linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: Abel Wu <wuyun.abel@bytedance.com>
To: Michal Hocko <mhocko@suse.com>
Cc: Andrew Morton <akpm@linux-foundation.org>,
	Vlastimil Babka <vbabka@suse.cz>,
	Mel Gorman <mgorman@techsingularity.net>,
	Muchun Song <songmuchun@bytedance.com>,
	linux-mm@kvack.org, linux-kernel@vger.kernel.orga,
	Wei Yang <richard.weiyang@linux.alibaba.com>
Subject: Re: [PATCH v2] mm/mempolicy: fix lock contention on mems_allowed
Date: Fri, 12 Aug 2022 18:50:26 +0800	[thread overview]
Message-ID: <8a862c86-bc59-a76b-7ca0-96f304c612db@bytedance.com> (raw)
In-Reply-To: <YvUM7KaJaY+xnN2Y@dhcp22.suse.cz>


On 8/11/22 10:06 PM, Michal Hocko Wrote:
> [Cc Wei Yang who is author of 78b132e9bae9]
> 
> On Thu 11-08-22 20:41:57, Abel Wu wrote:
>> The mems_allowed field can be modified by other tasks, so it isn't
>> safe to access it with alloc_lock unlocked even in the current
>> process context.
>>
>> Say there are two tasks: A from cpusetA is performing set_mempolicy(2),
>> and B is changing cpusetA's cpuset.mems:
>>
>>    A (set_mempolicy)		B (echo xx > cpuset.mems)
>>    -------------------------------------------------------
>>    pol = mpol_new();
>> 				update_tasks_nodemask(cpusetA) {
>> 				  foreach t in cpusetA {
>> 				    cpuset_change_task_nodemask(t) {
>>    mpol_set_nodemask(pol) {
>> 				      task_lock(t); // t could be A
>>      new = f(A->mems_allowed);
>> 				      update t->mems_allowed;
>>      pol.create(pol, new);
>> 				      task_unlock(t);
>>    }
>> 				    }
>> 				  }
>> 				}
>>    task_lock(A);
>>    A->mempolicy = pol;
>>    task_unlock(A);
>>
>> In this case A's pol->nodes is computed by old mems_allowed, and could
>> be inconsistent with A's new mems_allowed.
> 
> Just to clarify. With an unfortunate timing and those two nodemasks
> overlap the end user effect could be a premature OOM because some nodes
> wouldn't be considered, right?

Yes, indeed!

> 
>> While it is different when replacing vmas' policy: the pol->nodes is
>> gone wild only when current_cpuset_is_being_rebound():
>>
>>    A (mbind)			B (echo xx > cpuset.mems)
>>    -------------------------------------------------------
>>    pol = mpol_new();
>>    mmap_write_lock(A->mm);
>> 				cpuset_being_rebound = cpusetA;
>> 				update_tasks_nodemask(cpusetA) {
>> 				  foreach t in cpusetA {
>> 				    cpuset_change_task_nodemask(t) {
>>    mpol_set_nodemask(pol) {
>> 				      task_lock(t); // t could be A
>>      mask = f(A->mems_allowed);
>> 				      update t->mems_allowed;
>>      pol.create(pol, mask);
>> 				      task_unlock(t);
>>    }
>> 				    }
>>    foreach v in A->mm {
>>      if (cpuset_being_rebound == cpusetA)
>>        pol.rebind(pol, cpuset.mems);
>>      v->vma_policy = pol;
>>    }
>>    mmap_write_unlock(A->mm);
>> 				    mmap_write_lock(t->mm);
>> 				    mpol_rebind_mm(t->mm);
>> 				    mmap_write_unlock(t->mm);
>> 				  }
>> 				}
>> 				cpuset_being_rebound = NULL;
>>
>> In this case, the cpuset.mems, which has already done updating, is
>> finally used for calculating pol->nodes, rather than A->mems_allowed.
>> So it is OK to call mpol_set_nodemask() with alloc_lock unlocked when
>> doing mbind(2).
>>
>> Fixes: 78b132e9bae9 ("mm/mempolicy: remove or narrow the lock on current")
>> Signed-off-by: Abel Wu <wuyun.abel@bytedance.com>
> 
> The fix looks correct.
> 
>> ---
>>   mm/mempolicy.c | 4 +++-
>>   1 file changed, 3 insertions(+), 1 deletion(-)
>>
>> diff --git a/mm/mempolicy.c b/mm/mempolicy.c
>> index d39b01fd52fe..61e4e6f5cfe8 100644
>> --- a/mm/mempolicy.c
>> +++ b/mm/mempolicy.c
>> @@ -855,12 +855,14 @@ static long do_set_mempolicy(unsigned short mode, unsigned short flags,
>>   		goto out;
>>   	}
>>   
>> +	task_lock(current);
>>   	ret = mpol_set_nodemask(new, nodes, scratch);
>>   	if (ret) {
>> +		task_unlock(current);
>>   		mpol_put(new);
>>   		goto out;
>>   	}
>> -	task_lock(current);
>> +
>>   	old = current->mempolicy;
>>   	current->mempolicy = new;
>>   	if (new && new->mode == MPOL_INTERLEAVE)
>> -- 
>> 2.31.1
> 


  parent reply	other threads:[~2022-08-12 10:50 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-08-11 12:41 Abel Wu
     [not found] ` <YvUM7KaJaY+xnN2Y@dhcp22.suse.cz>
2022-08-12 10:50   ` Abel Wu [this message]
     [not found]   ` <YvUOCTlk7HSgJkdY@dhcp22.suse.cz>
2022-08-20  2:06     ` Wei Yang
2022-08-18  6:56 ` Muchun Song

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=8a862c86-bc59-a76b-7ca0-96f304c612db@bytedance.com \
    --to=wuyun.abel@bytedance.com \
    --cc=akpm@linux-foundation.org \
    --cc=linux-kernel@vger.kernel.orga \
    --cc=linux-mm@kvack.org \
    --cc=mgorman@techsingularity.net \
    --cc=mhocko@suse.com \
    --cc=richard.weiyang@linux.alibaba.com \
    --cc=songmuchun@bytedance.com \
    --cc=vbabka@suse.cz \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox