Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp60476pxb; Fri, 29 Oct 2021 05:52:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzZZLj0fKvZicNNKW+pb4nAFwB9Vg498v7LFbrGjeVxL5QmCpmER+5ab56dIbW2lIyonyXA X-Received: by 2002:a17:907:9246:: with SMTP id kb6mr2577019ejb.412.1635511977976; Fri, 29 Oct 2021 05:52:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635511977; cv=none; d=google.com; s=arc-20160816; b=iugWrKt8ljk9g1AegctRxyH6lsVjTiQPcfpW9npu46eEqKvCXHQYth/qiG6JLEGDET Q3pGIp8dogCukFftWr7jEkjQMJyqSGtmDbQirmr8JGp5c2YtW4mhBjxYT/wGzcG3ARze igBvJuAbxL5olJTDgHlnCk5x1NywYXoFJZT5MCfPyc+hn8pAJjdnxRK9iG1dGWvhQ8DM IbPjKZWKk0wZG9Cp093PzjippyJ1IPIA9NHtwtoyvYtGjWxgqoCweE36uWFnFjqQi5v/ FdUMyDuciDFlCnLpzjJFbzIQiFboUJ+a+Rn5a/auTov/Fy9KfzpCF8yW7Qu4owFkS8Fd VAVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=RLrkAdHUvF5GbcOwR5tVKBkCzIU1RKlxp8OLSMty0X0=; b=nnY7Bjz2Voda0iZi/ad1LjjkfW5pgWjgtKBTBXMGQ+8REMnZwBD6sITUL+1Au3Os4h JYFLoch+zuS6DnniPfTQ9UbR44a1J0C8O06qHUtjBqximG/Z0kVirJpdT2xKn2CSLrJE vgOSjIfIxF1zKZHvMoKEx/q1j8v2HAc2VzGp9o1lVapg+71tWtFDsUL+7lyO8jvKob1E C5PP9uTsvd1XJ3WN0eOis6+S1H3S5aA9fe2YTCcCSKVYh4lHXd8P7vQj0M5scAg5z7rE /kUSZbH9YEmUTczXysvg49OAL7ioWwXgMHKFkX2lm9V4LD/hwasE6P5dP8aJLXYt01D9 lNNQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k5si7721816edl.259.2021.10.29.05.52.33; Fri, 29 Oct 2021 05:52:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231559AbhJ2Mwm (ORCPT + 99 others); Fri, 29 Oct 2021 08:52:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:56628 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231367AbhJ2Mwl (ORCPT ); Fri, 29 Oct 2021 08:52:41 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id EAE10611CC; Fri, 29 Oct 2021 12:50:09 +0000 (UTC) Date: Fri, 29 Oct 2021 13:50:06 +0100 From: Catalin Marinas To: Andreas =?iso-8859-1?Q?Gr=FCnbacher?= Cc: Linus Torvalds , Andreas Gruenbacher , Paul Mackerras , Alexander Viro , Christoph Hellwig , "Darrick J. Wong" , Jan Kara , Matthew Wilcox , cluster-devel , linux-fsdevel , Linux Kernel Mailing List , ocfs2-devel@oss.oracle.com, kvm-ppc@vger.kernel.org, linux-btrfs Subject: Re: [PATCH v8 00/17] gfs2: Fix mmap + page fault deadlocks Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 29, 2021 at 12:15:55AM +0200, Andreas Gr?nbacher wrote: > Am Do., 28. Okt. 2021 um 23:21 Uhr schrieb Catalin Marinas > : > > I think for nested contexts we can save the uaccess fault state on > > exception entry, restore it on return. Or (needs some thinking on > > atomicity) save it in a local variable. The high-level API would look > > something like: > > > > unsigned long uaccess_flags; /* we could use TIF_ flags */ > > > > uaccess_flags = begin_retriable_uaccess(); > > copied = copy_page_from_iter_atomic(...); > > retry = end_retriable_uaccess(uaccess_flags); > > ... > > > > if (!retry) > > break; > > > > I think we'd need a TIF flag to mark the retriable region and another to > > track whether a non-recoverable fault occurred. It needs prototyping. > > > > Anyway, if you don't like this approach, I'll look at error codes being > > returned but rather than changing all copy_from_user() etc., introduce a > > new API that returns different error codes depending on the fault > > (e.g -EFAULT vs -EACCES). We already have copy_from_user_nofault(), we'd > > need something for the iov_iter stuff to use in the fs code. > > We won't need any of that on the filesystem read and write paths. The > two cases there are buffered and direct I/O: Thanks for the clarification, very useful. > * In the buffered I/O case, the copying happens with page faults > disabled, at a byte granularity. If that returns a short result, we > need to enable page faults, check if the exact address that failed > still fails (in which case we have a sub-page fault), fault in the > pages, disable page faults again, and repeat. No probing for sub-page > faults beyond the first byte of the fault-in address is needed. > Functions fault_in_{readable,writeable} implicitly have this behavior; > for fault_in_safe_writeable() the choice we have is to either add > probing of the first byte for sub-page faults to this function or > force callers to do that probing separately. At this point, I'd vote > for the former. This sounds fine to me (and I have some draft patches already on top of your series). > * In the direct I/O case, the copying happens while we're holding page > references, so the only page faults that can occur during copying are > sub-page faults. Does holding a page reference guarantee that the user pte pointing to such page won't change, for example a pte_mkold()? I assume for direct I/O, the PG_locked is not held. But see below, it may not be relevant. > When iomap_dio_rw or its legacy counterpart is called > with page faults disabled, we need to make sure that the caller can > distinguish between page faults triggered during > bio_iov_iter_get_pages() and during the copying, but that's a separate > problem. (At the moment, when iomap_dio_rw fails with -EFAULT, the > caller *cannot* distinguish between a bio_iov_iter_get_pages failure > and a failure during synchronous copying, but that could be fixed by > returning unique error codes from iomap_dio_rw.) Since the direct I/O pins the pages in memory, does it even need to do a uaccess? It could copy the data via the kernel mapping (kmap). For arm64 MTE, all such accesses are not checked (they use a match-all pointer tag) since the kernel is not set up to handle such sub-page faults (no copy_from/to_user but a direct access). > So as far as I can see, the only problematic case we're left with is > copying bigger than byte-size chunks with page faults disabled when we > don't know whether the underlying pages are resident or not. My guess > would be that in this case, if the copying fails, it would be > perfectly acceptable to explicitly probe the entire chunk for sub-page > faults. Yeah, if there are only a couple of places left, we can add the explicit probing (via some probe_user_writable function). -- Catalin