lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1623803360.zd3fo9zm1z.astroid@bobo.none>
Date:   Wed, 16 Jun 2021 11:02:20 +1000
From:   Nicholas Piggin <npiggin@...il.com>
To:     Andrew Morton <akpm@...ux-foundation.org>,
        Andy Lutomirski <luto@...nel.org>
Cc:     Anton Blanchard <anton@...abs.org>, linux-arch@...r.kernel.org,
        linux-kernel@...r.kernel.org, linux-mm@...ck.org,
        linuxppc-dev@...ts.ozlabs.org,
        Randy Dunlap <rdunlap@...radead.org>,
        Rik van Riel <riel@...riel.com>,
        Linus Torvalds <torvalds@...ux-foundation.org>
Subject: Re: [PATCH v4 2/4] lazy tlb: allow lazy tlb mm refcounting to be
 configurable

Excerpts from Andy Lutomirski's message of June 16, 2021 10:14 am:
> On 6/14/21 5:55 PM, Nicholas Piggin wrote:
>> Excerpts from Andy Lutomirski's message of June 15, 2021 2:20 am:
>>> Replying to several emails at once...
>>>
> 
>> 
>> So the only documentation relating to the current active_mm value or 
>> refcounting is that it may not match what the x86 specific code is 
>> doing?
>> 
>> All this complexity you accuse me of adding is entirely in x86 code.
>> On other architectures, it's very simple and understandable, and 
>> documented. I don't know how else to explain this.
> 
> And the docs you referred me to will be *wrong* with your patches
> applied.  They are your patches, and they break the semantics.

No they aren't wrong, I've documented the shootdown refcounting scheme 
and Linus' historical email is still right about the active_mm concept,
and the refcounting details still match the CONFIG_MMU_TLB_REFCOUNT=y
case.

If you have some particular place you would like to see more 
documentation added, please tell me where I'll add something before
the series gets upstreamed.

>>>>>>
>>>>>>> With your patch applied:
>>>>>>>
>>>>>>>  To support all that, the "struct mm_struct" now has two counters: a
>>>>>>>  "mm_users" counter that is how many "real address space users" there are,
>>>>>>>  and a "mm_count" counter that is the number of "lazy" users (ie anonymous
>>>>>>>  users) plus one if there are any real users.
>>>>>>>
>>>>>>> isn't even true any more.
>>>>>>
>>>>>> Well yeah but the active_mm concept hasn't changed. The refcounting 
>>>>>> change is hopefully reasonably documented?
>>>
>>> active_mm is *only* refcounting in the core code.  See below.
>> 
>> It's just not. It's passed in to switch_mm. Most architectures except 
>> for x86 require this.
>> 
> 
> Sorry, I was obviously blatantly wrong.  Let me say it differently.
> active_mm does two things:
> 
> 1. It keeps an mm alive via a refcounting scheme.
> 
> 2. It passes a parameter to switch_mm() to remind the arch code what the
> most recently switch-to mm was.
> 
> #2 is basically useless.  An architecture can handle *that* with a
> percpu variable and two lines of code.
> 
> If you are getting rid of functionality #1 in the core code via a new
> arch opt-out, please get rid of #2 as well.  *Especially* because, when
> the arch asks the core code to stop refcounting active_mm, there is
> absolutely nothing guaranteeing that the parameter that the core code
> will pass to switch_mm() points to memory that hasn't been freed and
> reused for another purpose.

You're confused about the patch. It's not opting out of lazy tlb mm or 
opting out of active_mm, it is changing how the refcounting is done.

You were just before trying to tell me it would make the code simpler to 
remove it, but it clearly wouldn't if powerpc just had to reimplement it 
in arch code anyway, would it?

powerpc is not going to add code to reimplement the exact same thing as 
active_mm, because it uses active_mm and so does everyone else. For the
last time I'm not going to change that.

That is something x86 wants. This series is not for x86. It doesn't 
change anything that x86 does. I have kindly tried to give you 
suggestions and patches about what you might do with x86, and it can 
easily be changed, but that is not the purpose of my patch. Please don't 
reply again telling me to get rid of active_mm. We'll draw a line under
this and move on.

