Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp1315795rwd; Tue, 16 May 2023 15:28:34 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5Oj6W9LFUQGCUzrMx8p+quqIZQH1J5wJBvpNjZQ6Ckt++VQ2aSPRafR0/5GI41NZAlOwzg X-Received: by 2002:a05:6a21:999f:b0:100:b7b5:ca34 with SMTP id ve31-20020a056a21999f00b00100b7b5ca34mr303653pzb.13.1684276114330; Tue, 16 May 2023 15:28:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684276114; cv=none; d=google.com; s=arc-20160816; b=xSLJhFNUPCkQOA+AL9mt7h1Jqfe3GeueF7Y6e0i9xx2YgDUJ/2nu5PRN7RklZ1KbzE zBHT+5pDfGyaYIkFPkHMOW5ZqIOy2B0uSvpdrjd+6C/rpKtKUn+pivpx+kxRW7zXF/pJ H2kL/lL8bykI8MTcyBusvpb+ReiPos9ixuGj/G7u9p57CAURt98tRUGsfd/QlNMCNXI3 JGqufOjWHOGoUgODylKhG7Icm9gkUzzpufBzlboWHbSwAe50JqOsAhhMwIrl14j4RaGT vdZo7mc8Oz+ZDkNWFc+Smbe6EYGcvoLhBiYyWIfKkUUvPMUhwTExHgpLf0IotG0BP9f9 /I5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Pwx1jkl4h29kUsH9LfXmkFpXByeq8d5y6Z1x1RVjkO0=; b=YRIRNFCpFyvRbF5JCZIYphr0TmQrEzH6r+CMPRqOZckgYg9T4kQPzMykW+0QwSrkOf TyAJSqU0HQfzQsHCf73j2KrKn7cy0VxUNQ7Xjln3L9lJC2blY0iar//Pm80a0q9g49+T uPBdpEePFCOyhVGlVlZ3VdnKH2sC9SEsdLu1w8Qq05CIPRvW49p0usgI4I7hBRupaSkV oWsUIL/QXgTl78nktgEmhVebtD/hqQlDxtzu4+HbHQYJnpVqzBV2eppijuaJNtHJ2GzF jUqbkw5utlUlT0Qq/9XiET+YGKUEX8i3m4IBpNHc5h7IG/6OblGraAbjzizrMcz9EMu9 KLgg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b=KjE0r8pd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h189-20020a636cc6000000b005023e0f160dsi18652573pgc.489.2023.05.16.15.28.19; Tue, 16 May 2023 15:28:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b=KjE0r8pd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229803AbjEPWQC (ORCPT + 99 others); Tue, 16 May 2023 18:16:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48286 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229454AbjEPWQB (ORCPT ); Tue, 16 May 2023 18:16:01 -0400 Received: from mail-wr1-x429.google.com (mail-wr1-x429.google.com [IPv6:2a00:1450:4864:20::429]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 55DE846B0 for ; Tue, 16 May 2023 15:15:58 -0700 (PDT) Received: by mail-wr1-x429.google.com with SMTP id ffacd0b85a97d-30771c68a9eso13907771f8f.2 for ; Tue, 16 May 2023 15:15:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1684275357; x=1686867357; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=Pwx1jkl4h29kUsH9LfXmkFpXByeq8d5y6Z1x1RVjkO0=; b=KjE0r8pdu60tyb6Cn9GrFysPUPYCVeU2K6U0ZHc50rekqX8XmhOatjQ2HfWXQDbmfN pzjczlbTdE2koED8sQDuSOfOiukQVbS7DYSa2EURNEqTAxCsUmlTpSxNCnkQ7jWEkIfd qid+sDbvCkwQTFcTaoQKyvOtVpDYjscvJD2//ThRlBD6N0oWnyt2SHl8VdjzUWM/hrQI NjFatnZBLisDRkBBmkBHGXCs9v5pCXlNxwq94VcVfkNKXjHLeFsGmDVhpo+1g16zHmEh VbFI3CaqyenFsDD9W55dgJ7nBpjDemGyNPuQjyiTHWpvobkrsZZTiBGq6BVoSiViOvM4 OB4Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1684275357; x=1686867357; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=Pwx1jkl4h29kUsH9LfXmkFpXByeq8d5y6Z1x1RVjkO0=; b=OXEBj8WwLwpNrAuyo5uYelmnIxUL8SKnDUAijwoB8F7VuKldnXfdMD2ecLNTSSzEB/ UBObNkKFVgIuH4IOQekLWOc6jI3Z8FpOFkiL3pbhR61HgRUrMjvtdQDkfxHCsXoE+maU +zV7ZcY++ZbJovcFlsyt/taLjDQdCok5GXpp4xhDkj3y3zdPdCsZ7wdQVHBwCaOKJefp +l0Pf2PrTsFO5+8lhdk0ExIOhRG/QKVBLPEvL86/py9pHd/gs2JPFDU2vxrU0B0urL2J S4jEyov1sT89eYQiOUoozsXv9TTgvLIF15XGwR8ZR9uEG/JNJR/P9qSaujuZl6lYzeTe I2FQ== X-Gm-Message-State: AC+VfDy9GPqIQF9yuDChiher3Eize6tFkBgvopC+d0xO6FIrLh4KXfJU EpjmHE64E4KnPW4PlJYindUR4wF6aHkRNw== X-Received: by 2002:adf:e690:0:b0:2e8:b9bb:f969 with SMTP id r16-20020adfe690000000b002e8b9bbf969mr28093005wrm.0.1684275356374; Tue, 16 May 2023 15:15:56 -0700 (PDT) Received: from localhost (host86-156-84-164.range86-156.btcentralplus.com. [86.156.84.164]) by smtp.gmail.com with ESMTPSA id k20-20020a7bc414000000b003f18b942338sm208535wmi.3.2023.05.16.15.15.