From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6B9CEC433DB for ; Fri, 8 Jan 2021 13:41:44 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id BB1CD239ED for ; Fri, 8 Jan 2021 13:41:43 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org BB1CD239ED Authentication-Results: mail.kernel.org; dmarc=fail (p=quarantine dis=none) header.from=suse.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 33D598D0180; Fri, 8 Jan 2021 08:41:43 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 2EBA08D0156; Fri, 8 Jan 2021 08:41:43 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 1B3D18D0180; Fri, 8 Jan 2021 08:41:43 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0190.hostedemail.com [216.40.44.190]) by kanga.kvack.org (Postfix) with ESMTP id 027598D0156 for ; Fri, 8 Jan 2021 08:41:42 -0500 (EST) Received: from smtpin18.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay05.hostedemail.com (Postfix) with ESMTP id B55EC181AC9CB for ; Fri, 8 Jan 2021 13:41:42 +0000 (UTC) X-FDA: 77682720444.18.yard34_2a087f6274f3 Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin18.hostedemail.com (Postfix) with ESMTP id 96D93100EC67C for ; Fri, 8 Jan 2021 13:41:42 +0000 (UTC) X-HE-Tag: yard34_2a087f6274f3 X-Filterd-Recvd-Size: 3967 Received: from mx2.suse.de (mx2.suse.de [195.135.220.15]) by imf38.hostedemail.com (Postfix) with ESMTP for ; Fri, 8 Jan 2021 13:41:41 +0000 (UTC) X-Virus-Scanned: by amavisd-new at test-mx.suse.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1610113300; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=vIiuK/wpdb0akmqoEm2pC/CdRsjvf61e0Abm1+FwZg0=; b=V1k3ZtkTeyNdUza0KvYJ6mwSqO20PfusCDmin8X8y3D6HmNEuKlnaZj59khmKMDi0v6OSD jSXg8gXcZIG08uSeS5RhUqo4pTXDKRmgos+HXO/821GoeC8cHgSjLWxEo/MrLOy1ZiUx09 gkaXNkhczn73l5EOricoAQUoN+2ZuWE= Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id D1FDAAD11; Fri, 8 Jan 2021 13:41:40 +0000 (UTC) Date: Fri, 8 Jan 2021 14:41:40 +0100 From: Michal Hocko To: Milan Broz Cc: linux-mm@kvack.org, Linux Kernel Mailing List , Mikulas Patocka Subject: Re: Very slow unlockall() Message-ID: <20210108134140.GA9883@dhcp22.suse.cz> References: <70885d37-62b7-748b-29df-9e94f3291736@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <70885d37-62b7-748b-29df-9e94f3291736@gmail.com> X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Wed 06-01-21 16:20:15, Milan Broz wrote: > Hi, > > we use mlockall(MCL_CURRENT | MCL_FUTURE) / munlockall() in cryptsetup code > and someone tried to use it with hardened memory allocator library. > > Execution time was increased to extreme (minutes) and as we found, the problem > is in munlockall(). > > Here is a plain reproducer for the core without any external code - it takes > unlocking on Fedora rawhide kernel more than 30 seconds! > I can reproduce it on 5.10 kernels and Linus' git. > > The reproducer below tries to mmap large amount memory with PROT_NONE (later never used). > The real code of course does something more useful but the problem is the same. > > #include > #include > #include > #include > > int main (int argc, char *argv[]) > { > void *p = mmap(NULL, 1UL << 41, PROT_NONE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); > > if (p == MAP_FAILED) return 1; > > if (mlockall(MCL_CURRENT | MCL_FUTURE)) return 1; > printf("locked\n"); > > if (munlockall()) return 1; > printf("unlocked\n"); > > return 0; > } > > In traceback I see that time is spent in munlock_vma_pages_range. > > [ 2962.006813] Call Trace: > [ 2962.006814] ? munlock_vma_pages_range+0xe7/0x4b0 > [ 2962.006814] ? vma_merge+0xf3/0x3c0 > [ 2962.006815] ? mlock_fixup+0x111/0x190 > [ 2962.006815] ? apply_mlockall_flags+0xa7/0x110 > [ 2962.006816] ? __do_sys_munlockall+0x2e/0x60 > [ 2962.006816] ? do_syscall_64+0x33/0x40 > ... > > Or with perf, I see > > # Overhead Command Shared Object Symbol > # ........ ....... ................. ..................................... > # > 48.18% lock [kernel.kallsyms] [k] lock_is_held_type > 11.67% lock [kernel.kallsyms] [k] ___might_sleep > 10.65% lock [kernel.kallsyms] [k] follow_page_mask > 9.17% lock [kernel.kallsyms] [k] debug_lockdep_rcu_enabled > 6.73% lock [kernel.kallsyms] [k] munlock_vma_pages_range > ... > > > Could please anyone check what's wrong here with the memory locking code? > Running it on my notebook I can effectively DoS the system :) > > Original report is https://gitlab.com/cryptsetup/cryptsetup/-/issues/617 > but this is apparently a kernel issue, just amplified by usage of munlockall(). Which kernel version do you see this with? Have older releases worked better? -- Michal Hocko SUSE Labs