>>> I don't understand what contract you're talking about.  The core code
>>> maintains an active_mm counter and keeps that mm_struct from
>>> disappearing.  That's *it*.  The core code does not care that active_mm
>>> is active, and x86 provides evidence of that -- on x86,
>>> current->active_mm may well be completely unused.
>> 
>> I already acknowledged archs can do their own thing under the covers if 
>> they want.
> 
> No.
> 
> I am *not* going to write x86 patches that use your feature in a way
> that will cause the core code to pass around a complete garbage pointer
> to an mm_struct that is completely unreferenced and may well be deleted.
>  Doing something private in arch code is one thing.  Doing something
> that causes basic common sense to be violated in core code is another
> thing entirely.

I'm talking about the relationship between core code's idea of active_mm 
and the arch's idea as it stands now. I'm not talking about what you might
do with x86.

The whole point of this was that you have been operating under the 
misconception that active_mm is not a core kernel concept, because x86 
has gone and done its own thing and doesn't use it. That does not mean 
it is not a core kernel concept!

> 
>>>
>>> static inline void do_switch_mm(struct task_struct *prev_task, ...)
>>> {
>>> #ifdef CONFIG_MMU_TLB_REFCOUNT
>>> 	switch_mm(...);
>>> #else
>>> 	switch_mm(fewer parameters);
>>> 	/* or pass NULL or whatever. */
>>> #endif
>>> }
>> 
>> And prev_task comes from active_mm, ergo core code requires the concept 
>> of active_mm.
> 
> I don't see why this concept is hard.  We are literally quibbling about
> this single line of core code in kernel/sched/core.c:
> 
> switch_mm_irqs_off(prev->active_mm, next->mm, next);
> 
> This is not rocket science.  There are any number of ways to fix it.
> For example:
> 
> #ifdef CONFIG_MMU_TLB_REFCOUNT
> 	switch_mm_irqs_off(prev->active_mm, next->mm, next);
> #else
> 	switch_mm_irqs_off(NULL, next->mm, next);
> #endif
> 
> If you don't like the NULL, then make the signature depend on the config
> option.
> 
> What you may not do is what your patch actually does:
> 
> switch_mm_irqs_off(random invalid pointer, next->mm, next);

You're totally confused about the code, and my patch series. That's not 
what it does at all. Unless you have spotted a bug, in which case point 
it out.

> 
> Now maybe it works because powerpc's lifecycle rules happen to keep
> active_mm alive, but I haven't verified it.  x86's lifecycle rules *do not*.
> 
>>>>
>>>> That's understandable, but please redirect your objections to the proper 
>>>> place. git blame suggests 3d28ebceaffab.
>>>
>>> Thanks for the snark.
>> 
>> Is it not true? I don't mean that one patch causing all the x86 
>> complexity or even making the situation worse itself. But you seem to be 
>> asking my series to do things that really apply to the x86 changes over
>> the past few years that got us here.
> 
> With just my patch from 4.15 applied, task->active_mm points to an
> actual mm_struct, and that mm_struct will not be freed early.  If I opt
> x86 into your patch's new behavior, then task->active_mm may be freed.
> 
> akpm, please drop this series until it's fixed.  It's a core change to
> better support arch usecases, but it's unnecessarily fragile, and there
> is already an arch maintainer pointing out that it's inadequate to
> robustly support arch usecases.  There is no reason to merge it in its
> present state.
> 

No, you've been sniping these for nearly a year now, and I've been pretty 
accommodating not pushing it upstream, and trying to get anything out of 
you, a patch or an actual description of the problem, but it's like 
getting blood from a stone. I've tried to ask what help x86 needs, but 
nothing. You didn't even reply to my (actual working) patch or questions 
about it in the last comment! Doing that then throwing out NAK like it's 
a magic word is pretty rude really.

The series is fine, it's documented, it works well, it solves a problem
the core code changes are small and reusable, and nobody has pointed out
a bug.

So at this point, just get over it. Do some patches for x86 on top of it 
later when you have some time. Or Rik might. None of the patches in my 
series prevents that. I'll be happy to review your changes or adjust 
some of the code added in this series so it's usable by x86 if you need.
The x86 work could have bee done already with the time bickering about 
this.

Thanks,
Nick

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