linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: Jinjiang Tu <tujinjiang@huawei.com>
To: David Hildenbrand <david@redhat.com>, <akpm@linux-foundation.org>,
	<shr@devkernel.io>, <hannes@cmpxchg.org>, <riel@surriel.com>,
	<wangkefeng.wang@huawei.com>, <sunnanyong@huawei.com>,
	<linux-mm@kvack.org>
Subject: Re: [PATCH v3] mm/ksm: fix ksm exec support for prctl
Date: Mon, 18 Mar 2024 18:52:27 +0800	[thread overview]
Message-ID: <527963a1-e7e5-78ab-99dd-2677de980eed@huawei.com> (raw)
In-Reply-To: <da1d19c5-4adf-49a1-86cd-9781caad5334@redhat.com>


在 2024/3/18 17:36, David Hildenbrand 写道:
> On 18.03.24 10:04, Jinjiang Tu wrote:
>> commit 3c6f33b7273a ("mm/ksm: support fork/exec for prctl") inherits
>> MMF_VM_MERGE_ANY flag when a task calls execve(). Howerver, it doesn't
>> create the mm_slot, so ksmd will not try to scan this task.
>>
>> To fix it, allocate and add the mm_slot to ksm_mm_head in 
>> __bprm_mm_init()
>> when the mm has MMF_VM_MERGE_ANY flag.
>
> That would mean that 3c6f33b7273a is effectively ineffective for 
> fork+exec and only works with fork?
>
Yes. In my test case, parent process calls prctl with 
PR_SET_MEMORY_MERGE, and then fork, execeve a new
process. The new process allocates 3 anon pages with same content and 
loops infinitely. However, the 3 pages
are not merged.
>>
>> Fixes: 3c6f33b7273a ("mm/ksm: support fork/exec for prctl")
>> Signed-off-by: Jinjiang Tu <tujinjiang@huawei.com>
>> ---
>>   fs/exec.c           |  4 ++++
>>   include/linux/ksm.h | 13 +++++++++++++
>>   2 files changed, 17 insertions(+)
>>
>> diff --git a/fs/exec.c b/fs/exec.c
>> index ff6f26671cfc..00f40163cc12 100644
>> --- a/fs/exec.c
>> +++ b/fs/exec.c
>> @@ -67,6 +67,7 @@
>>   #include <linux/time_namespace.h>
>>   #include <linux/user_events.h>
>>   #include <linux/rseq.h>
>> +#include <linux/ksm.h>
>>     #include <linux/uaccess.h>
>>   #include <asm/mmu_context.h>
>> @@ -267,6 +268,9 @@ static int __bprm_mm_init(struct linux_binprm *bprm)
>>           goto err_free;
>>       }
>>   +    if (ksm_execve(mm))
>> +        goto err;
>> +
>>       /*
>>        * Place the stack at the largest stack address the architecture
>>        * supports. Later, we'll move this to an appropriate place. We 
>> don't
>> diff --git a/include/linux/ksm.h b/include/linux/ksm.h
>> index 401348e9f92b..7e2b1de3996a 100644
>> --- a/include/linux/ksm.h
>> +++ b/include/linux/ksm.h
>> @@ -59,6 +59,14 @@ static inline int ksm_fork(struct mm_struct *mm, 
>> struct mm_struct *oldmm)
>>       return 0;
>>   }
>>   +static inline int ksm_execve(struct mm_struct *mm)
>> +{
>> +    if (test_bit(MMF_VM_MERGE_ANY, &mm->flags))
>> +        return __ksm_enter(mm);
>
> As soon as we did the __ksm_enter(), we have to set MMF_VM_MERGEABLE. 
> I don't think it would be set right now, because:
>
> mm_alloc()->mm_init() will initialize the flags using
>
>     mm->flags = mmf_init_flags(current->mm->flags);
>
> Whereby MMF_INIT_MASK contains only MMF_VM_MERGE_ANY_MASK.
>
>
> So we likely need a set_bit(MMF_VM_MERGEABLE, &mm->flags) here as 
> well. Otherwise ksm_exit() wouldn't clean up, and we might call 
> __ksm_enter() twice.

__ksm_enter() will set MMF_VM_MERGEABLE when it succeeds.

>
>
> And now I wonder, when would be the right point to call __ksm_enter().
>
> __mmput() calls ksm_exit(). But for example, if __bprm_mm_init() fails 
> after __ksm_enter(), we will only call mmdrop(), not cleaning up ... 
> so that looks wrong.
Yes, I forgot cleanup in error path. ksm_exit() should be called when 
__bprm_mm_init() fails after __ksm_enter().
>
> We would have to make sure we call __ksm_enter() only once we know 
> that callers will call mm_put(). that is the case once we return from 
> bprm_mm_init() with success.
>
> Maybe move the ksm_execve() to bprm_mm_init(), adding a comment that 
> cleanup will only happen during mm_put(), so it's harder to mess up in 
> the future?
>
__ksm_enter() should be called under mmap write lock to avoid race with 
ksmd. So we can't move ksm_execve() to bprm_mm_init().




  reply	other threads:[~2024-03-18 10:52 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-03-18  9:04 Jinjiang Tu
2024-03-18  8:19 ` Jinjiang Tu
2024-03-18  9:36 ` David Hildenbrand
2024-03-18 10:52   ` Jinjiang Tu [this message]
2024-03-18 10:54     ` David Hildenbrand
2024-03-18  9:59 ` David Hildenbrand
2024-03-18 10:54   ` Jinjiang Tu

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=527963a1-e7e5-78ab-99dd-2677de980eed@huawei.com \
    --to=tujinjiang@huawei.com \
    --cc=akpm@linux-foundation.org \
    --cc=david@redhat.com \
    --cc=hannes@cmpxchg.org \
    --cc=linux-mm@kvack.org \
    --cc=riel@surriel.com \
    --cc=shr@devkernel.io \
    --cc=sunnanyong@huawei.com \
    --cc=wangkefeng.wang@huawei.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox