Commit ac0a3fc9c07d ("mm: add ability to take further action in
vm_area_desc") added the ability for drivers to instruct mm to take actions
after the .mmap_prepare callback is complete.

To make life simpler and safer, this is done before the VMA/mmap write lock
is dropped but when the VMA is completely established.

So on error, we simply munmap() the VMA.

As part of this implementation, unfortunately a horrible hack had to be
implemented to support some questionable behaviour hugetlb relies upon -
that is that the file rmap lock is held until the operation is complete.

The implementation, for convenience, did this in mmap_action_finish() so
both the VMA and mmap_prepare compatibility layer paths would have this
correctly handled.

However, it turns out there is a mistake here - the rmap lock cannot be
held on munmap, as free_pgtables() -> unlink_file_vma_batch_add() ->
unlink_file_vma_batch_process() takes the file rmap lock.

We therefore currently have a deadlock issue that might arise.

Resolve this by leaving it to callers to handle the unmap.

The compatibility layer does not support this rmap behaviour, so we simply
have it unmap on error after calling mmap_action_complete().

In the VMA implementation, we only perform the unmap after the rmap lock is
dropped.

This resolves the issue by ensuring the rmap lock is always dropped when
the unmap occurs.

Fixes: ac0a3fc9c07d ("mm: add ability to take further action in vm_area_desc")
Cc: <[email protected]>
Signed-off-by: Lorenzo Stoakes (Oracle) <[email protected]>
---
 mm/util.c | 12 +++++++-----
 mm/vma.c  | 13 ++++++++++---
 2 files changed, 17 insertions(+), 8 deletions(-)

diff --git a/mm/util.c b/mm/util.c
index 73c97a748d8e..a2cfa0d77c35 100644
--- a/mm/util.c
+++ b/mm/util.c
@@ -1215,7 +1215,13 @@ int compat_vma_mmap(struct file *file, struct 
vm_area_struct *vma)
                return err;
 
        set_vma_from_desc(vma, &desc);
-       return mmap_action_complete(vma, &desc.action);
+       err = mmap_action_complete(vma, &desc.action);
+       if (err) {
+               const size_t len = vma_pages(vma) << PAGE_SHIFT;
+
+               do_munmap(current->mm, vma->vm_start, len, NULL);
+       }
+       return err;
 }
 EXPORT_SYMBOL(compat_vma_mmap);
 
@@ -1316,10 +1322,6 @@ static int mmap_action_finish(struct vm_area_struct *vma,
         * invoked if we do NOT merge, so we only clean up the VMA we created.
         */
        if (err) {
-               const size_t len = vma_pages(vma) << PAGE_SHIFT;
-
-               do_munmap(current->mm, vma->vm_start, len, NULL);
-
                if (action->error_hook) {
                        /* We may want to filter the error. */
                        err = action->error_hook(err);
diff --git a/mm/vma.c b/mm/vma.c
index ee91f2b76acf..3fc5fe4f1a7c 100644
--- a/mm/vma.c
+++ b/mm/vma.c
@@ -2736,9 +2736,9 @@ static int call_action_complete(struct mmap_state *map,
                                struct mmap_action *action,
                                struct vm_area_struct *vma)
 {
-       int ret;
+       int err;
 
-       ret = mmap_action_complete(vma, action);
+       err = mmap_action_complete(vma, action);
 
        /* If we held the file rmap we need to release it. */
        if (map->hold_file_rmap_lock) {
@@ -2746,7 +2746,14 @@ static int call_action_complete(struct mmap_state *map,
 
                i_mmap_unlock_write(file->f_mapping);
        }
-       return ret;
+
+       if (err) {
+               const size_t len = vma_pages(vma) << PAGE_SHIFT;
+
+               do_munmap(current->mm, vma->vm_start, len, NULL);
+       }
+
+       return err;
 }
 
 static unsigned long __mmap_region(struct file *file, unsigned long addr,
-- 
2.53.0


Reply via email to