]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
4.11-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 17 May 2017 08:35:39 +0000 (10:35 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 17 May 2017 08:35:39 +0000 (10:35 +0200)
added patches:
vfio-type1-remove-locked-page-accounting-workqueue.patch

queue-4.11/series
queue-4.11/vfio-type1-remove-locked-page-accounting-workqueue.patch [new file with mode: 0644]

index 8fc9ac49b2d1ce12a5704948fe69e89331b5c238..c212fb48adbb2a7a88c82ed0244ddd128a1ffe2e 100644 (file)
@@ -40,3 +40,4 @@ dm-crypt-rewrite-wipe-key-in-crypto-layer-using-random-data.patch
 dm-era-save-spacemap-metadata-root-after-the-pre-commit.patch
 dm-rq-check-blk_mq_register_dev-return-value-in-dm_mq_init_request_queue.patch
 dm-thin-fix-a-memory-leak-when-passing-discard-bio-down.patch
+vfio-type1-remove-locked-page-accounting-workqueue.patch
diff --git a/queue-4.11/vfio-type1-remove-locked-page-accounting-workqueue.patch b/queue-4.11/vfio-type1-remove-locked-page-accounting-workqueue.patch
new file mode 100644 (file)
index 0000000..e4380cf
--- /dev/null
@@ -0,0 +1,232 @@
+From 0cfef2b7410b64d7a430947e0b533314c4f97153 Mon Sep 17 00:00:00 2001
+From: Alex Williamson <alex.williamson@redhat.com>
+Date: Thu, 13 Apr 2017 14:10:15 -0600
+Subject: vfio/type1: Remove locked page accounting workqueue
+
+From: Alex Williamson <alex.williamson@redhat.com>
+
+commit 0cfef2b7410b64d7a430947e0b533314c4f97153 upstream.
+
+If the mmap_sem is contented then the vfio type1 IOMMU backend will
+defer locked page accounting updates to a workqueue task.  This has a
+few problems and depending on which side the user tries to play, they
+might be over-penalized for unmaps that haven't yet been accounted or
+race the workqueue to enter more mappings than they're allowed.  The
+original intent of this workqueue mechanism seems to be focused on
+reducing latency through the ioctl, but we cannot do so at the cost
+of correctness.  Remove this workqueue mechanism and update the
+callers to allow for failure.  We can also now recheck the limit under
+write lock to make sure we don't exceed it.
+
+vfio_pin_pages_remote() also now necessarily includes an unwind path
+which we can jump to directly if the consecutive page pinning finds
+that we're exceeding the user's memory limits.  This avoids the
+current lazy approach which does accounting and mapping up to the
+fault, only to return an error on the next iteration to unwind the
+entire vfio_dma.
+
+Reviewed-by: Peter Xu <peterx@redhat.com>
+Reviewed-by: Kirti Wankhede <kwankhede@nvidia.com>
+Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/vfio/vfio_iommu_type1.c |  110 ++++++++++++++++++----------------------
+ 1 file changed, 51 insertions(+), 59 deletions(-)
+
+--- a/drivers/vfio/vfio_iommu_type1.c
++++ b/drivers/vfio/vfio_iommu_type1.c
+@@ -246,69 +246,46 @@ static int vfio_iova_put_vfio_pfn(struct
+       return ret;
+ }
+-struct vwork {
+-      struct mm_struct        *mm;
+-      long                    npage;
+-      struct work_struct      work;
+-};
+-
+-/* delayed decrement/increment for locked_vm */
+-static void vfio_lock_acct_bg(struct work_struct *work)
+-{
+-      struct vwork *vwork = container_of(work, struct vwork, work);
+-      struct mm_struct *mm;
+-
+-      mm = vwork->mm;
+-      down_write(&mm->mmap_sem);
+-      mm->locked_vm += vwork->npage;
+-      up_write(&mm->mmap_sem);
+-      mmput(mm);
+-      kfree(vwork);
+-}
+-
+-static void vfio_lock_acct(struct task_struct *task, long npage)
++static int vfio_lock_acct(struct task_struct *task, long npage, bool *lock_cap)
+ {
+-      struct vwork *vwork;
+       struct mm_struct *mm;
+       bool is_current;
++      int ret;
+       if (!npage)
+-              return;
++              return 0;
+       is_current = (task->mm == current->mm);
+       mm = is_current ? task->mm : get_task_mm(task);
+       if (!mm)
+-              return; /* process exited */
++              return -ESRCH; /* process exited */
+-      if (down_write_trylock(&mm->mmap_sem)) {
+-              mm->locked_vm += npage;
+-              up_write(&mm->mmap_sem);
+-              if (!is_current)
+-                      mmput(mm);
+-              return;
+-      }
++      ret = down_write_killable(&mm->mmap_sem);
++      if (!ret) {
++              if (npage > 0) {
++                      if (lock_cap ? !*lock_cap :
++                          !has_capability(task, CAP_IPC_LOCK)) {
++                              unsigned long limit;
++
