From patchwork Fri Mar 21 10:09:37 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 14025182 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0460AC35FFF for ; Fri, 21 Mar 2025 10:09:54 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id F3DE0280002; Fri, 21 Mar 2025 06:09:52 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id EECD2280001; Fri, 21 Mar 2025 06:09:52 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id D4347280002; Fri, 21 Mar 2025 06:09:52 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id B2A0C280001 for ; Fri, 21 Mar 2025 06:09:52 -0400 (EDT) Received: from smtpin26.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id EBE0B5A196 for ; Fri, 21 Mar 2025 10:09:53 +0000 (UTC) X-FDA: 83245137066.26.812E893 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf30.hostedemail.com (Postfix) with ESMTP id 8E8E680004 for ; Fri, 21 Mar 2025 10:09:50 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=Khl135on; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=cK20mB9r; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); spf=pass (imf30.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1742551790; a=rsa-sha256; cv=pass; b=oZHL2bS7RCHjJg9QEpX5aSZYgOpZ78M0FhWI5veSns1w8bAkhHLoPRyQtoI9atP/O61p8G uXgGBnkGQhxjZJZ+2x9Oxt/5FdosSlnBlXisYAlY1jps8lHyCzBwbZdChPEh9avzJPIwGO ZqH3MyLIrhDb7QOMsP0W2Yu+nhJ0dug= ARC-Authentication-Results: i=2; imf30.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=Khl135on; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=cK20mB9r; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); spf=pass (imf30.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1742551790; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=w7khFOuSa8N458MLEYgEIQAKZfXHzfYaDDjSCt0eZaI=; b=eufHh+wfwKw7T1wvWzvLFJE7BklT9+eezBdAJB+5cBAQEC7ugpz5VB22kODDuez1f9PVkS Y6MtnWNjGR7JiUWV/Z+w9o+K1tr0FuCA3ZP2jBEA4GSIo3AE5pS9MFXwsKVh9/j5yI347g I9/I+O9vevFiXRzkBFFbg/X9hVdf9QE= Received: from pps.filterd (m0333521.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 52L4ua14017745; Fri, 21 Mar 2025 10:09:48 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:message-id :mime-version:subject:to; s=corp-2023-11-20; bh=w7khFOuSa8N458ML EYgEIQAKZfXHzfYaDDjSCt0eZaI=; b=Khl135onSJA6WHJ2S7jcGeJ5HkGoves6 KuaGcZ18zQxB+FwA1VVzL+5hv58DkuhUjqEztJtDvYpY0XaDInMivMldPwgUl5dn 3wkjrr6EiFZcZGXLIGLb3ypm7EDkwxmT2lDyBBrJZTvH9M1RgN07uzYwCxNeVhoX v52ID4gg80iyAMDoo1aF3owFWQHCPQ/IUdq8f9Y2L/nO52Q7T0b+Os8wBJ9e9ij+ VsLxe0I6cfmb0EIH2jO0iTXZiXviIpH806Eg9t0u34t8qaTTBEb+7OWrPWtrsDGF A3ok/Va9NefwUEIp406e+AP/wAnb0CQY9Bim85Hfw5Ozz2zB/qW21Q== Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 45d1s90cn7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 21 Mar 2025 10:09:47 +0000 (GMT) Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 52L90cfq004589; Fri, 21 Mar 2025 10:09:46 GMT Received: from nam04-mw2-obe.outbound.protection.outlook.com (mail-mw2nam04lp2168.outbound.protection.outlook.com [104.47.73.168]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 45ftmy8hg4-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 21 Mar 2025 10:09:46 