Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp4845402pxk; Wed, 30 Sep 2020 13:17:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx2MrqXXRL0cNgRVWJtV0fQrqJ+mw0Zl1imeEFvpdqGpfNP4berVmo47ERxuAe2A1iOj3q+ X-Received: by 2002:a05:6402:346:: with SMTP id r6mr4763375edw.301.1601497021247; Wed, 30 Sep 2020 13:17:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601497021; cv=none; d=google.com; s=arc-20160816; b=ug48n45go65QVoAKpsuJ0QVZUWHGMkGJ3bk3GZJpD9tnUDJqLPey8auX5tZBcSReUK K3Em+GcAaWuZ+dix+RHfFAK5HnPIRMtq0W94JEnIdb54eDZESC4NvE5bovZd06QB/PqT TuGGV30yoRE9NZ6e4U1HZ2t+7hZ/7EKzUp0uvZlvFP/9P46Emzs1++6ZUeBnF1aG71lv 0Q0XOipcavSgYd80lV8ZnUFtqseSX7BZHADR8+OcpAMo5DtDovJ1urkmaPMLCsUZKYIo KoshgTANdjGPAgqGNXTrQ8AsC71J4qK9KGHWPWCtAasmd++lEp1L6Z9Jenpdvdp5K/B1 dY5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=3sPuIrm/H+6tsFTaFl1P+i+ksxlkVa8mKtAEYrx+o10=; b=0AzWo7mzr6i7GsbzmjxL2P8pvdBhlQS97iRKaO3NwD+pfnn768Bk0gmrOnLEq4hW85 8aU36NyYpEMcHmDi4BKyfxBQLV/duV6rxDhdBIhlsdtYzaMlV0PGG9OWbrbtMux2fzBq rALsTDZmRTAnYJT19/9OkENRuex/02tq04S18ZFEEYtg3W8IbU/TWkwbE433/sBLVWm6 tXatmF1FC/OsAWhAbpwGBCceltZ4zEAS0AAKDVzZmXRucE37tnV6oce2FyZE4nXcMnJ2 MfKFDiYygeOvcUKmIyL6D+NjCM01iD/d4Ca6BZF9zEdA8UoBvyOVVgukpjeRVR5tXTCO N0NA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="L4wb/BfM"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id df4si1731079edb.378.2020.09.30.13.16.37; Wed, 30 Sep 2020 13:17:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="L4wb/BfM"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725892AbgI3UP0 (ORCPT + 99 others); Wed, 30 Sep 2020 16:15:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58374 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725355AbgI3UPZ (ORCPT ); Wed, 30 Sep 2020 16:15:25 -0400 Received: from mail-ej1-x642.google.com (mail-ej1-x642.google.com [IPv6:2a00:1450:4864:20::642]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 64474C061755 for ; Wed, 30 Sep 2020 13:15:25 -0700 (PDT) Received: by mail-ej1-x642.google.com with SMTP id qp15so3777161ejb.3 for ; Wed, 30 Sep 2020 13:15:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=3sPuIrm/H+6tsFTaFl1P+i+ksxlkVa8mKtAEYrx+o10=; b=L4wb/BfMnZfM59FoYSsrhnYFcWBnMSB7P03EwiydngMaA8RgPXyoP0JWUwlef486pY To9zt++muYCma88hlI3FOgRBHQKL9CjK/1aGelay7Vl9uCQhVeg5byiKXrwSRyQJGb9x F43pf5V/ZAS0vVVmxyBP9l9M1sIozAIA3/PJ5PqkRsW8rhJaVOmyGi9McLQDi8kf8l89 yR7tWr/YgWH7VTtV2W+Hur56sTq8j5p2Vl3vHm1UnikeVFptnc5vJYrsJI9hTthV9CKy U1+5DiWI2OYYWmb/tyFOp+J/VD9NK+xfOLPx/0N6sorU4kqAql9dXbqX4WzEWAd4ekih cc4A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=3sPuIrm/H+6tsFTaFl1P+i+ksxlkVa8mKtAEYrx+o10=; b=piPCTdyNJz0xcfKhAd5ofveJASSX9JMCTi8FzIxo2x1CY6uKIa/L6vabXTLDWEBTS9 EhB7pmEhEytnTYqm7YgRuDBEXq/t3KHlAg93+nWs5XCPU7zem1YicngME04nHyBuim0G apGn855e+tQ7pE6khfpxNZSngAse/ot+ywdxwatkTP8km8ZyvkvqYLLgcAc0SepJQlQR 53gx6Qji5/4yghwwoyVYUEqMijzcwhA59ApHOI+maOgm+bt7DFIqHL6PM3GbU07urwbv B9rm5uBSNBs6j/mvZ6HiPZaCBIGMtGeNMniX5dAZLuuiC7jm/qAHHErnhCpwHe0U8tMs IENQ== X-Gm-Message-State: AOAM530hTFSP0EhSLCsnq2J8YZKUBsVVxu64kAxwFnzaY4s3lKTosbhn IriRiwxDzQa4fa5T1c3f/UiZLIpMnrtkpva0GpRR8A== X-Received: by 2002:a17:906:980f:: with SMTP id lm15mr4759153ejb.184.1601496923121; Wed, 30 Sep 2020 13:15:23 -0700 (PDT) MIME-Version: 1.0 References: <20200930011944.19869-1-jannh@google.com> <20200930123000.GC9916@ziepe.ca> In-Reply-To: From: Jann Horn Date: Wed, 30 Sep 2020 22:14:57 +0200 Message-ID: Subject: Re: [PATCH 3/4] mmap locking API: Don't check locking if the mm isn't live yet To: Jason Gunthorpe Cc: Andrew Morton , Linux-MM , kernel list , "Eric W . Biederman" , Michel Lespinasse , Mauro Carvalho Chehab , Sakari Ailus Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 30, 2020 at 2:50 PM Jann Horn wrote: > On Wed, Sep 30, 2020 at 2:30 PM Jason Gunthorpe wrote: > > On Tue, Sep 29, 2020 at 06:20:00PM -0700, Jann Horn wrote: > > > In preparation for adding a mmap_assert_locked() check in > > > __get_user_pages(), teach the mmap_assert_*locked() helpers that it's fine > > > to operate on an mm without locking in the middle of execve() as long as > > > it hasn't been installed on a process yet. > > > > I'm happy to see lockdep being added here, but can you elaborate on > > why add this mmap_locked_required instead of obtaining the lock in the > > execv path? > > My thinking was: At that point, we're logically still in the > single-owner initialization phase of the mm_struct. Almost any object > has initialization and teardown steps that occur in a context where > the object only has a single owner, and therefore no locking is > required. It seems to me that adding locking in places like > get_arg_page() would be confusing because it would suggest the > existence of concurrency where there is no actual concurrency, and it > might be annoying in terms of lockdep if someone tries to use > something like get_arg_page() while holding the mmap_sem of the > calling process. It would also mean that we'd be doing extra locking > in normal kernel builds that isn't actually logically required. > > Hmm, on the other hand, dup_mmap() already locks the child mm (with > mmap_write_lock_nested()), so I guess it wouldn't be too bad to also > do it in get_arg_page() and tomoyo_dump_page(), with comments that > note that we're doing this for lockdep consistency... I guess I can go > change this in v2. Actually, I'm taking that back. There's an extra problem: get_arg_page() accesses bprm->vma, which is set all the way back in __bprm_mm_init(). We really shouldn't be pretending that we're properly taking the mmap_sem when actually, we keep reusing a vm_area_struct pointer. So for that reason I prefer the approach in the existing patch, where we make it clear that mm_struct has two different lifetime phases in which GUP works, and that those lifetime phases have very different locking requirements. Does that sound reasonable?