio(folio, 0);
> > + /*
> > + * The mmap_lock is held here. Disable page faults to
> > + * prevent deadlock should copy_from_user() fault. The
> > + * copy will be retried outside the mmap_lock.
> > + */
>
> Offline Dave Hansen and I were discussing this and he was concerned that this
> comment implies that a deadlock would always occur rather than might occur.
>
> I was not clear on this as I was thinking the read mmap_lock was non-recursive.
>
> So I think we have 3 cases only 1 of which will actually deadlock and is, as
> Dave puts it, currently theoretical.
>
> 1) Different mm's are in play (no issue)
> 2) Readlock implementation is recursive and same mm is in play (no issue)
> 3) Readlock implementation is _not_ recursive (issue)
>
> In both 1 and 2 lockdep is incorrectly flagging the issue but 3 is a problem
> and I think this is what Andrea was thinking.

The readlock implementation is only recursive if nobody else has taken a
write lock. AIUI, no other process can take a write lock on the
mmap_lock (other processes can take read locks by examining
/proc/$pid/maps, for example), although maybe ptrace can take the
mmap_lock for write?

But if you have a multithreaded process, one of the other threads can
call mmap() and that will prevent recursion (due to fairness). Even if
it's a different process that you're trying to acquire the mmap read
lock on, you can still get into a deadly embrace. eg:

process A thread 1 takes read lock on own mmap_lock
process A thread 2 calls mmap, blocks taking write lock
process B thread 1 takes page fault, read lock on own mmap lock
process B thread 2 calls mmap, blocks taking write lock
process A thread 1 blocks taking read lock on process B
process B thread 1 blocks taking read lock on process A

Now all four threads are blocked waiting for each other.