Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp627860rdb; Mon, 29 Jan 2024 12:53:16 -0800 (PST) X-Google-Smtp-Source: AGHT+IGUmF/PhQRsvkwmHRV1OTUW3nKy1ax0eS8Lv0UkJK8I0yNvgxw8A5JaILY9GIZ3bQi7Ogb0 X-Received: by 2002:a05:6a00:23cb:b0:6d9:9a36:50dc with SMTP id g11-20020a056a0023cb00b006d99a3650dcmr3675707pfc.2.1706561596011; Mon, 29 Jan 2024 12:53:16 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706561596; cv=pass; d=google.com; s=arc-20160816; b=p7iOkx7WwaB8PLvv1mrgSeirw+7cDOM+qfdcE8bzgPmA3P3bXg80fUOLeQ30m0MR4A Sd/ocsLpq3qbXhtaB2vjqpHgoKY04NZcq1Cx6muTJB40gum8tFi25loWF/Zy+5/l7Oa3 ovJ7MdWSQ29hNxe2b/Uc9EwyfVxbF/qKBM1p+A+aHY7Sey9443jL/Sckce/ZB4uGoac+ 1YaPgWOUydhts9XQhglOv2lsalHgNHH3YNL/Cr9KZu+5j0Bn67gI6ts9OwX0eFzV2k94 nPNp7mkumJMDMBLpRO0TFGD2WCSUkU6d/JABCnhYTksi+UX9pgNhW/iMQtXChtGRM++2 SF5A== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:to:subject:message-id:date:from :in-reply-to:references:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:dkim-signature; bh=I6c3s6W4387xNYwMOxxsc37wD0YgKnZOAa+81n+g6fc=; fh=8mKQSjmCL1fSQYQ7QESxzXoyNpbNCglR2/ovsOq34vM=; b=z8kWONprWtppjAOJRawMTjb50Jiv8OTa4pujx8QqjwBUCMezvAVpgJp8a5BJWVYoxR 7PDrQpjKVH7DblXuL+m/dQXu/9Iu/GSY+hIiwfv3btIB8Iim26M71kA694T96AT7rdkf XSh/roGLTimBl0F/pOKdK5iYkA2wOoBz17PxUu0tbZ2BoqeWp7Vpgy7B9mixd5QCBwss lj903twUWeiZeqC93a5L+wAv0ZmC4wfpxXDm8MufPnIYs0HPkXopbFNLN+CNwEdtT2Vc jgUncfjZCTwuAYojLlCp33oAsTR5j9sTYC0Ooiw1URnSDUN4P8t9Ld9P6u3U2KLqV5co i+CA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=dl+dgurI; arc=pass (i=1 spf=pass spfdomain=google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-43490-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-43490-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id m18-20020a056a00081200b006ddcf3ee87asi6462458pfk.339.2024.01.29.12.53.15 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 29 Jan 2024 12:53:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-43490-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=dl+dgurI; arc=pass (i=1 spf=pass spfdomain=google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-43490-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-43490-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 25B92B21F4C for ; Mon, 29 Jan 2024 20:53:14 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id F2670157E72; Mon, 29 Jan 2024 20:53:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="dl+dgurI" Received: from mail-yw1-f174.google.com (mail-yw1-f174.google.com [209.85.128.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B2C14157E60 for ; Mon, 29 Jan 2024 20:52:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.174 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706561583; cv=none; b=J3l/EwVX5LacuY6gxfvXuim+k7v8Eg1Vn2jLu2uudRlo4Qfuls4KRDq6EyabiDrIUT0tiPCYJ9k0qwKrq4/W9qIBqHWB9Z0QlD04yuAdPRqSjoeCi1eEpWTalEkMPj3ZEWRXRx3m9CF3oPf6Spyp0zKmJ4pF4b74hwWuYYQpqHU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706561583; c=relaxed/simple; bh=g7ZdhbpANJOVaevIQeVK+1toHfMHWwU67h7ybvCN+o8=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Content-Type; b=pvSputOFWlhXweS97P/02mvyGXMUBL4XzS/1CXMyVIVNWOjXNpO0yZwWoUUiEwLjY+1leBBBDgyceP9dPd18FRIEQCiE11IDUAD2X1dUQ13v2hb7TrGjkZ7fAVLNMy4DlEhTqGA7oBY9Gg2xXXOvflnufEDx1oEZtGtA/bpeMFA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=dl+dgurI; arc=none