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 May 2023 15:15:55 -0700 (PDT) Date: Tue, 16 May 2023 23:15:54 +0100 From: Lorenzo Stoakes To: Peter Xu Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, Andrew Morton , Mike Rapoport , Mark Rutland , "Liam R . Howlett" , Alexander Viro , Christian Brauner Subject: Re: [PATCH v2] mm: userfaultfd: avoid passing an invalid range to vma_merge() Message-ID: <9174fd63-5d32-4b83-bf6b-27f9cb00bd9e@lucifer.local> References: <20230515193232.67552-1-lstoakes@gmail.com> <20abea10-5307-498b-b9df-8f0b2fed1701@lucifer.local> <9739133c-3ee7-4e94-a6a8-783045a50ac6@lucifer.local> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 16, 2023 at 05:39:53PM -0400, Peter Xu wrote: > On Tue, May 16, 2023 at 10:01:06PM +0100, Lorenzo Stoakes wrote: > > On Tue, May 16, 2023 at 04:30:11PM -0400, Peter Xu wrote: > > > On Tue, May 16, 2023 at 08:25:13PM +0100, Lorenzo Stoakes wrote: > > > > On Tue, May 16, 2023 at 11:06:40AM -0400, Peter Xu wrote: > > > > > On Tue, May 16, 2023 at 12:07:11AM +0100, Lorenzo Stoakes wrote: > > > > > > On Mon, May 15, 2023 at 11:04:27PM +0100, Lorenzo Stoakes wrote: > > > > > > [snip] > > > > > > > > Could you explain a bit why we don't need to merge in this case? > > > > > > > > > > > > > > > > I'm considering, for example, when we have: > > > > > > > > > > > > > > > > vma1(range 0-9, with uffd), vma2(range 10-19, no uffd) > > > > > > > > > > > > > > > > Then someone unregisters uffd on range (5-9), iiuc it should become: > > > > > > > > > > > > > > > > vma1(range 0-4, with uffd), vma2(range 5-19, no uffd) > > > > > > > > > > > > > > > > But if no merge here it's: > > > > > > > > > > > > > > > > vma1(range 0-4, with uffd), vma3(range 5-9, no uffd), vma2(range 10-19, no uffd) > > > > > > > > > > > > > > > > Maybe I missed something? > > > > > > > > > > > > > > > > > > > > > > There's something really, really wrong with this. It simply isn't valid to > > > > > > > invoke vma_merge() over an existing VMA that != prev where you're not > > > > > > > specifying addr = vma->vm_start, end == vma->vm_end. > > > > > > > > > > > > > > This seems like you're relying on:- > > > > > > > > > > > > > > *** > > > > > > > CCCCCNNNNN -> CCNNNNNNNN > > > > > > > > > > I had a closer look today, I still think this patch is not really the right > > > > > one. The split/merge order is something we use everywhere and I am not > > > > > convinced it must change as drastic. At least so far it still seems to me > > > > > if we do with what current patch proposed we can have vma fragmentations. > > > > > > > > 'something we use everywhere' is not an argument (speak to Willy about > > > > folios), vma_merge() expects valid input, relying on it _happening_ to be > > > > > > I still think it's an argument. > > > > > > I believe Matthew tried hard to justify he's correct in that aspect when > > > changing "something we used everywhere". Blindly referencing it doesn't > > > help much on a technical discussion. > > > > > > If we have similar code that handles similar things, IMHO you need a reason > > > to modify one of them to not like the other. > > > > > > If you think what you proposed is better, please consider (1) justify why > > > it's better, and then (2) also apply it to all the rest places where > > > applicable. Please refer to my reply to Liam on the other use cases of > > > vma_merge(). > > > > > > Said that, I apprecaite a lot on your assert patch that found this problem. > > > > > > > ok or to fail in ways that _happen_ not to cause big problems is not right. > > > > > > > > This is just further evidence that