Received: by 2002:a25:5b86:0:0:0:0:0 with SMTP id p128csp922190ybb; Thu, 28 Mar 2019 15:09:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqw86nao6Th7hW/i8zFVV1qRM0IFP7fwnAAIffcuypVJ2+93AZEZLyzSEbQ7FAcPRbYDBdEg X-Received: by 2002:a17:902:ba85:: with SMTP id k5mr26975298pls.270.1553810969691; Thu, 28 Mar 2019 15:09:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553810969; cv=none; d=google.com; s=arc-20160816; b=qOD/FvdDiAXwY/231hSgunQ6bG7VRYzco3SVIeIxYZZrMyt51WfQ/MPv0MWS81luZN /4TlDhFOc0sh+CotfFtxYdpyR9MJM26QzVPeAultzk/N2lmh0/yqt0n+wKz0rkEsRbtA jA6o8JiseL9y4+Py+kjyHUJH6RquPNirkHrXizbza9hOv96dBNA6LnNPs3JaYiwpyRUX E8LFhPV5XDowOUYkc5ZTQf+PZbKvl+RQzZzYQMbhnaKVnJq4REdNXBOJNk5bhmTa69/E czWotN0VOpbug0wW9H/S2jGHIkm5VohW2SS85jCzyyuSKs2/2WQwIrgaku80tRDZ3vyP b0vA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=h0wVGhGqMdrTppX6tkD5HPWg1t6S6OIyRNqJBAvAd+g=; b=eQ87CI6mDqJ5ovlcA7akm2VWDKS5/EfTHyS/8GwC8PEwk+8tRn1iXMzFr1Rmj02yJ3 tqZR58IB3njlw8I8pMQI/I36j+M+qYvw9NnCQ6mZWYoXQmuSXpSTckDzJO3F5aHhTH5j TE/giDhxt/TehBPGgGcZ6zzzOTGqHft7C9DD/is2WcR98WybHxuw9CQmKhB2fZ4wpFtk VmHmthxxZ8H6OiVJNyMRbn/kndNbRFy0/7JNCPgXBEwRCCpDrzi9EozTaE8tuJLEdlht RoOqOuwJs1XngPNM3LRaA0Vog6MsaBD8juMZpuRzZQEf6EXnVmDsGqUqH1X3bGw9pJoS TZcg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c10si147488pfg.172.2019.03.28.15.09.13; Thu, 28 Mar 2019 15:09:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728034AbfC1WI2 (ORCPT + 99 others); Thu, 28 Mar 2019 18:08:28 -0400 Received: from mx1.redhat.com ([209.132.183.28]:53304 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727238AbfC1WI2 (ORCPT ); Thu, 28 Mar 2019 18:08:28 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 8B6A73082AF0; Thu, 28 Mar 2019 22:08:27 +0000 (UTC) Received: from redhat.com (ovpn-121-118.rdu2.redhat.com [10.10.121.118]) by smtp.corp.redhat.com (Postfix) with ESMTPS id A056D5D961; Thu, 28 Mar 2019 22:08:26 +0000 (UTC) Date: Thu, 28 Mar 2019 18:08:24 -0400 From: Jerome Glisse To: John Hubbard Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, Andrew Morton , Dan Williams Subject: Re: [PATCH v2 10/11] mm/hmm: add helpers for driver to safely take the mmap_sem v2 Message-ID: <20190328220824.GE13560@redhat.com> References: <20190325144011.10560-1-jglisse@redhat.com> <20190325144011.10560-11-jglisse@redhat.com> <9df742eb-61ca-3629-a5f4-8ad1244ff840@nvidia.com> <20190328213047.GB13560@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.45]); Thu, 28 Mar 2019 22:08:27 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Mar 28, 2019 at 02:41:02PM -0700, John Hubbard wrote: > On 3/28/19 2:30 PM, Jerome Glisse wrote: > > On Thu, Mar 28, 2019 at 01:54:01PM -0700, John Hubbard wrote: > >> On 3/25/19 7:40 AM, jglisse@redhat.com wrote: > >>> From: J?r?me Glisse > >>> > >>> The device driver context which holds reference to mirror and thus to > >>> core hmm struct might outlive the mm against which it was created. To > >>> avoid every driver to check for that case provide an helper that check > >>> if mm is still alive and take the mmap_sem in read mode if so. If the > >>> mm have been destroy (mmu_notifier release call back did happen) then > >>> we return -EINVAL so that calling code knows that it is trying to do > >>> something against a mm that is no longer valid. > >>> > >>> Changes since v1: > >>> - removed bunch of useless check (if API is use with bogus argument > >>> better to fail loudly so user fix their code) > >>> > >>> Signed-off-by: J?r?me Glisse > >>> Reviewed-by: Ralph Campbell > >>> Cc: Andrew Morton > >>> Cc: John Hubbard > >>> Cc: Dan Williams > >>> --- > >>> include/linux/hmm.h | 50 ++++++++++++++++++++++++++++++++++++++++++--- > >>> 1 file changed, 47 insertions(+), 3 deletions(-) > >>> > >>> diff --git a/include/linux/hmm.h b/include/linux/hmm.h > >>> index f3b919b04eda..5f9deaeb9d77 100644 > >>> --- a/include/linux/hmm.h > >>> +++ b/include/linux/hmm.h > >>> @@ -438,6 +438,50 @@ struct hmm_mirror { > >>> int hmm_mirror_register(struct hmm_mirror *mirror, struct mm_struct *mm); > >>> void hmm_mirror_unregister(struct hmm_mirror *mirror); > >>> > >>> +/* > >>> + * hmm_mirror_mm_down_read() - lock the mmap_sem in read mode > >>> + * @mirror: the HMM mm mirror for which we want to lock the mmap_sem > >>> + * Returns: -EINVAL if the mm is dead, 0 otherwise (lock taken). > >>> + * > >>> + * The device driver context which holds reference to mirror and thus to core > >>> + * hmm struct might outlive the mm against which it was created. To avoid every > >>> + * driver to check for that case provide an helper that check if mm is still > >>> + * alive and take the mmap_sem in read mode if so. If the mm have been destroy > >>> + * (mmu_notifier release call back did happen) then we return -EINVAL so that > >>> + * calling code knows that it is trying to do something against a mm that is > >>> + * no longer valid. > >>> + */ > >>> +static inline int hmm_mirror_mm_down_read(struct hmm_mirror *mirror) > >> > >> Hi Jerome, > >> > >> Let's please not do this. There are at least two problems here: > >> > >> 1. The hmm_mirror_mm_down_read() wrapper around down_read() requires a > >> return value. This is counter to how locking is normally done: callers do > >> not normally have to check the return value of most locks (other than > >> trylocks). And sure enough, your own code below doesn't check the return value. > >> That is a pretty good illustration of why not to do this. > > > > Please read the function description this is not about checking lock > > return value it is about checking wether we are racing with process > > destruction and avoid trying to take lock in such cases so that driver > > do abort as quickly as possible when a process is being kill. > > > >> > >> 2. This is a weird place to randomly check for semi-unrelated state, such > >> as "is HMM still alive". By that I mean, if you have to detect a problem > >> at down_read() time, then the problem could have existed both before and > >> after the call to this wrapper. So it is providing a false sense of security, > >> and it is therefore actually undesirable to add the code. > > > > It is not, this function is use in device page fault handler which will > > happens asynchronously from CPU event or process lifetime when a process > > is killed or is dying we do want to avoid useless page fault work and > > we do want to avoid blocking the page fault queue of the device. This > > function reports to the caller that the process is dying and that it > > should just abort the page fault and do whatever other device specific > > thing that needs to happen. > > > > But it's inherently racy, to check for a condition outside of any lock, so again, > it's a false sense of security. Yes and race are fine here, this is to avoid useless work if we are unlucky and we race and fail to see the destruction that is just happening then it is fine we are just going to do useless work. So we do not care about race here we just want to bailout early if we can witness the process dying. > > >> > >> If you insist on having this wrapper, I think it should have approximately > >> this form: > >> > >> void hmm_mirror_mm_down_read(...) > >> { > >> WARN_ON(...) > >> down_read(...) > >> } > > > > I do insist as it is useful and use by both RDMA and nouveau and the > > above would kill the intent. The intent is do not try to take the lock > > if the process is dying. > > Could you provide me a link to those examples so I can take a peek? I > am still convinced that this whole thing is a race condition at best. The race is fine and ok see: https://cgit.freedesktop.org/~glisse/linux/commit/?h=hmm-odp-v2&id=eebd4f3095290a16ebc03182e2d3ab5dfa7b05ec which has been posted and i think i provided a link in the cover letter to that post. The same patch exist for nouveau i need to cleanup that tree and push it. > > > > > >> > >>> +{ > >>> + struct mm_struct *mm; > >>> + > >>> + /* Sanity check ... */ > >>> + if (!mirror || !mirror->hmm) > >>> + return -EINVAL; > >>> + /* > >>> + * Before trying to take the mmap_sem make sure the mm is still > >>> + * alive as device driver context might outlive the mm lifetime. > >> > >> Let's find another way, and a better place, to solve this problem. > >> Ref counting? > > > > This has nothing to do with refcount or use after free or anthing > > like that. It is just about checking wether we are about to do > > something pointless. If the process is dying then it is pointless > > to try to take the lock and it is pointless for the device driver > > to trigger handle_mm_fault(). > > Well, what happens if you let such pointless code run anyway? > Does everything still work? If yes, then we don't need this change. > If no, then we need a race-free version of this change. Yes everything work, nothing bad can happen from a race, it will just do useless work which never hurt anyone. Cheers, J?r?me