smtp.client-ip=209.85.128.174 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=google.com Received: by mail-yw1-f174.google.com with SMTP id 00721157ae682-602ab446cd8so32146977b3.1 for ; Mon, 29 Jan 2024 12:52:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1706561579; x=1707166379; darn=vger.kernel.org; h=content-transfer-encoding:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=I6c3s6W4387xNYwMOxxsc37wD0YgKnZOAa+81n+g6fc=; b=dl+dgurIbZvND2akGla+RUfx4Z/iMMaB1xdE3xM30VIYWSjO0zadL5auVYxEhugnQq YkWtkoFR+Se6KSC9Ao3+CLAHQmy/MWgRBqEoJiGlht1mm1szP9xLogGAOW29eaJA/WyY 8nPI0LhLzJ6KC5gump+XEnyZAArN17bMAhNPEjhwCtB9AhfwuCIKE+tQixMLrEIHJfwD iEXwA/0eHwOAuo5qKFP8jJcLHgAM1cfv8173XOB4MM0lrt8lH5UnKV817tjHHKI+8UdR gvklh6C+mPp5Gdxn02SwZzk2vI5/w41kymzoHzCsTO0sXCz/rnDkmNPopGqzfqWzYkDS n1tA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706561579; x=1707166379; h=content-transfer-encoding:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=I6c3s6W4387xNYwMOxxsc37wD0YgKnZOAa+81n+g6fc=; b=WJffmNdQ+vztDM72CPDGSTPl89f7aKKTsA6PwScXc2/Z5MXjdzEr8+sED+syo2V/0X 9W9gE+gCJ3l489auaKAY3L/InPGAGKvT8vbqkfKa8SIcXNm628LUHvdKq0aRjESdR/W3 h6sU4O8qyyXfEVrrkno4cwOzdIPWN+2+TXki5ehhLC1F8UWcndNQ79s47sYZO7DwoFaA 2O4n3iKfoMp9gSTfbizbTZdgZ9jwnBKedfB02GTv/3RH4sn4nA59Z95jlNXM3LlRD05V nxtoPts11WkruVKexPCNMgxuGH6twgBPr6L6g9Vc/zlHAI3OnHBuvwjhpmX361p6hSNH pzjg== X-Gm-Message-State: AOJu0YyHnzSI69rXO9SJklDA7OrRGJoE9d8FG8uWQuTg2abQbhFQ2yLs jZhiVwGKn1nlqgj0cDy8cYJ+JZJhl/4KsC5ZlLtN759F1hCZ0LY8Y3mlHY4/uPsBfaRkkJRN95n 5BTYX0U7198Bu8cvDFmWdAiG+qLed3SghBSQE X-Received: by 2002:a0d:db11:0:b0:603:cafe:dafc with SMTP id d17-20020a0ddb11000000b00603cafedafcmr2558695ywe.30.1706561578276; Mon, 29 Jan 2024 12:52:58 -0800 (PST) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <20240129193512.123145-1-lokeshgidra@google.com> <20240129193512.123145-4-lokeshgidra@google.com> <20240129203626.uq5tdic4z5qua5qy@revolver> In-Reply-To: <20240129203626.uq5tdic4z5qua5qy@revolver> From: Suren Baghdasaryan Date: Mon, 29 Jan 2024 12:52:45 -0800 Message-ID: Subject: Re: [PATCH v2 3/3] userfaultfd: use per-vma locks in userfaultfd operations To: "Liam R. Howlett" , Lokesh Gidra , akpm@linux-foundation.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, selinux@vger.kernel.org, surenb@google.com, kernel-team@android.com, aarcange@redhat.com, peterx@redhat.com, david@redhat.com, axelrasmussen@google.com, bgeffon@google.com, willy@infradead.org, jannh@google.com, kaleshsingh@google.com, ngeoffray@google.com, timmurray@google.com, rppt@kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Mon, Jan 29, 2024 at 12:36=E2=80=AFPM Liam R. Howlett wrote: > > * Lokesh Gidra [240129 14:35]: > > All userfaultfd operations, except write-protect, opportunistically use > > per-vma locks to lock vmas. If we fail then fall back to locking > > mmap-lock in read-mode. > > > > Write-protect operation requires mmap_lock as it iterates over multiple= vmas. > > > > Signed-off-by: Lokesh Gidra > > --- > > fs/userfaultfd.c | 13 +-- > > include/linux/userfaultfd_k.h | 5 +- > > mm/userfaultfd.c | 175 +++++++++++++++++++++++----------- > > 3 files changed, 122 insertions(+), 71 deletions(-) > > > > diff --git a/fs/userfaultfd.c b/fs/userfaultfd.c > > index c00a021bcce4..60dcfafdc11a 100644 > > --- a/fs/userfaultfd.c > > +++ b/fs/userfaultfd.c > > @@ -2005,17 +2005,8 @@ static int userfaultfd_move(struct userfaultfd_c= tx *ctx, > > return -EINVAL; > > > > if (mmget_not_zero(mm)) { > > - mmap_read_lock(mm); > > - > > - /* Re-check after taking map_changing_lock */ > > - down_read(&ctx->map_changing_lock); > > - if (likely(!atomic_read(&ctx->mmap_changing))) > > - ret =3D move_pages(ctx, mm, uffdio_move.dst, uffd= io_move.src, > > - uffdio_move.len, uffdio_move.mod= e); > > - else > > - ret =3D -EAGAIN; > > - up_read(&ctx->map_changing_lock); > > - mmap_read_unlock(mm); > > + ret =3D move_pages(ctx, uffdio_move.dst, uffdio_move.src, > > + uffdio_move.len, uffdio_move.mode); > > mmput(mm); > > } else { > > return -ESRCH; > > diff --git a/include/linux/userfaultfd_k.h b/include/linux/userfaultfd_= k.h > > index 3210c3552976..05d59f74fc88 100644 > > --- a/include/linux/userfaultfd_k.h > > +++ b/include/linux/userfaultfd_k.h > > @@ -138,9 +138,8 @@ extern long uffd_wp_range(struct vm_area_struct *vm= a, > > /* move_pages */ > > void double_pt_lock(spinlock_t *ptl1, spinlock_t *ptl2); > > void double_pt_unlock(spinlock_t *ptl1, spinlock_t *ptl2); > > -ssize_t move_pages(struct userfaultfd_ctx *ctx, struct mm_struct *mm, > > - unsigned long dst_start, unsigned long src_start, > > - unsigned long len, __u64 flags); > > +ssize_t move_pages(struct userfaultfd_ctx *ctx, unsigned long dst_star= t, > > + unsigned long src_start, unsigned long len, __u64 flag= s); > > int move_pages_huge_pmd(struct mm_struct *mm, pmd_t *dst_pmd, pmd_t *s= rc_pmd, pmd_t dst_pmdval, > > struct vm_area_struct *dst_vma, > > struct vm_area_struct *src_vma, > > diff --git a/mm/userfaultfd.c b/mm/userfaultfd.c > > index 6e2ca04ab04d..d55bf18b80db 100644 > > --- a/mm/userfaultfd.c > > +++ b/mm/userfaultfd.c > > @@ -19,20 +19,39 @@ > > #include > > #include "internal.h" > > > > -static __always_inline > > -struct vm_area_struct *find_dst_vma(struct mm_struct *dst_mm, > > - unsigned long dst_start, > > - unsigned long len) > > +void unpin_vma(struct mm_struct *mm, struct vm_area_struct *vma, bool = *mmap_locked) > > +{ > > + BUG_ON(!vma && !*mmap_locked); > > + > > + if (*mmap_locked) { > > + mmap_read_unlock(mm); > > + *mmap_locked =3D false; > > + } else > > + vma_end_read(vma); > > You are missing braces here. > > This function is small so it could be inline, although I hope the > compiler would get that right for us. > > I don't think this small helper is worth it, considering you are > altering a pointer in here, which makes things harder to follow (not to > mention the locking). The only code that depends on this update is a > single place, which already assigns a custom variable after the function > return. > > > +} > > + > > +/* > > + * Search for VMA and make sure it is stable either by locking it or t= aking > > + * mmap_lock. > > This function returns something that isn't documented and also sets a > boolean which is passed in as a pointer which also is lacking from the > documentation. > > > + */ > > +struct vm_area_struct *find_and_pin_dst_vma(struct mm_struct *dst_mm, > > + unsigned long dst_start, > > + unsigned long len, > > + bool *mmap_locked) > > { > > + struct vm_area_struct *dst_vma =3D lock_vma_under_rcu(dst_mm, dst= _start); > > lock_vma_under_rcu() calls mas_walk(), which goes to dst_start for the > VMA. It is not possible for dst_start to be outside the range. > > > + if (!dst_vma) { > > BUG_ON(mmap_locked) ? > > > + mmap_read_lock(dst_mm); > > + *mmap_locked =3D true; > > + dst_vma =3D find_vma(dst_mm, dst_start); > > find_vma() walks to dst_start and searches upwards from that address. > This is functionally different than what you have asked for above. You > will not see an issue as you have coded it - but it may be suboptimal > since a start address lower than the VMA you are looking for can be > found... however, later you check the range falls between the dst_start > and dst_start + len. > > If you expect the dst_start to always be within the VMA range and not > lower, then you should use vma_lookup(). > > If you want to search upwards from dst_start for a VMA then you should > move the range check below into this brace. > > > + } > > + > > /* > > * Make sure that the dst range is both valid and fully within a > > * single existing vma. > > */ > > - struct vm_area_struct *dst_vma; > > - > > - dst_vma =3D find_vma(dst_mm, dst_start); > > if (!range_in_vma(dst_vma, dst_start, dst_start + len)) > > - return NULL; > > + goto unpin; > > > > /* > > * Check the vma is registered in uffd, this is required to > > @@ -40,9 +59,13 @@ struct vm_area_struct *find_dst_vma(struct mm_struct= *dst_mm, > > * time. > > */ > > if (!dst_vma->vm_userfaultfd_ctx.ctx) > > - return NULL; > > + goto unpin; > > > > return dst_vma; > > + > > +unpin: > > + unpin_vma(dst_mm, dst_vma, mmap_locked); > > + return NULL; > > } > > > > /* Check if dst_addr is outside of file's size. Must be called with pt= l held. */ > > @@ -350,7 +373,8 @@ static pmd_t *mm_alloc_pmd(struct mm_struct *mm, un= signed long address) > > #ifdef CONFIG_HUGETLB_PAGE > > /* > > * mfill_atomic processing for HUGETLB vmas. Note that this routine i= s > > - * called with mmap_lock held, it will release mmap_lock before return= ing. > > + * called with either vma-lock or mmap_lock held, it will release the = lock > > + * before returning. > > */ > > static __always_inline ssize_t mfill_atomic_hugetlb( > > struct userfaultfd_ctx *ctx= , > > @@ -358,7 +382,8 @@ static __always_inline ssize_t mfill_atomic_hugetlb= ( > > unsigned long dst_start, > > unsigned long src_start, > > unsigned long len, > > - uffd_flags_t flags) > > + uffd_flags_t flags, > > + bool *mmap_locked) > > { > > struct mm_struct *dst_mm =3D dst_vma->vm_mm; > > int vm_shared =3D dst_vma->vm_flags & VM_SHARED; > > @@ -380,7 +405,7 @@ static __always_inline ssize_t mfill_atomic_hugetlb= ( > > */ > > if (uffd_flags_mode_is(flags, MFILL_ATOMIC_ZEROPAGE)) { > > up_read(&ctx->map_changing_lock); > > - mmap_read_unlock(dst_mm); > > + unpin_vma(dst_mm, dst_vma, mmap_locked); > > return -EINVAL; > > } > > > > @@ -404,12 +429,25 @@ static __always_inline ssize_t mfill_atomic_huget= lb( > > */ > > if (!dst_vma) { > > err =3D -ENOENT; > > - dst_vma =3D find_dst_vma(dst_mm, dst_start, len); > > - if (!dst_vma || !is_vm_hugetlb_page(dst_vma)) > > - goto out_unlock; > > + dst_vma =3D find_and_pin_dst_vma(dst_mm, dst_start, > > + len, mmap_locked); > > + if (!dst_vma) > > + goto out; > > + if (!is_vm_hugetlb_page(dst_vma)) > > + goto out_unlock_vma; > > > > err =3D -EINVAL; > > if (vma_hpagesize !=3D vma_kernel_pagesize(dst_vma)) > > + goto out_unlock_vma; > > + > > + /* > > + * If memory mappings are changing because of non-coopera= tive > > + * operation (e.g. mremap) running in parallel, bail out = and > > + * request the user to retry later > > + */ > > + down_read(&ctx->map_changing_lock); > > + err =3D -EAGAIN; > > + if (atomic_read(&ctx->mmap_changing)) > > goto out_unlock; > > > > vm_shared =3D dst_vma->vm_flags & VM_SHARED; > > @@ -465,7 +503,7 @@ static __always_inline ssize_t mfill_atomic_hugetlb= ( > > > > if (unlikely(err =3D=3D -ENOENT)) { > > up_read(&ctx->map_changing_lock); > > - mmap_read_unlock(dst_mm); > > + unpin_vma(dst_mm, dst_vma, mmap_locked); > > BUG_ON(!folio); > > > > err =3D copy_folio_from_user(folio, > > @@ -474,17 +512,6 @@ static __always_inline ssize_t mfill_atomic_hugetl= b( > > err =3D -EFAULT; > > goto out; > > } > > - mmap_read_lock(dst_mm); > > - down_read(&ctx->map_changing_lock); > > - /* > > - * If memory mappings are changing because of non= -cooperative > > - * operation (e.g. mremap) running in parallel, b= ail out and > > - * request the user to retry later > > - */ > > - if (atomic_read(ctx->mmap_changing)) { > > - err =3D -EAGAIN; > > - break; > > - } > > ... Okay, this is where things get confusing. > > How about this: Don't do this locking/boolean dance. > > Instead, do something like this: > In mm/memory.c, below lock_vma_under_rcu(), but something like this > > struct vm_area_struct *lock_vma(struct mm_struct *mm, > unsigned long addr)) /* or some better name.. */ > { > struct vm_area_struct *vma; > > vma =3D lock_vma_under_rcu(mm, addr); > > if (vma) > return vma; > > mmap_read_lock(mm); > vma =3D lookup_vma(mm, addr); > if (vma) > vma_start_read(vma); /* Won't fail */ Please don't assume vma_start_read() won't fail even when you have mmap_read_lock(). See the comment in vma_start_read() about the possibility of an overflow producing false negatives. > > mmap_read_unlock(mm); > return vma; > } > > Now, we know we have a vma that's vma locked if there is a vma. The vma > won't go away - you have it locked. The mmap lock is held for even > less time for your worse case, and the code gets easier to follow. > > Once you are done with the vma do a vma_end_read(vma). Don't forget to > do this! > > Now the comment above such a function should state that the vma needs to > be vma_end_read(vma), or that could go undetected.. It might be worth > adding a unlock_vma() counterpart to vma_end_read(vma) even. Locking VMA while holding mmap_read_lock is an interesting usage pattern I haven't seen yet. I think this should work quite well! > > > > > > dst_vma =3D NULL; > > goto retry; > > @@ -505,7 +532,8 @@ static __always_inline ssize_t mfill_atomic_hugetlb= ( > > > > out_unlock: > > up_read(&ctx->map_changing_lock); > > - mmap_read_unlock(dst_mm); > > +out_unlock_vma: > > + unpin_vma(dst_mm, dst_vma, mmap_locked); > > out: > > if (folio) > > folio_put(folio); > > @@ -521,7 +549,8 @@ extern ssize_t mfill_atomic_hugetlb(struct userfaul= tfd_ctx *ctx, > > unsigned long dst_start, > > unsigned long src_start, > > unsigned long len, > > - uffd_flags_t flags); > > + uffd_flags_t flags, > > + bool *mmap_locked); > > Just a thought, tabbing in twice for each argument would make this more > compact. > > > > #endif /* CONFIG_HUGETLB_PAGE */ > > > > static __always_inline ssize_t mfill_atomic_pte(pmd_t *dst_pmd, > > @@ -581,6 +610,7 @@ static __always_inline ssize_t mfill_atomic(struct = userfaultfd_ctx *ctx, > > unsigned long src_addr, dst_addr; > > long copied; > > struct folio *folio; > > + bool mmap_locked =3D false; > > > > /* > > * Sanitize the command parameters: > > @@ -597,7 +627,14 @@ static __always_inline ssize_t mfill_atomic(struct= userfaultfd_ctx *ctx, > > copied =3D 0; > > folio =3D NULL; > > retry: > > - mmap_read_lock(dst_mm); > > + /* > > + * Make sure the vma is not shared, that the dst range is > > + * both valid and fully within a single existing vma. > > + */ > > + err =3D -ENOENT; > > + dst_vma =3D find_and_pin_dst_vma(dst_mm, dst_start, len, &mmap_lo= cked); > > + if (!dst_vma) > > + goto out; > > > > /* > > * If memory mappings are changing because of non-cooperative > > @@ -609,15 +646,6 @@ static __always_inline ssize_t mfill_atomic(struct= userfaultfd_ctx *ctx, > > if (atomic_read(&ctx->mmap_changing)) > > goto out_unlock; > > > > - /* > > - * Make sure the vma is not shared, that the dst range is > > - * both valid and fully within a single existing vma. > > - */ > > - err =3D -ENOENT; > > - dst_vma =3D find_dst_vma(dst_mm, dst_start, len); > > - if (!dst_vma) > > - goto out_unlock; > > - > > err =3D -EINVAL; > > /* > > * shmem_zero_setup is invoked in mmap for MAP_ANONYMOUS|MAP_SHAR= ED but > > @@ -638,8 +666,8 @@ static __always_inline ssize_t mfill_atomic(struct = userfaultfd_ctx *ctx, > > * If this is a HUGETLB vma, pass off to appropriate routine > > */ > > if (is_vm_hugetlb_page(dst_vma)) > > - return mfill_atomic_hugetlb(ctx, dst_vma, dst_start, > > - src_start, len, flags); > > + return mfill_atomic_hugetlb(ctx, dst_vma, dst_start, src= _start > > + len, flags, &mmap_locked); > > > > if (!vma_is_anonymous(dst_vma) && !vma_is_shmem(dst_vma)) > > goto out_unlock; > > @@ -699,7 +727,8 @@ static __always_inline ssize_t mfill_atomic(struct = userfaultfd_ctx *ctx, > > void *kaddr; > > > > up_read(&ctx->map_changing_lock); > > - mmap_read_unlock(dst_mm); > > + unpin_vma(dst_mm, dst_vma, &mmap_locked); > > + > > BUG_ON(!folio); > > > > kaddr =3D kmap_local_folio(folio, 0); > > @@ -730,7 +759,7 @@ static __always_inline ssize_t mfill_atomic(struct = userfaultfd_ctx *ctx, > > > > out_unlock: > > up_read(&ctx->map_changing_lock); > > - mmap_read_unlock(dst_mm); > > + unpin_vma(dst_mm, dst_vma, &mmap_locked); > > out: > > if (folio) > > folio_put(folio); > > @@ -1285,8 +1314,6 @@ static int validate_move_areas(struct userfaultfd= _ctx *ctx, > > * @len: length of the virtual memory range > > * @mode: flags from uffdio_move.mode > > * > > - * Must be called with mmap_lock held for read. > > - * > > * move_pages() remaps arbitrary anonymous pages atomically in zero > > * copy. It only works on non shared anonymous pages because those can > > * be relocated without generating non linear anon_vmas in the rmap > > @@ -1353,15 +1380,16 @@ static int validate_move_areas(struct userfault= fd_ctx *ctx, > > * could be obtained. This is