++                              limit = task_rlimit(task,
++                                              RLIMIT_MEMLOCK) >> PAGE_SHIFT;
+-      if (is_current) {
+-              mm = get_task_mm(task);
+-              if (!mm)
+-                      return;
++                              if (mm->locked_vm + npage > limit)
++                                      ret = -ENOMEM;
++                      }
++              }
++
++              if (!ret)
++                      mm->locked_vm += npage;
++
++              up_write(&mm->mmap_sem);
+       }
+-      /*
+-       * Couldn't get mmap_sem lock, so must setup to update
+-       * mm->locked_vm later. If locked_vm were atomic, we
+-       * wouldn't need this silliness
+-       */
+-      vwork = kmalloc(sizeof(struct vwork), GFP_KERNEL);
+-      if (WARN_ON(!vwork)) {
++      if (!is_current)
+               mmput(mm);
+-              return;
+-      }
+-      INIT_WORK(&vwork->work, vfio_lock_acct_bg);
+-      vwork->mm = mm;
+-      vwork->npage = npage;
+-      schedule_work(&vwork->work);
++
++      return ret;
+ }
+ /*
+@@ -405,7 +382,7 @@ static int vaddr_get_pfn(struct mm_struc
+ static long vfio_pin_pages_remote(struct vfio_dma *dma, unsigned long vaddr,
+                                 long npage, unsigned long *pfn_base)
+ {
+-      unsigned long limit = rlimit(RLIMIT_MEMLOCK) >> PAGE_SHIFT;
++      unsigned long pfn = 0, limit = rlimit(RLIMIT_MEMLOCK) >> PAGE_SHIFT;
+       bool lock_cap = capable(CAP_IPC_LOCK);
+       long ret, pinned = 0, lock_acct = 0;
+       bool rsvd;
+@@ -442,8 +419,6 @@ static long vfio_pin_pages_remote(struct
+       /* Lock all the consecutive pages from pfn_base */
+       for (vaddr += PAGE_SIZE, iova += PAGE_SIZE; pinned < npage;
+            pinned++, vaddr += PAGE_SIZE, iova += PAGE_SIZE) {
+-              unsigned long pfn = 0;
+-
+               ret = vaddr_get_pfn(current->mm, vaddr, dma->prot, &pfn);
+               if (ret)
+                       break;
+@@ -460,14 +435,25 @@ static long vfio_pin_pages_remote(struct
+                               put_pfn(pfn, dma->prot);
+                               pr_warn("%s: RLIMIT_MEMLOCK (%ld) exceeded\n",
+                                       __func__, limit << PAGE_SHIFT);
+-                              break;
++                              ret = -ENOMEM;
++                              goto unpin_out;
+                       }
+                       lock_acct++;
+               }
+       }
+ out:
+-      vfio_lock_acct(current, lock_acct);
++      ret = vfio_lock_acct(current, lock_acct, &lock_cap);
++
++unpin_out:
++      if (ret) {
++              if (!rsvd) {
++                      for (pfn = *pfn_base ; pinned ; pfn++, pinned--)
++                              put_pfn(pfn, dma->prot);
++              }
++
++              return ret;
++      }
+       return pinned;
+ }
+@@ -488,7 +474,7 @@ static long vfio_unpin_pages_remote(stru
+       }
+       if (do_accounting)
+-              vfio_lock_acct(dma->task, locked - unlocked);
++              vfio_lock_acct(dma->task, locked - unlocked, NULL);
+       return unlocked;
+ }
+@@ -522,8 +508,14 @@ static int vfio_pin_page_external(struct
+               goto pin_page_exit;
+       }
+-      if (!rsvd && do_accounting)
+-              vfio_lock_acct(dma->task, 1);
++      if (!rsvd && do_accounting) {
++              ret = vfio_lock_acct(dma->task, 1, &lock_cap);
++              if (ret) {
++                      put_pfn(*pfn_base, dma->prot);
++                      goto pin_page_exit;
++              }
++      }
++
+       ret = 1;
+ pin_page_exit:
+@@ -543,7 +535,7 @@ static int vfio_unpin_page_external(stru
+       unlocked = vfio_iova_put_vfio_pfn(dma, vpfn);
+       if (do_accounting)
+-              vfio_lock_acct(dma->task, -unlocked);
++              vfio_lock_acct(dma->task, -unlocked, NULL);
+       return unlocked;
+ }
+@@ -740,7 +732,7 @@ static long vfio_unmap_unpin(struct vfio
+       dma->iommu_mapped = false;
+       if (do_accounting) {
+-              vfio_lock_acct(dma->task, -unlocked);
++              vfio_lock_acct(dma->task, -unlocked, NULL);
+               return 0;
+       }
+       return unlocked;
+@@ -1382,7 +1374,7 @@ static void vfio_iommu_unmap_unpin_reacc
+                       if (!is_invalid_reserved_pfn(vpfn->pfn))
+                               locked++;
+               }
+-              vfio_lock_acct(dma->task, locked - unlocked);
++              vfio_lock_acct(dma->task, locked - unlocked, NULL);
+       }
+ }