the vma_merge() interface is > > > > fundamentally broken. Implicitly assuming you will only get a partial prev > > > > overlap merge is far from intuitive. > > > > > > > > I am definitely going to try to do a series addressing vma_merge() horrors > > > > because I feel like we need a generic means of doing this split/merge pattern. > > > > > > It'll be great if you can make it better. > > > > > > > > > > > > > > > > > I think I see what you meant, but here I think it's a legal case where we > > > > > should have PPPP rather than CCCC (PPPPPNNNN --> PPNNNNNNNN). > > > > > > > > > > To be explicit, for register I think it _should_ be the case 0 where we > > > > > cannot merge (note: the current code is indeed wrong though, see below): > > > > > > > > > > **** > > > > > PPPPPPNNNNNN > > > > > cannot merge > > > > > > > > > > While for the unregister case here it's case 4: > > > > > > > > > > **** > > > > > PPPPPPNNNNNN > > > > > might become > > > > > PPNNNNNNNNNN > > > > > case 4 below > > > > > > > > > > Here the problem is not that we need to do split then merge (I think it'll > > > > > have the problem of vma defragmentation here), the problem is we simply > > > > > passed in the wrong "prev" vma pointer, IMHO. I've patches attached > > > > > showing what I meant. > > > > > > > > Yeah if you do it with prev = vma this form should _probably_ work, that's > > > > a good point. This _is_ a case (see https://ljs.io/vma_merge_cases.png for > > > > nice diagram of cases btw :), like 5, where we actually do split and merge > > > > at the same time. > > > > > > It's not something I came up with myself, it's just that I started looking > > > back to see what people did and trying to understand why they did it. > > > Normally people did things with good reasons. > > > > > > > Yup, it's an iffy pattern in each case. I can see why you chose to do it, > > it's not a criticism of that, it's just that the incorrect (but > > accidentally ok to be incorrect seemingly) input is made more obvious by > > recent changes. > > > > > So far it seems clearer at least to me to keep this pattern of "merge then > > > split". But I'm happy to be proven wrong anytime. > > > > But you're not, you're doing a vma_merge() and (without it being clear) > > hoping it does a merge AND SPLIT in case in an instance where that might be > > required followed by you doing any further splits required. > > I don't quite get the reason that you seem to keep saying this is > "incorrect input" to vma_merge(). vma_merge() definitely includes splits > too where it can, to be explicit, for case 4 & 5. OK so I think there's some kind of confusion here. I'm saying the input uffd code is sending is invalid. So does a VMA_WARN_ON(). I'm saying having code that doesn't _very clearly_ send valid inputs is a bad idea. You may disagree with both of these, that's fine. I'm not saying cases 4/5 are 'wrong' in any sense. I'll try to address this in a later series, I don't think there's much use in going round in circles on this. If you dislike that series, you're welcome to provide negative feedback there, I don't think there's much use in discussing further here. > > It seems to me what you're trying to explain is we shouldn't handle any > split in vma_merge() so we should move cases 4 & 5 out of vma_merge(). If > we split first then merge, cases 4 & 5 will become case 2 & 3 after split. > My question would be: if it worked perfect in the past few years and it > looks all good enough, why bother.. > Nope. Not saying that at all. You (appear to) say 'do a merge then split' is clearer then 'split to valid input then try to merge'. I was just