From: Jinjiang Tu <tujinjiang@huawei.com>
To: David Hildenbrand <david@redhat.com>, <akpm@linux-foundation.org>,
<shr@devkernel.io>, <hannes@cmpxchg.org>, <riel@surriel.com>,
<wangkefeng.wang@huawei.com>, <sunnanyong@huawei.com>,
<linux-mm@kvack.org>
Subject: Re: [PATCH v3] mm/ksm: fix ksm exec support for prctl
Date: Mon, 18 Mar 2024 18:52:27 +0800 [thread overview]
Message-ID: <527963a1-e7e5-78ab-99dd-2677de980eed@huawei.com> (raw)
In-Reply-To: <da1d19c5-4adf-49a1-86cd-9781caad5334@redhat.com>
在 2024/3/18 17:36, David Hildenbrand 写道:
> On 18.03.24 10:04, Jinjiang Tu wrote:
>> commit 3c6f33b7273a ("mm/ksm: support fork/exec for prctl") inherits
>> MMF_VM_MERGE_ANY flag when a task calls execve(). Howerver, it doesn't
>> create the mm_slot, so ksmd will not try to scan this task.
>>
>> To fix it, allocate and add the mm_slot to ksm_mm_head in
>> __bprm_mm_init()
>> when the mm has MMF_VM_MERGE_ANY flag.
>
> That would mean that 3c6f33b7273a is effectively ineffective for
> fork+exec and only works with fork?
>
Yes. In my test case, parent process calls prctl with
PR_SET_MEMORY_MERGE, and then fork, execeve a new
process. The new process allocates 3 anon pages with same content and
loops infinitely. However, the 3 pages
are not merged.
>>
>> Fixes: 3c6f33b7273a ("mm/ksm: support fork/exec for prctl")
>> Signed-off-by: Jinjiang Tu <tujinjiang@huawei.com>
>> ---
>> fs/exec.c | 4 ++++
>> include/linux/ksm.h | 13 +++++++++++++
>> 2 files changed, 17 insertions(+)
>>
>> diff --git a/fs/exec.c b/fs/exec.c
>> index ff6f26671cfc..00f40163cc12 100644
>> --- a/fs/exec.c
>> +++ b/fs/exec.c
>> @@ -67,6 +67,7 @@
>> #include <linux/time_namespace.h>
>> #include <linux/user_events.h>
>> #include <linux/rseq.h>
>> +#include <linux/ksm.h>
>> #include <linux/uaccess.h>
>> #include <asm/mmu_context.h>
>> @@ -267,6 +268,9 @@ static int __bprm_mm_init(struct linux_binprm *bprm)
>> goto err_free;
>> }
>> + if (ksm_execve(mm))
>> + goto err;
>> +
>> /*
>> * Place the stack at the largest stack address the architecture
>> * supports. Later, we'll move this to an appropriate place. We
>> don't
>> diff --git a/include/linux/ksm.h b/include/linux/ksm.h
>> index 401348e9f92b..7e2b1de3996a 100644
>> --- a/include/linux/ksm.h
>> +++ b/include/linux/ksm.h
>> @@ -59,6 +59,14 @@ static inline int ksm_fork(struct mm_struct *mm,
>> struct mm_struct *oldmm)
>> return 0;
>> }
>> +static inline int ksm_execve(struct mm_struct *mm)
>> +{
>> + if (test_bit(MMF_VM_MERGE_ANY, &mm->flags))
>> + return __ksm_enter(mm);
>
> As soon as we did the __ksm_enter(), we have to set MMF_VM_MERGEABLE.
> I don't think it would be set right now, because:
>
> mm_alloc()->mm_init() will initialize the flags using
>
> mm->flags = mmf_init_flags(current->mm->flags);
>
> Whereby MMF_INIT_MASK contains only MMF_VM_MERGE_ANY_MASK.
>
>
> So we likely need a set_bit(MMF_VM_MERGEABLE, &mm->flags) here as
> well. Otherwise ksm_exit() wouldn't clean up, and we might call
> __ksm_enter() twice.
__ksm_enter() will set MMF_VM_MERGEABLE when it succeeds.
>
>
> And now I wonder, when would be the right point to call __ksm_enter().
>
> __mmput() calls ksm_exit(). But for example, if __bprm_mm_init() fails
> after __ksm_enter(), we will only call mmdrop(), not cleaning up ...
> so that looks wrong.
Yes, I forgot cleanup in error path. ksm_exit() should be called when
__bprm_mm_init() fails after __ksm_enter().
>
> We would have to make sure we call __ksm_enter() only once we know
> that callers will call mm_put(). that is the case once we return from
> bprm_mm_init() with success.
>
> Maybe move the ksm_execve() to bprm_mm_init(), adding a comment that
> cleanup will only happen during mm_put(), so it's harder to mess up in
> the future?
>
__ksm_enter() should be called under mmap write lock to avoid race with
ksmd. So we can't move ksm_execve() to bprm_mm_init().
next prev parent reply other threads:[~2024-03-18 10:52 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-03-18 9:04 Jinjiang Tu
2024-03-18 8:19 ` Jinjiang Tu
2024-03-18 9:36 ` David Hildenbrand
2024-03-18 10:52 ` Jinjiang Tu [this message]
2024-03-18 10:54 ` David Hildenbrand
2024-03-18 9:59 ` David Hildenbrand
2024-03-18 10:54 ` Jinjiang Tu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=527963a1-e7e5-78ab-99dd-2677de980eed@huawei.com \
--to=tujinjiang@huawei.com \
--cc=akpm@linux-foundation.org \
--cc=david@redhat.com \
--cc=hannes@cmpxchg.org \
--cc=linux-mm@kvack.org \
--cc=riel@surriel.com \
--cc=shr@devkernel.io \
--cc=sunnanyong@huawei.com \
--cc=wangkefeng.wang@huawei.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox