From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.5 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 00AD4C432BE for ; Sat, 28 Aug 2021 00:14:29 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 5164C60FD9 for ; Sat, 28 Aug 2021 00:14:28 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 5164C60FD9 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=chromium.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kvack.org Received: by kanga.kvack.org (Postfix) id AC3938D0001; Fri, 27 Aug 2021 20:14:27 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id A73256B0071; Fri, 27 Aug 2021 20:14:27 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 914488D0001; Fri, 27 Aug 2021 20:14:27 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0252.hostedemail.com [216.40.44.252]) by kanga.kvack.org (Postfix) with ESMTP id 73D2D6B006C for ; Fri, 27 Aug 2021 20:14:27 -0400 (EDT) Received: from smtpin19.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay01.hostedemail.com (Postfix) with ESMTP id F1E83184799C6 for ; Sat, 28 Aug 2021 00:14:26 +0000 (UTC) X-FDA: 78522567732.19.654F000 Received: from mail-pj1-f51.google.com (mail-pj1-f51.google.com [209.85.216.51]) by imf09.hostedemail.com (Postfix) with ESMTP id 9DC7B3000103 for ; Sat, 28 Aug 2021 00:14:26 +0000 (UTC) Received: by mail-pj1-f51.google.com with SMTP id ot2-20020a17090b3b4200b0019127f8ed87so8845265pjb.1 for ; Fri, 27 Aug 2021 17:14:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=eEroF7fT6U8gSQPZM+E0yOE1ii71NtUh+7wbNdiOInc=; b=VwC1UF+MiwjXriv/FwwHRL9QmPtj/fsiflC2ngkWpN9k4WqRzn7mbyq8j0DLkyM8HM uNfLoCfo5rReKVHGhl3OimNCv6hxuv0F9ogR3WmsE3Vgu6QBPWsjVoX0inArCqtA1NV1 KUZpEewJFhVmFZ3Ywu5ZAoEkBrlXdiCKHQIYE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=eEroF7fT6U8gSQPZM+E0yOE1ii71NtUh+7wbNdiOInc=; b=l0ao9RM4521WWtAQM/Uomprg+2nIgB/gx4yzu9kJOnUzXBns220eb0c9oBU3L7YvO2 Tc4J4o11nggo4/rplFmni4BdGCiPogE22iou0poZvyXQ7EzcDLyygIP9mDO3zvKPFZ1X UVGSHcTR23uVRvBzBDyYQYjqixtrLYgku0ceEq6aYiJ9Imka2tpkoeGhpeCjR6HApAOT lG/yWhj+5LSFeB7G5wTcdX5joBlSsNx9mm1t/d4jbUdwUG8G5PYXLOPYn9/NzvX8yGMS Bn5nXBch3bcP+IjjyFgjC+1oRW2pX+lNjoeK+gkUNJkt5Vp59/CjjwBTktFYDKmn7n8/ teYA== X-Gm-Message-State: AOAM531+LJeQfQQAgyiiIpCWwBAcwS8/SCjAxF+Sy44Gyo0H8QO44z3b PlU7xheoxwgwNLaEydS2Hm+1KA== X-Google-Smtp-Source: ABdhPJxNL6EoS1fbeKHcCLbffXhhjdzrZcYP6KrVbwwtjxPyozS7BZcwPwJcwJRnL/g8JgLLC77T2Q== X-Received: by 2002:a17:90b:390d:: with SMTP id ob13mr13624247pjb.129.1630109665454; Fri, 27 Aug 2021 17:14:25 -0700 (PDT) Received: from www.outflux.net (smtp.outflux.net. [198.145.64.163]) by smtp.gmail.com with ESMTPSA id h5sm7134401pjs.28.2021.08.27.17.14.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 27 Aug 2021 17:14:24 -0700 (PDT) Date: Fri, 27 Aug 2021 17:14:23 -0700 From: Kees Cook To: Suren Baghdasaryan Cc: akpm@linux-foundation.org, ccross@google.com, sumit.semwal@linaro.org, mhocko@suse.com, dave.hansen@intel.com, willy@infradead.org, kirill.shutemov@linux.intel.com, vbabka@suse.cz, hannes@cmpxchg.org, corbet@lwn.net, viro@zeniv.linux.org.uk, rdunlap@infradead.org, kaleshsingh@google.com, peterx@redhat.com, rppt@kernel.org, peterz@infradead.org, catalin.marinas@arm.com, vincenzo.frascino@arm.com, chinwen.chang@mediatek.com, axelrasmussen@google.com, aarcange@redhat.com, jannh@google.com, apopple@nvidia.com, jhubbard@nvidia.com, yuzhao@google.com, will@kernel.org, fenghua.yu@intel.com, thunder.leizhen@huawei.com, hughd@google.com, feng.tang@intel.com, jgg@ziepe.ca, guro@fb.com, tglx@linutronix.de, krisman@collabora.com, chris.hyser@oracle.com, pcc@google.com, ebiederm@xmission.com, axboe@kernel.dk, legion@kernel.org, eb@emlix.com, songmuchun@bytedance.com, viresh.kumar@linaro.org, thomascedeno@google.com, sashal@kernel.org, cxfcosmos@gmail.com, linux@rasmusvillemoes.dk, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, kernel-team@android.com, Pekka Enberg , Ingo Molnar , Oleg Nesterov , Jan Glauber , John Stultz , Rob Landley , Cyrill Gorcunov , "Serge E. Hallyn" , David Rientjes , Rik van Riel , Mel Gorman , Michel Lespinasse , Tang Chen , Robin Holt , Shaohua Li , Sasha Levin , Minchan Kim Subject: Re: [PATCH v8 1/3] mm: rearrange madvise code to allow for reuse Message-ID: <202108271712.1E99CCF4F@keescook> References: <20210827191858.2037087-1-surenb@google.com> <20210827191858.2037087-2-surenb@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210827191858.2037087-2-surenb@google.com> Authentication-Results: imf09.hostedemail.com; dkim=pass header.d=chromium.org header.s=google header.b=VwC1UF+M; spf=pass (imf09.hostedemail.com: domain of keescook@chromium.org designates 209.85.216.51 as permitted sender) smtp.mailfrom=keescook@chromium.org; dmarc=pass (policy=none) header.from=chromium.org X-Rspamd-Server: rspam02 X-Rspamd-Queue-Id: 9DC7B3000103 X-Stat-Signature: 3s7zhshjg3omqkpbu5im7zznjz34w8oh X-HE-Tag: 1630109666-657463 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Fri, Aug 27, 2021 at 12:18:56PM -0700, Suren Baghdasaryan wrote: > From: Colin Cross > > Refactor the madvise syscall to allow for parts of it to be reused by a > prctl syscall that affects vmas. > > Move the code that walks vmas in a virtual address range into a function > that takes a function pointer as a parameter. The only caller for now is > sys_madvise, which uses it to call madvise_vma_behavior on each vma, but > the next patch will add an additional caller. > > Move handling all vma behaviors inside madvise_behavior, and rename it to > madvise_vma_behavior. > > Move the code that updates the flags on a vma, including splitting or > merging the vma as necessary, into a new function called > madvise_update_vma. The next patch will add support for updating a new > anon_name field as well. > > Signed-off-by: Colin Cross > Cc: Pekka Enberg > Cc: Dave Hansen > Cc: Peter Zijlstra > Cc: Ingo Molnar > Cc: Oleg Nesterov > Cc: "Eric W. Biederman" > Cc: Jan Glauber > Cc: John Stultz > Cc: Rob Landley > Cc: Cyrill Gorcunov > Cc: Kees Cook > Cc: "Serge E. Hallyn" > Cc: David Rientjes > Cc: Al Viro > Cc: Hugh Dickins > Cc: Rik van Riel > Cc: Mel Gorman > Cc: Michel Lespinasse > Cc: Tang Chen > Cc: Robin Holt > Cc: Shaohua Li > Cc: Sasha Levin > Cc: Johannes Weiner > Cc: Minchan Kim > Signed-off-by: Andrew Morton > [sumits: rebased over v5.9-rc3] > Signed-off-by: Sumit Semwal > [surenb: rebased over v5.14-rc7] > Signed-off-by: Suren Baghdasaryan Other folks have already reviewed this, and it does look okay to me, too, but I find it a bit hard to review. There are at least 3 things happening in this patch: - moving to the walker - merging two behavior routines - extracting flag setting from behavior checking It seems like those could be separate patches, but I'm probably overly picky. :) -Kees > --- > mm/madvise.c | 319 +++++++++++++++++++++++++++------------------------ > 1 file changed, 172 insertions(+), 147 deletions(-) > > diff --git a/mm/madvise.c b/mm/madvise.c > index 5c065bc8b5f6..359cd3fa612c 100644 > --- a/mm/madvise.c > +++ b/mm/madvise.c > @@ -63,76 +63,20 @@ static int madvise_need_mmap_write(int behavior) > } > > /* > - * We can potentially split a vm area into separate > - * areas, each area with its own behavior. > + * Update the vm_flags on regiion of a vma, splitting it or merging it as > + * necessary. Must be called with mmap_sem held for writing; > */ > -static long madvise_behavior(struct vm_area_struct *vma, > - struct vm_area_struct **prev, > - unsigned long start, unsigned long end, int behavior) > +static int madvise_update_vma(struct vm_area_struct *vma, > + struct vm_area_struct **prev, unsigned long start, > + unsigned long end, unsigned long new_flags) > { > struct mm_struct *mm = vma->vm_mm; > - int error = 0; > + int error; > pgoff_t pgoff; > - unsigned long new_flags = vma->vm_flags; > - > - switch (behavior) { > - case MADV_NORMAL: > - new_flags = new_flags & ~VM_RAND_READ & ~VM_SEQ_READ; > - break; > - case MADV_SEQUENTIAL: > - new_flags = (new_flags & ~VM_RAND_READ) | VM_SEQ_READ; > - break; > - case MADV_RANDOM: > - new_flags = (new_flags & ~VM_SEQ_READ) | VM_RAND_READ; > - break; > - case MADV_DONTFORK: > - new_flags |= VM_DONTCOPY; > - break; > - case MADV_DOFORK: > - if (vma->vm_flags & VM_IO) { > - error = -EINVAL; > - goto out; > - } > - new_flags &= ~VM_DONTCOPY; > - break; > - case MADV_WIPEONFORK: > - /* MADV_WIPEONFORK is only supported on anonymous memory. */ > - if (vma->vm_file || vma->vm_flags & VM_SHARED) { > - error = -EINVAL; > - goto out; > - } > - new_flags |= VM_WIPEONFORK; > - break; > - case MADV_KEEPONFORK: > - new_flags &= ~VM_WIPEONFORK; > - break; > - case MADV_DONTDUMP: > - new_flags |= VM_DONTDUMP; > - break; > - case MADV_DODUMP: > - if (!is_vm_hugetlb_page(vma) && new_flags & VM_SPECIAL) { > - error = -EINVAL; > - goto out; > - } > - new_flags &= ~VM_DONTDUMP; > - break; > - case MADV_MERGEABLE: > - case MADV_UNMERGEABLE: > - error = ksm_madvise(vma, start, end, behavior, &new_flags); > - if (error) > - goto out_convert_errno; > - break; > - case MADV_HUGEPAGE: > - case MADV_NOHUGEPAGE: > - error = hugepage_madvise(vma, &new_flags, behavior); > - if (error) > - goto out_convert_errno; > - break; > - } > > if (new_flags == vma->vm_flags) { > *prev = vma; > - goto out; > + return 0; > } > > pgoff = vma->vm_pgoff + ((start - vma->vm_start) >> PAGE_SHIFT); > @@ -149,21 +93,21 @@ static long madvise_behavior(struct vm_area_struct *vma, > if (start != vma->vm_start) { > if (unlikely(mm->map_count >= sysctl_max_map_count)) { > error = -ENOMEM; > - goto out; > + return error; > } > error = __split_vma(mm, vma, start, 1); > if (error) > - goto out_convert_errno; > + return error; > } > > if (end != vma->vm_end) { > if (unlikely(mm->map_count >= sysctl_max_map_count)) { > error = -ENOMEM; > - goto out; > + return error; > } > error = __split_vma(mm, vma, end, 0); > if (error) > - goto out_convert_errno; > + return error; > } > > success: > @@ -172,15 +116,7 @@ static long madvise_behavior(struct vm_area_struct *vma, > */ > vma->vm_flags = new_flags; > > -out_convert_errno: > - /* > - * madvise() returns EAGAIN if kernel resources, such as > - * slab, are temporarily unavailable. > - */ > - if (error == -ENOMEM) > - error = -EAGAIN; > -out: > - return error; > + return 0; > } > > #ifdef CONFIG_SWAP > @@ -930,6 +866,96 @@ static long madvise_remove(struct vm_area_struct *vma, > return error; > } > > +/* > + * Apply an madvise behavior to a region of a vma. madvise_update_vma > + * will handle splitting a vm area into separate areas, each area with its own > + * behavior. > + */ > +static int madvise_vma_behavior(struct vm_area_struct *vma, > + struct vm_area_struct **prev, > + unsigned long start, unsigned long end, > + unsigned long behavior) > +{ > + int error = 0; > + unsigned long new_flags = vma->vm_flags; > + > + switch (behavior) { > + case MADV_REMOVE: > + return madvise_remove(vma, prev, start, end); > + case MADV_WILLNEED: > + return madvise_willneed(vma, prev, start, end); > + case MADV_COLD: > + return madvise_cold(vma, prev, start, end); > + case MADV_PAGEOUT: > + return madvise_pageout(vma, prev, start, end); > + case MADV_FREE: > + case MADV_DONTNEED: > + return madvise_dontneed_free(vma, prev, start, end, behavior); > + case MADV_POPULATE_READ: > + case MADV_POPULATE_WRITE: > + return madvise_populate(vma, prev, start, end, behavior); > + case MADV_NORMAL: > + new_flags = new_flags & ~VM_RAND_READ & ~VM_SEQ_READ; > + break; > + case MADV_SEQUENTIAL: > + new_flags = (new_flags & ~VM_RAND_READ) | VM_SEQ_READ; > + break; > + case MADV_RANDOM: > + new_flags = (new_flags & ~VM_SEQ_READ) | VM_RAND_READ; > + break; > + case MADV_DONTFORK: > + new_flags |= VM_DONTCOPY; > + break; > + case MADV_DOFORK: > + if (vma->vm_flags & VM_IO) { > + error = -EINVAL; > + goto out; > + } > + new_flags &= ~VM_DONTCOPY; > + break; > + case MADV_WIPEONFORK: > + /* MADV_WIPEONFORK is only supported on anonymous memory. */ > + if (vma->vm_file || vma->vm_flags & VM_SHARED) { > + error = -EINVAL; > + goto out; > + } > + new_flags |= VM_WIPEONFORK; > + break; > + case MADV_KEEPONFORK: > + new_flags &= ~VM_WIPEONFORK; > + break; > + case MADV_DONTDUMP: > + new_flags |= VM_DONTDUMP; > + break; > + case MADV_DODUMP: > + if (!is_vm_hugetlb_page(vma) && new_flags & VM_SPECIAL) { > + error = -EINVAL; > + goto out; > + } > + new_flags &= ~VM_DONTDUMP; > + break; > + case MADV_MERGEABLE: > + case MADV_UNMERGEABLE: > + error = ksm_madvise(vma, start, end, behavior, &new_flags); > + if (error) > + goto out; > + break; > + case MADV_HUGEPAGE: > + case MADV_NOHUGEPAGE: > + error = hugepage_madvise(vma, &new_flags, behavior); > + if (error) > + goto out; > + break; > + } > + > + error = madvise_update_vma(vma, prev, start, end, new_flags); > + > +out: > + if (error == -ENOMEM) > + error = -EAGAIN; > + return error; > +} > + > #ifdef CONFIG_MEMORY_FAILURE > /* > * Error injection support for memory error handling. > @@ -978,30 +1004,6 @@ static int madvise_inject_error(int behavior, > } > #endif > > -static long > -madvise_vma(struct vm_area_struct *vma, struct vm_area_struct **prev, > - unsigned long start, unsigned long end, int behavior) > -{ > - switch (behavior) { > - case MADV_REMOVE: > - return madvise_remove(vma, prev, start, end); > - case MADV_WILLNEED: > - return madvise_willneed(vma, prev, start, end); > - case MADV_COLD: > - return madvise_cold(vma, prev, start, end); > - case MADV_PAGEOUT: > - return madvise_pageout(vma, prev, start, end); > - case MADV_FREE: > - case MADV_DONTNEED: > - return madvise_dontneed_free(vma, prev, start, end, behavior); > - case MADV_POPULATE_READ: > - case MADV_POPULATE_WRITE: > - return madvise_populate(vma, prev, start, end, behavior); > - default: > - return madvise_behavior(vma, prev, start, end, behavior); > - } > -} > - > static bool > madvise_behavior_valid(int behavior) > { > @@ -1054,6 +1056,73 @@ process_madvise_behavior_valid(int behavior) > } > } > > +/* > + * Walk the vmas in range [start,end), and call the visit function on each one. > + * The visit function will get start and end parameters that cover the overlap > + * between the current vma and the original range. Any unmapped regions in the > + * original range will result in this