From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 797A5C433EF for ; Thu, 28 Oct 2021 21:21:01 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 6022A60FE3 for ; Thu, 28 Oct 2021 21:21:01 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231304AbhJ1VX0 (ORCPT ); Thu, 28 Oct 2021 17:23:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:47886 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230404AbhJ1VXZ (ORCPT ); Thu, 28 Oct 2021 17:23:25 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id EBF7A6023E; Thu, 28 Oct 2021 21:20:55 +0000 (UTC) Date: Thu, 28 Oct 2021 22:20:52 +0100 From: Catalin Marinas To: Linus Torvalds Cc: Andreas Gruenbacher , Paul Mackerras , Alexander Viro , Christoph Hellwig , "Darrick J. Wong" , Jan Kara , Matthew Wilcox , cluster-devel , linux-fsdevel , Linux Kernel Mailing List , ocfs2-devel@oss.oracle.com, kvm-ppc@vger.kernel.org, linux-btrfs Subject: Re: [PATCH v8 00/17] gfs2: Fix mmap + page fault deadlocks Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-fsdevel@vger.kernel.org One last try on this path before I switch to the other options. On Wed, Oct 27, 2021 at 02:14:48PM -0700, Linus Torvalds wrote: > On Wed, Oct 27, 2021 at 12:13 PM Catalin Marinas > wrote: > > As an alternative, you mentioned earlier that a per-thread fault status > > was not feasible on x86 due to races. Was this only for the hw poison > > case? I think the uaccess is slightly different. > > It's not x86-specific, it's very generic. > > If we set some flag in the per-thread status, we'll need to be careful > about not overwriting it if we then have a subsequent NMI that _also_ > takes a (completely unrelated) page fault - before we then read the > per-thread flag. > > Think 'perf' and fetching backtraces etc. > > Note that the NMI page fault can easily also be a pointer coloring > fault on arm64, for exactly the same reason that whatever original > copy_from_user() code was. So this is not a "oh, pointer coloring > faults are different". They have the same re-entrancy issue. > > And both the "pagefault_disable" and "fault happens in interrupt > context" cases are also the exact same 'faulthandler_disabled()' > thing. So even at fault time they look very similar. They do look fairly similar but we should have the information in the fault handler to distinguish: not a page fault (pte permission or p*d translation), in_task(), user address, fixup handler. But I agree the logic looks fragile. I think for nested contexts we can save the uaccess fault state on exception entry, restore it on return. Or (needs some thinking on atomicity) save it in a local variable. The high-level API would look something like: unsigned long uaccess_flags; /* we could use TIF_ flags */ uaccess_flags = begin_retriable_uaccess(); copied = copy_page_from_iter_atomic(...); retry = end_retriable_uaccess(uaccess_flags); ... if (!retry) break; I think we'd need a TIF flag to mark the retriable region and another to track whether a non-recoverable fault occurred. It needs prototyping. Anyway, if you don't like this approach, I'll look at error codes being returned but rather than changing all copy_from_user() etc., introduce a new API that returns different error codes depending on the fault (e.g -EFAULT vs -EACCES). We already have copy_from_user_nofault(), we'd need something for the iov_iter stuff to use in the fs code. -- Catalin