Received: by 10.223.176.46 with SMTP id f43csp4691262wra; Tue, 23 Jan 2018 13:03:24 -0800 (PST) X-Google-Smtp-Source: AH8x2272H8e7Qqq/DuH+03B2Xvk3mfpYXh0tk0+lGVzn/NadteTo9eISnNIPtgTGB3R5mpI52/0C X-Received: by 10.107.198.140 with SMTP id w134mr5362582iof.255.1516741404114; Tue, 23 Jan 2018 13:03:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516741404; cv=none; d=google.com; s=arc-20160816; b=jnLVlhlYoQK4CYblg0cnV5jw+wLSeCZOeaDPmcg8SqOlrywekbi4D1ki8OZ5CfNNA9 GmuOUiLiyGHKJvgBb28+immMa02QVn+0fDZJdN5PYO+IrNaQ7oLhU16iaYPWc6uDQYmR yqBkJPs15uzj27yyhnW7cJ0i5ztt/fyEccFVhmS7O+FVWEDZrKPg3vXgsXvFfoi/FtZX ILKLp9knunZuso3l2AQpWFicLEmz66a4lpNOyBiK43aCzS0COCztuiKI8mUbdCfBh0wr puhRVXB6QyvAepEl6I1+Vppi0uY0+9gVpvLLirhahPIp+HtOgfbca3hAUn06Vve5FUhZ KaxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=tQu3ZhIBYHl3p7XWHNdeVqXezC1PYpiHCJvCCDVsOwQ=; b=RhidVrGORI0Tah/AiOC9N86cwtFgY4Hrh0ZsUKFbUulOhMps9XzAMuVguS3Zx0Bc4I dd09DSYHQFrca9i43oJl8XJCjIWFWP2IYQ8rMe9AhHsQL9C2nsm8cl4+kez+lXfbRXVT cSGmLPwvdUNYoHkj8VBFzba6OPRw4LPwNSpJnK3eZca7v2W3nyJCF7rM9riZKX378iq0 T4ZTIW5MxNDOW4SUQHSyqq8CHgzvI2zChH1zq/cZnTnAdaEdAsQIz+OIET3Fij/dJUMD LciTUA+bton2nqDEzE3HQ+kI9ToGJRTjuwQQKlXlbjtKsR06G0E21AKSnPkIiby9HxH5 9Obg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r69si16497213ioe.299.2018.01.23.13.03.08; Tue, 23 Jan 2018 13:03:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932146AbeAWVCl (ORCPT + 99 others); Tue, 23 Jan 2018 16:02:41 -0500 Received: from smtp2.provo.novell.com ([137.65.250.81]:46767 "EHLO smtp2.provo.novell.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752638AbeAWVCk (ORCPT ); Tue, 23 Jan 2018 16:02:40 -0500 Received: from localhost.localdomain (prv-ext-foundry1int.gns.novell.com [137.65.251.240]) by smtp2.provo.novell.com with ESMTP (TLS encrypted); Tue, 23 Jan 2018 14:02:36 -0700 From: Davidlohr Bueso To: dledford@redhat.com, roland@purestorage.com, linux-rdma@vger.kernel.org Cc: linux-kernel@vger.kernel.org, dave@stgolabs.net, Davidlohr Bueso Subject: [PATCH] IB/mthca: Fix how mthca_map_user_db() calls gup Date: Tue, 23 Jan 2018 12:54:59 -0800 Message-Id: <20180123205459.432-1-dave@stgolabs.net> X-Mailer: git-send-email 2.13.6 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org mthca_map_user_db() has two problems regarding the call to get_user_pages(): (i) It is not done under mmap_sem. (ii) It is done under the db_table mutex, which protects all database related operations. Should any of these be called under mmap_sem, we get an ABBA deadlock. In addition, gup can be performance intensive, which could contend other mapping/ unmapping ops. To fix this, we can drop the mutex while doing a gup_fast(), once done, recheck to see the page was mapped while we didn't hold the mutex, and exit out with the corresponding housekeeping. Suggested-by: Al Viro Signed-off-by: Davidlohr Bueso --- - Compile tested only. - Should I be wrong about no callers already holding mmap_sem, I still think calling gup without the mutex makes sense for improved paralellism. Now, if callers can hold the mmap_sem, it's wrong to do copy_from_user right before calling mthca_map_user_db. drivers/infiniband/hw/mthca/mthca_memfree.c | 20 +++++++++++++++++++- 1 file changed, 19 insertions(+), 1 deletion(-) diff --git a/drivers/infiniband/hw/mthca/mthca_memfree.c b/drivers/infiniband/hw/mthca/mthca_memfree.c index c6fe89d79248..046871878a02 100644 --- a/drivers/infiniband/hw/mthca/mthca_memfree.c +++ b/drivers/infiniband/hw/mthca/mthca_memfree.c @@ -472,9 +472,27 @@ int mthca_map_user_db(struct mthca_dev *dev, struct mthca_uar *uar, goto out; } - ret = get_user_pages(uaddr & PAGE_MASK, 1, FOLL_WRITE, pages, NULL); + mutex_unlock(&db_tab->mutex); + + ret = get_user_pages_fast(uaddr & PAGE_MASK, 1, FOLL_WRITE, pages); if (ret < 0) + return ret; + + mutex_lock(&db_tab->mutex); + + if (db_tab->page[i].refcount >= MTHCA_DB_REC_PER_PAGE || + (db_tab->page[i].uvirt && db_tab->page[i].uvirt != uaddr)) { + put_page(pages[0]); + ret = -EINVAL; goto out; + } + + /* page was already mapped by another task while we were doing gup */ + if (db_tab->page[i].refcount) { + put_page(pages[0]); + ++db_tab->page[i].refcount; + goto out; + } sg_set_page(&db_tab->page[i].mem, pages[0], MTHCA_ICM_PAGE_SIZE, uaddr & ~PAGE_MASK); -- 2.13.6