function returning -ENOMEM while still > + * calling the visit function on all of the existing vmas in the range. > + * Must be called with the mmap_lock held for reading or writing. > + */ > +static > +int madvise_walk_vmas(struct mm_struct *mm, unsigned long start, > + unsigned long end, unsigned long arg, > + int (*visit)(struct vm_area_struct *vma, > + struct vm_area_struct **prev, unsigned long start, > + unsigned long end, unsigned long arg)) > +{ > + struct vm_area_struct *vma; > + struct vm_area_struct *prev; > + unsigned long tmp; > + int unmapped_error = 0; > + > + /* > + * If the interval [start,end) covers some unmapped address > + * ranges, just ignore them, but return -ENOMEM at the end. > + * - different from the way of handling in mlock etc. > + */ > + vma = find_vma_prev(mm, start, &prev); > + if (vma && start > vma->vm_start) > + prev = vma; > + > + for (;;) { > + int error; > + > + /* Still start < end. */ > + if (!vma) > + return -ENOMEM; > + > + /* Here start < (end|vma->vm_end). */ > + if (start < vma->vm_start) { > + unmapped_error = -ENOMEM; > + start = vma->vm_start; > + if (start >= end) > + break; > + } > + > + /* Here vma->vm_start <= start < (end|vma->vm_end) */ > + tmp = vma->vm_end; > + if (end < tmp) > + tmp = end; > + > + /* Here vma->vm_start <= start < tmp <= (end|vma->vm_end). */ > + error = visit(vma, &prev, start, tmp, arg); > + if (error) > + return error; > + start = tmp; > + if (prev && start < prev->vm_end) > + start = prev->vm_end; > + if (start >= end) > + break; > + if (prev) > + vma = prev->vm_next; > + else /* madvise_remove dropped mmap_lock */ > + vma = find_vma(mm, start); > + } > + > + return unmapped_error; > +} > + > /* > * The madvise(2) system call. > * > @@ -1126,9 +1195,7 @@ process_madvise_behavior_valid(int behavior) > */ > int do_madvise(struct mm_struct *mm, unsigned long start, size_t len_in, int behavior) > { > - unsigned long end, tmp; > - struct vm_area_struct *vma, *prev; > - int unmapped_error = 0; > + unsigned long end; > int error = -EINVAL; > int write; > size_t len; > @@ -1168,51 +1235,9 @@ int do_madvise(struct mm_struct *mm, unsigned long start, size_t len_in, int beh > mmap_read_lock(mm); > } > > - /* > - * If the interval [start,end) covers some unmapped address > - * ranges, just ignore them, but return -ENOMEM at the end. > - * - different from the way of handling in mlock etc. > - */ > - vma = find_vma_prev(mm, start, &prev); > - if (vma && start > vma->vm_start) > - prev = vma; > - > blk_start_plug(&plug); > - for (;;) { > - /* Still start < end. */ > - error = -ENOMEM; > - if (!vma) > - goto out; > - > - /* Here start < (end|vma->vm_end). */ > - if (start < vma->vm_start) { > - unmapped_error = -ENOMEM; > - start = vma->vm_start; > - if (start >= end) > - goto out; > - } > - > - /* Here vma->vm_start <= start < (end|vma->vm_end) */ > - tmp = vma->vm_end; > - if (end < tmp) > - tmp = end; > - > - /* Here vma->vm_start <= start < tmp <= (end|vma->vm_end). */ > - error = madvise_vma(vma, &prev, start, tmp, behavior); > - if (error) > - goto out; > - start = tmp; > - if (prev && start < prev->vm_end) > - start = prev->vm_end; > - error = unmapped_error; > - if (start >= end) > - goto out; > - if (prev) > - vma = prev->vm_next; > - else /* madvise_remove dropped mmap_lock */ > - vma = find_vma(mm, start); > - } > -out: > + error = madvise_walk_vmas(mm, start, end, behavior, > + madvise_vma_behavior); > blk_finish_plug(&plug); > if (write) > mmap_write_unlock(mm); > -- > 2.33.0.259.gc128427fd7-goog > -- Kees Cook