Received: by 2002:a05:7412:a9a2:b0:e2:908c:2ebd with SMTP id o34csp2408086rdh; Sun, 29 Oct 2023 15:02:38 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEuhyafS21F/52ivawAaCXWKltUeZZMjsGwtYy2shIIO4o84ErDWl+lC+zqOMroO13hWhj0 X-Received: by 2002:a05:6870:aa8c:b0:1a6:a547:ffe1 with SMTP id gr12-20020a056870aa8c00b001a6a547ffe1mr11594796oab.21.1698616957836; Sun, 29 Oct 2023 15:02:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698616957; cv=none; d=google.com; s=arc-20160816; b=XAf+fTwr5j5voz9KldjoCSh1kY6lnk/Ish351B7DsaolZy802TlNwEI0Fx+x8lDCl1 AFJcTJ+g/5KHM61b41KOIdqujn/pZUomDYVuJk2wmYAr0xlBs8ZKQ1S/v3kjW7bOuOjC sp5u4Iz8PN2tfQc4lgIrhh9Utch3btdKwv7O0AdyuYQQJVqFg00EgQoP64U0ctPorp6a olFqiXOMgZVyOibmn0N7usMEd86nFDNZbCs2jcvpA5RRYOwqBIGDTnQ1Bbo4YTm3+J66 6oZBp1avhS+ZYCmN6fZaWx9H1ChseRvjgYZbfN4GPbjbmDcWd59m5eDTTG90szro20OV Jp8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :mime-version:accept-language:in-reply-to:references:message-id:date :thread-index:thread-topic:subject:cc:to:from; bh=FB9ABYADKL43man+zPPj7k4wwv7gG5fg5iQVoobVOO8=; fh=uijJKVS3+2N7M2raP7gl1QqLpqPXk74uP2vpdkda8Ds=; b=FfADpHupqjoEwSmKZiWGLLWjffGoy08H3D1Em9ghY2OCmmkX2iMuFxPyIOHBarRTke A8s5XK71CUL+LMihPMi0vpHAUuhxP9C37vPWq/vxEP1XE2FRPZprEoHYqFXiuO7/oOGZ FoJQIQcmUeN/FTXF70E2d2ghEiey0SeliOQRMAboNLKbRonCmIfyF8nlQ4NZXHrsbLoX 1niylqPrFsqB62FFQa91OLoDueCfZJ/4o6xY+QBW7dlOCqVZIOGFNmBOT4u65/WxV/O4 K+pJTfDVOYMgAMFIbE5CUNRZKCMnLBFoKgdh845ATw1uX7cQQkpT5smPVUJtotcm6f+q wXaA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=aculab.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id j2-20020a056a00234200b006bb0aafd563si4064676pfj.237.2023.10.29.15.02.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 29 Oct 2023 15:02:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=aculab.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 5476A805EAE3; Sun, 29 Oct 2023 15:02:35 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230145AbjJ2WB5 convert rfc822-to-8bit (ORCPT + 99 others); Sun, 29 Oct 2023 18:01:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56604 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230338AbjJ2WBz (ORCPT ); Sun, 29 Oct 2023 18:01:55 -0400 Received: from eu-smtp-delivery-151.mimecast.com (eu-smtp-delivery-151.mimecast.com [185.58.85.151]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 003E9B7 for ; Sun, 29 Oct 2023 15:01:49 -0700 (PDT) Received: from AcuMS.aculab.com (156.67.243.121 [156.67.243.121]) by relay.mimecast.com with ESMTP with both STARTTLS and AUTH (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id uk-mta-170-8fg6BVyCOq2NOYcIuwnfBQ-1; Sun, 29 Oct 2023 22:01:47 +0000 X-MC-Unique: 8fg6BVyCOq2NOYcIuwnfBQ-1 Received: from AcuMS.Aculab.com (10.202.163.4) by AcuMS.aculab.com (10.202.163.4) with Microsoft SMTP Server (TLS) id 15.0.1497.48; Sun, 29 Oct 2023 22:01:58 +0000 Received: from AcuMS.Aculab.com ([::1]) by AcuMS.aculab.com ([::1]) with mapi id 15.00.1497.048; Sun, 29 Oct 2023 22:01:58 +0000 From: David Laight To: 'Peter Zijlstra' , Jens Axboe CC: Ingo Molnar , LKML Subject: RE: lockdep: holding locks across syscall boundaries Thread-Topic: lockdep: holding locks across syscall boundaries Thread-Index: AQHaCO6j4ltnKj0zt0q1hvBGfTxP87BhVBWw Date: Sun, 29 Oct 2023 22:01:58 +0000 Message-ID: <1543b5a7ec2d4524bf8c081061048a97@AcuMS.aculab.com> References: <20231027155949.GA26550@noisy.programming.kicks-ass.net> In-Reply-To: <20231027155949.GA26550@noisy.programming.kicks-ass.net> Accept-Language: en-GB, en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.202.205.107] MIME-Version: 1.0 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: aculab.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Sun, 29 Oct 2023 15:02:35 -0700 (PDT) From: Peter Zijlstra > Sent: 27 October 2023 17:00 > > On Fri, Oct 27, 2023 at 09:14:53AM -0600, Jens Axboe wrote: > > Hi, > > > > Normally we'd expect locking state to be clean and consistent across > > syscall entry and exit, as that is always the case for sync syscalls. > > > We currently have a work-around for holding a lock from aio, see > > kiocb_start_write(), which pretends to drop the lock from lockdeps > > perspective, as it's held from submission to until kiocb_end_write() is > > called at completion time. > > I was not aware of this, the only such hack I knew about was the > filesystem freezer thing. > > The problem with holding locks past the end of a syscall is that you'll > nest whatever random lock hierarchies possibly by every other syscall > under that lock. > ... > > Suppose syscall-a returns with your kiocb thing held, call it lock A > Suppose syscall-b returns with your inode thing held, call it lock B > > Then userspace does: > > syscall-a > syscall-b > > while it also does: > > syscall-b > syscall-a > > and we're up a creek, no? Isn't it also open to a massive denial-of-service attack? syscall-a sleep(infinity) assuming you actually catch: syscall-a _exit() David - Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK Registration No: 1397386 (Wales)