pointing out that 'merge' is not always a merge. Sometimes it's a split too, and that it's not quite as clear as you say. My whole criticism of this interface is not _this code_, but rather that the interface is unclear. We've seen a regression on invalid input to vma_merge() (explicitly I mean triggering a VM_WARN_ON()) and VMA fragmentation you were not aware of here, that does not strike me as a great + clear interface. However again, I don't think this is the place for _that_ disagreement, you are welcome to respond negatively to the patch series which tries to tackle this when I propose it. > > > > But it's _not your fault_ that this is the standard approach, it's the > > interface that's wrong absolutely. > > > > To me doing this is quite a bit less clear than simply 'splitting so this > > is mergable first then try to merge' but obviously this current patch does > > not avoid the previously introduced fragmentation. However it does maintain > > existing behaviour. > > > > > > > > > > > > > Liam's raised some issues with the safety of your patches, let me look at > > > > them when I get a chance, nasty headcold = brain less functional atm. > > > > > > Sure, no need to rush. > > > > > > > > > > > I would say for now this fix resolves the issue in a way that should > > > > emphatically avoid invalid input to vma_merge(), the fragmentation existed > > > > before so this is not a new issue, so for the time being I think it's ok to > > > > stay as-is. > > > > > > So far I would still suggest having uffd code the same as the rest if > > > possible. > > > > > > > Absolutely, but in the immediate term, we are seeing VM_WARN_ON()'s here > > and not from other callers (which is actually surprising). > > Not surprising anymore to me, simply because the uffd path was the only one > got overlooked when converting to maple in commit 69dbe6daf104, as Liam > rightfully pointed out. > > For example, mprotect() has similar handling when the start addr of the > range can be in the middle of a vma, then in do_mprotect_pkey() there is: > > prev = vma_prev(&vmi); > if (start > vma->vm_start) > prev = vma; > > IMHO it's the same thing. Yeah it probably is I agree. > > > > > Again, we absolutely do need an abstracted solution for the whole. And > > that's something I'll try to work on! > > > > > I think I'll wait for the other discussion to settle on patch 2 to see > > > whether I should post a formal patchset. > > > > My suggestion is that it's ok to proceed as-is, not because this is the > > final change that should be applied, but rather because it resolves the > > issue while maintaining existing behaviour. > > > > I will be more than happy to see patches land after this one that replace > > it if necessary but I think it's safe for this to land as a mainline fixup, > > even if temporary, is all I am saying :) > > I'd hope we can replace this patch with my patch 1 if possible because I > _think_ this patch is still in hotfixes-unstable (while patch 2 doesn't > need to copy stable in all cases). Andrew may know better on how to > proceed. > > If this lands first, I'll probably propose a full revert otherwise as the > 1st patch of the patchset to post, then make uffd the same as others. Ah the thanks you get for contributing a regression fix _and_ a repro - a nack :) will you at least give me some kind of a tag... or buy me a beer? ;) Honestly it's fine to replace it with something more consistent with the rest, as I think the _better_ solution is to fix them all at once with a better abstraction. That can come later as mentioned above. > > Before that I'd like to know whether you agree that the new patch 1 (I'll > fixup the vma_prev() side effect) could be a better solution than the > current one, no matter whether we need a full revert or not. In principle it looks fine actually (pending Liam's assessment), case 4/5 should handle it, but I feel like we need a comment (perhaps only in commit msg) to make clear that we are ensuring that the inputs to vma_merge() are either clamped to VMAs or case 4/5. Let's see what Liam thinks, then let me check it locally to give a final OK, if I may. > > Thanks, > > > > > > > > > > > > > > > > > > > > I checked the original commit from Andrea and I found that it _was_ correct: > > > > > > > > > > commit 86039bd3b4e6a1129318cbfed4e0a6e001656635 > > > > > Author: Andrea Arcangeli > > > > > Date: Fri Sep 4 15:46:31 2015 -0700 > > > > > > > > > > userfaultfd: add new syscall to provide memory externalization > > > > > > > > > > I had a feeling that it's broken during the recent rework on vma (or maybe > > > > > even not that close), but I'm not yet sure and need to further check. > > > > > > > > > > > > > > > > > > > By specifying parameters that are compatible with N even though you're only > > > > > > > partially spanning C? > > > > > > > > > > > > > > This is crazy, and isn't how this should be used. vma_merge() is not > > > > > > > supposed to do partial merges. If it works (presumably it does) this is not > > > > > > > by design unless I've lost my mind and I (and others) have somehow not > > > > > > > noticed this?? > > > > > > > > > > > > > > I think you're right that now we'll end up with more fragmentation, but > > > > > > > what you're suggesting is not how vma_merge() is supposed to work. > > > > > > > > > > > > > > As I said above, giving vma_merge() invalid parameters is very dangerous as > > > > > > > you could end up merging over empty ranges in theory (and could otherwise > > > > > > > have corruption). > > > > > > > > > > > > > > I guess we should probably be passing 0 to the last parameter in > > > > > > > split_vma() here then to ensure we do a merge pass too. Will experiment > > > > > > > with this. > > > > > > > > > > > > > > I'm confused as to how the remove from case 8 is not proceeding. I'll look > > > > > > > into this some more... > > > > > > > > > > > > > > Happy to be corrected if I'm misconstruing this! > > > > > > > > > > > > > > > > > > > OK, so I wrote a small program to do perform exactly this case [0] and it seems > > > > > > that the outcome is the same before and after this patch - vma_merge() is > > > > > > clearly rejecting the case 8 merge (phew!) and in both instances you end up with > > > > > > 3 VMAs. > > > > > > > > > > > > So this patch doesn't change this behaviour and everything is as it was > > > > > > before. Ideally we'd let it go for another pass, so maybe we should change the > > > > > > split to add a new VMA _afterwards_. Will experiment with that, separately. > > > > > > > > > > > > But looks like the patch is good as it is. > > > > > > > > > > > > (if you notice something wrong with the repro, etc. do let me know!) > > > > > > > > > > > > [0]: https://gist.github.com/lorenzo-stoakes/a11a10f5f479e7a977fc456331266e0e > > > > > > > > > > I think your test case is fine, but... no, this is still not expected. The > > > > > vma should just merge. > > > > > > > > > > So I have another closer look on this specific issue, it seems we have a > > > > > long standing bug on pgoff calculation here when passing that to > > > > > vma_merge(). I've got another patch attached to show what I meant. > > > > > > > > > > To summarize.. now I've got two patches attached: > > > > > > > > > > Patch 1 is something I'd like to propose to replace this patch that fixes > > > > > incorrect use of vma_merge() so it should also eliminate the assertion > > > > > being triggered (I still think this is a regression but I need to check > > > > > which I will do later; I'm not super familiar with maple tree work, maybe > > > > > you or Liam can quickly spot). > > > > > > > > > > Patch 2 fixes the long standing issue of vma not being able to merge in > > > > > above case, and with patch 2 applied it should start merging all right. > > > > > > > > > > Please have a look, thanks. > > > > > > > > > > ---8<--- > > > > > From 6bc39028bba246394bb0bafdaeaab7b8dfd1694f Mon Sep 17 00:00:00 2001 > > > > > From: Peter Xu > > > > > Date: Tue, 16 May 2023 09:03:22 -0400 > > > > > Subject: [PATCH 1/2] mm/uffd: Fix vma operation where start addr cuts part of > > > > > vma > > > > > > > > > > It seems vma merging with uffd paths is broken with either > > > > > register/unregister, where right now we can feed wrong parameters to > > > > > vma_merge() and it's found by recent patch which moved asserts upwards in > > > > > vma_merge(): > > > > > > > > > > https://lore.kernel.org/all/ZFunF7DmMdK05MoF@FVFF77S0Q05N.cambridge.arm.com/ > > > > > > > > > > The problem is in the current code base we didn't fixup "prev" for the case > > > > > where "start" address can be within the "prev" vma section. In that case > > > > > we should have "prev" points to the current vma rather than the previous > > > > > one when feeding to vma_merge(). > > > > > > > > > > This will eliminate the report and make sure vma_merge() calls will become > > > > > legal again. > > > > > > > > > > Signed-off-by: Peter Xu > > > > > --- > > > > > fs/userfaultfd.c | 27 +++++++++++++++++++++------ > > > > > 1 file changed, 21 insertions(+), 6 deletions(-) > > > > > > > > > > diff --git a/fs/userfaultfd.c b/fs/userfaultfd.c > > > > > index 0fd96d6e39ce..7eb88bc74d00 100644 > > > > > --- a/fs/userfaultfd.c > > > > > +++ b/fs/userfaultfd.c > > > > > @@ -1458,10 +1458,17 @@ static int userfaultfd_register(struct userfaultfd_ctx *ctx, > > > > > BUG_ON(!found); > > > > > > > > > > vma_iter_set(&vmi, start); > > > > > - prev = vma_prev(&vmi); > > > > > + vma = vma_find(&vmi, end); > > > > > + if (!vma) > > > > > + goto out_unlock; > > > > > + > > > > > + if (vma->vm_start < start) > > > > > + prev = vma; > > > > > + else > > > > > + prev = vma_prev(&vmi); > > > > > > > > > > ret = 0; > > > > > - for_each_vma_range(vmi, vma, end) { > > > > > + do { > > > > > cond_resched(); > > > > > > > > > > BUG_ON(!vma_can_userfault(vma, vm_flags)); > > > > > @@ -1517,7 +1524,7 @@ static int userfaultfd_register(struct userfaultfd_ctx *ctx, > > > > > skip: > > > > > prev = vma; > > > > > start = vma->vm_end; > > > > > - } > > > > > + } for_each_vma_range(vmi, vma, end); > > > > > > > > > > out_unlock: > > > > > mmap_write_unlock(mm); > > > > > @@ -1624,9 +1631,17 @@ static int userfaultfd_unregister(struct userfaultfd_ctx *ctx, > > > > > BUG_ON(!found); > > > > > > > > > > vma_iter_set(&vmi, start); > > > > > - prev = vma_prev(&vmi); > > > > > + vma = vma_find(&vmi, end); > > > > > + if (!vma) > > > > > + goto out_unlock; > > > > > + > > > > > + if (vma->vm_start < start) > > > > > + prev = vma; > > > > > + else > > > > > + prev = vma_prev(&vmi); > > > > > + > > > > > ret = 0; > > > > > - for_each_vma_range(vmi, vma, end) { > > > > > + do { > > > > > cond_resched(); > > > > > > > > > > BUG_ON(!vma_can_userfault(vma, vma->vm_flags)); > > > > > @@ -1692,7 +1707,7 @@ static int userfaultfd_unregister(struct userfaultfd_ctx *ctx, > > > > > skip: > > > > > prev = vma; > > > > > start = vma->vm_end; > > > > > - } > > > > > + } for_each_vma_range(vmi, vma, end); > > > > > > > > > > out_unlock: > > > > > mmap_write_unlock(mm); > > > > > -- > > > > > 2.39.1 > > > > > > > > > > From bf61f3c937e9e2ab96ab2bed0005cb7dc74db231 Mon Sep 17 00:00:00 2001 > > > > > From: Peter Xu > > > > > Date: Tue, 16 May 2023 09:39:38 -0400 > > > > > Subject: [PATCH 2/2] mm/uffd: Allow vma to merge as much as possible > > > > > > > > > > We used to not pass in the pgoff correctly when register/unregister uffd > > > > > regions, it caused incorrect behavior on vma merging. > > > > > > > > > > For example, when we have: > > > > > > > > > > vma1(range 0-9, with uffd), vma2(range 10-19, no uffd) > > > > > > > > > > Then someone unregisters uffd on range (5-9), it should become: > > > > > > > > > > vma1(range 0-4, with uffd), vma2(range 5-19, no uffd) > > > > > > > > > > But with current code it's: > > > > > > > > > > vma1(range 0-4, with uffd), vma3(range 5-9, no uffd), vma2(range 10-19, no uffd) > > > > > > > > > > This patch allows such merge to happen correctly. > > > > > > > > > > This behavior seems to have existed since the 1st day of uffd, keep it just > > > > > as a performance optmization and not copy stable. > > > > > > > > > > Cc: Andrea Arcangeli > > > > > Cc: Mike Rapoport (IBM) > > > > > Signed-off-by: Peter Xu > > > > > --- > > > > > fs/userfaultfd.c | 8 ++++++-- > > > > > 1 file changed, 6 insertions(+), 2 deletions(-) > > > > > > > > > > diff --git a/fs/userfaultfd.c b/fs/userfaultfd.c > > > > > index 7eb88bc74d00..891048b4799f 100644 > > > > > --- a/fs/userfaultfd.c > > > > > +++ b/fs/userfaultfd.c > > > > > @@ -1332,6 +1332,7 @@ static int userfaultfd_register(struct userfaultfd_ctx *ctx, > > > > > bool basic_ioctls; > > > > > unsigned long start, end, vma_end; > > > > > struct vma_iterator vmi; > > > > > + pgoff_t pgoff; > > > > > > > > > > user_uffdio_register = (struct uffdio_register __user *) arg; > > > > > > > > > > @@ -1489,8 +1490,9 @@ static int userfaultfd_register(struct userfaultfd_ctx *ctx, > > > > > vma_end = min(end, vma->vm_end); > > > > > > > > > > new_flags = (vma->vm_flags & ~__VM_UFFD_FLAGS) | vm_flags; > > > > > + pgoff = vma->vm_pgoff + ((start - vma->vm_start) >> PAGE_SHIFT); > > > > > prev = vma_merge(&vmi, mm, prev, start, vma_end, new_flags, > > > > > - vma->anon_vma, vma->vm_file, vma->vm_pgoff, > > > > > + vma->anon_vma, vma->vm_file, pgoff, > > > > > vma_policy(vma), > > > > > ((struct vm_userfaultfd_ctx){ ctx }), > > > > > anon_vma_name(vma)); > > > > > @@ -1570,6 +1572,7 @@ static int userfaultfd_unregister(struct userfaultfd_ctx *ctx, > > > > > unsigned long start, end, vma_end; > > > > > const void __user *buf = (void __user *)arg; > > > > > struct vma_iterator vmi; > > > > > + pgoff_t pgoff; > > > > > > > > > > ret = -EFAULT; > > > > > if (copy_from_user(&uffdio_unregister, buf, sizeof(uffdio_unregister))) > > > > > @@ -1677,8 +1680,9 @@ static int userfaultfd_unregister(struct userfaultfd_ctx *ctx, > > > > > uffd_wp_range(vma, start, vma_end - start, false); > > > > > > > > > > new_flags = vma->vm_flags & ~__VM_UFFD_FLAGS; > > > > > + pgoff = vma->vm_pgoff + ((start - vma->vm_start) >> PAGE_SHIFT); > > > > > prev = vma_merge(&vmi, mm, prev, start, vma_end, new_flags, > > > > > - vma->anon_vma, vma->vm_file, vma->vm_pgoff, > > > > > + vma->anon_vma, vma->vm_file, pgoff, > > > > > vma_policy(vma), > > > > > NULL_VM_UFFD_CTX, anon_vma_name(vma)); > > > > > if (prev) { > > > > > -- > > > > > 2.39.1 > > > > > ---8<--- > > > > > > > > > > -- > > > > > Peter Xu > > > > > > > > > > > > > > > -- > > > Peter Xu > > > > > > > > > > -- > Peter Xu > >