the only additional complexity added to > > * the rmap code to provide this anonymous page remapping functionalit= y. > > */ > > -ssize_t move_pages(struct userfaultfd_ctx *ctx, struct mm_struct *mm, > > - unsigned long dst_start, unsigned long src_start, > > - unsigned long len, __u64 mode) > > +ssize_t move_pages(struct userfaultfd_ctx *ctx, unsigned long dst_star= t, > > + unsigned long src_start, unsigned long len, __u64 mode= ) > > { > > + struct mm_struct *mm =3D ctx->mm; > > struct vm_area_struct *src_vma, *dst_vma; > > unsigned long src_addr, dst_addr; > > pmd_t *src_pmd, *dst_pmd; > > long err =3D -EINVAL; > > ssize_t moved =3D 0; > > + bool mmap_locked =3D false; > > > > /* Sanitize the command parameters. */ > > if (WARN_ON_ONCE(src_start & ~PAGE_MASK) || > > @@ -1374,28 +1402,52 @@ ssize_t move_pages(struct userfaultfd_ctx *ctx,= struct mm_struct *mm, > > WARN_ON_ONCE(dst_start + len <=3D dst_start)) > > goto out; > > Ah, is this safe for rmap? I think you need to leave this read lock. > > > > > + dst_vma =3D NULL; > > + src_vma =3D lock_vma_under_rcu(mm, src_start); > > + if (src_vma) { > > + dst_vma =3D lock_vma_under_rcu(mm, dst_start); > > + if (!dst_vma) > > + vma_end_read(src_vma); > > + } > > + > > + /* If we failed to lock both VMAs, fall back to mmap_lock */ > > + if (!dst_vma) { > > + mmap_read_lock(mm); > > + mmap_locked =3D true; > > + src_vma =3D find_vma(mm, src_start); > > + if (!src_vma) > > + goto out_unlock_mmap; > > + dst_vma =3D find_vma(mm, dst_start); > > Again, there is a difference in how find_vma and lock_vam_under_rcu > works. > > > + if (!dst_vma) > > + goto out_unlock_mmap; > > + } > > + > > + /* Re-check after taking map_changing_lock */ > > + down_read(&ctx->map_changing_lock); > > + if (likely(atomic_read(&ctx->mmap_changing))) { > > + err =3D -EAGAIN; > > + goto out_unlock; > > + } > > /* > > * Make sure the vma is not shared, that the src and dst remap > > * ranges are both valid and fully within a single existing > > * vma. > > */ > > - src_vma =3D find_vma(mm, src_start); > > - if (!src_vma || (src_vma->vm_flags & VM_SHARED)) > > - goto out; > > + if (src_vma->vm_flags & VM_SHARED) > > + goto out_unlock; > > if (src_start < src_vma->vm_start || > > src_start + len > src_vma->vm_end) > > - goto out; > > + goto out_unlock; > > > > - dst_vma =3D find_vma(mm, dst_start); > > - if (!dst_vma || (dst_vma->vm_flags & VM_SHARED)) > > - goto out; > > + if (dst_vma->vm_flags & VM_SHARED) > > + goto out_unlock; > > if (dst_start < dst_vma->vm_start || > > dst_start + len > dst_vma->vm_end) > > - goto out; > > + goto out_unlock; > > > > err =3D validate_move_areas(ctx, src_vma, dst_vma); > > if (err) > > - goto out; > > + goto out_unlock; > > > > for (src_addr =3D src_start, dst_addr =3D dst_start; > > src_addr < src_start + len;) { > > @@ -1512,6 +1564,15 @@ ssize_t move_pages(struct userfaultfd_ctx *ctx, = struct mm_struct *mm, > > moved +=3D step_size; > > } > > > > +out_unlock: > > + up_read(&ctx->map_changing_lock); > > +out_unlock_mmap: > > + if (mmap_locked) > > + mmap_read_unlock(mm); > > + else { > > + vma_end_read(dst_vma); > > + vma_end_read(src_vma); > > + } > > out: > > VM_WARN_ON(moved < 0); > > VM_WARN_ON(err > 0); > > -- > > 2.43.0.429.g432eaa2c6b-goog > > > >