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Cy+Q5Y7w7tBWiIofZ08Wnlu1Hi/bicj+4bWJ4HwSm43SdGD44ancBg7n7ZTVu0+Afz0FO3ob3E7VJh9Pyr18q8H9SyUI5wKv2p3JospVtP2eTKh3BY9ZKKzoTkq1nK4dDtJVQJJ9xhYILEWeYvaDHRhsLfOaMJ0D2GxBzBvTaq88eEeYftz7ZBw7Moc+flV5Llki4BN0N/3/QQdlG/KvK0SjfSYM81Yh0VyQeUwq6C6ogxLzzYp86ZikwsO+4ZSFd9OFoCJOC5Zs1m8dkXxg/1DdZArzoHd6bmMew+OFVD/LQUvqGtpNyMRtts1xT5G9yknmpkjKCU+0Lpz0gQtbCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=w7khFOuSa8N458MLEYgEIQAKZfXHzfYaDDjSCt0eZaI=; b=a5Un0DNRjVB470hwd66ABYUBljVe4+n+6NJ2z0BN9cpOMjo/QHO8nr4oJ84gkLYDlUhfWHu4/NcTzF1DoeZdDu3ULYYuCZYiMLYf+EiLfTkM39kfw7zD4q/RthSiHk5rk+I9Y3/B6tGHAsH7EKEm0IqVEOvz4PJWjz7LxmOTMvU9Il193f60UdOtN/BKrEwRmpHYT9Lbk+Nf6j9HcuLYgho8OtaOiAR9RUltu0gvfcb592PfxPLHPGN4IhBl23h34cs9TaDzOqFjRJ5/mfpYw4THuama7pl/tpTYxMZ+6rMPM6iTtEveivrdpbewEZqUBOLH/3msvuN74iF0JJyOAA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=w7khFOuSa8N458MLEYgEIQAKZfXHzfYaDDjSCt0eZaI=; b=cK20mB9rlq/1VWvQCgGfQJYNubsRFwzf+wphYc2M0wO0zRWQokLvUaptlTY7/AQWrsP8cCYJzp7yUPxsChhzz4WCQEGPxB9EtFuBqBT2G01VzHlOHQvkm84idk8bOVsdyEhyZRA6OPeem336JbcgC2SODhISvp7nfZ0WiyCKJkA= Received: from DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) by MW5PR10MB5850.namprd10.prod.outlook.com (2603:10b6:303:190::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.33; Fri, 21 Mar 2025 10:09:42 +0000 Received: from DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2]) by DM4PR10MB8218.namprd10.prod.outlook.com ([fe80::2650:55cf:2816:5f2%7]) with mapi id 15.20.8534.036; Fri, 21 Mar 2025 10:09:41 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: Vlastimil Babka , Jann Horn , "Liam R . Howlett" , Pedro Falcato , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [PATCH 6.15] mm/vma: add give_up_on_oom option on modify/merge, use in uffd release Date: Fri, 21 Mar 2025 10:09:37 +0000 Message-ID: <20250321100937.46634-1-lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.48.1 X-ClientProxiedBy: LO4P123CA0157.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:188::18) To DM4PR10MB8218.namprd10.prod.outlook.com (2603:10b6:8:1cc::16) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR10MB8218:EE_|MW5PR10MB5850:EE_ X-MS-Office365-Filtering-Correlation-Id: e6a85d14-a196-4700-04cd-08dd68607f42 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|366016; X-Microsoft-Antispam-Message-Info: 5AhvjikNwjEpWfrzRRmeXHITa3wOSq748uEtCXmMi8NwS6tiGyXDHOYf+3EZIzcOlepzDyegLKcyErO3uShNcFNmMnTuk3mocluVO0mtdn/kRChH7OiepUCEOzw5mz6pU1+ye/xulBYHU0eC+wJ9nqlBITSfI4E9vKny9t8T2WxN8OBR9khm6jJ+3t8o0U3lhMbi5tGiVyMUBlkfsDJx2UXKKMfq8sdX4Z6NRQADSziDhUr3wX/5qEXkLo305I7+SxYqUs5tiM2EVZtZZQdMgNbt8UOfeUQaCBS09DZxETX4mgC8QrEFaUEi8pMg15HaX136u6ES7vYLctFqHveJXmp7fmuH+vfJcqNHFB+x5TqrrBi14Q3V0IA01FLPQ4Ec8XqNfyYw1wFiN7ktmHui5huEiLA/WhtlTkZ+ln68XoVDOf89lyyBZbj3wagYMbt4cBiETPhdkxeM0IVr7UnLWRUGbCthrpYvogxVUofdIvfJUhmKlysu1koNDwgzfr+NzLGqXses9OPNo2kLUacaiAC7O8h/Yfc/y1sCKqBhd/RSgSXrWl5oJIbrrexOLNcKcDUMgEgp/WTvpjeIOl1buQQkQLvO9+EcRwbaLFd/3XtJoqCZp8izUeL0E7sm5AgzGN/44ikF5tm49RJ3ZPxspg019BNA6CZBatbxL3NnWHD5KkBR9/JdPuS3UwaC6fpK+XWcwjwmdPCX0iMDx/FCVILho6V3YErW7QWU+yplu8Rb38//y60rSTBWXFcdxTOa6CViOANsJSPblI9uQbXfwxOnHi219L8tJEvEq+P1kr4C0iiTnXuAsQkpSKJ/wMAs0+sx4lDuwzpFjAjWCB/brgbllXuQ7mvv8E57J5aq6BKWXRU3CrLhalzenycdHuwAg92sTSdihMDLTvrXCBmqs7YtcBFmmkBH3AByJmCPl4ZZOw3qqY4Mb8Cf26PIYBzvr2CgKB73jwPzZOauBDc5dtLqtUp8Ci/obg2+Bt0CBqwpg9nhOtspMRghvGtPWv8meO4H3PC8QJDw+ChHDq4wsQgcIIYgpESwT1r1e0PWoBLROKAZevVmw/dPPO2sAppOLHMcMsIMhW9nwBEFxPpyPYzPLscOEQD1YzIKdg7uBoEQ4uMdHlQGZX5lf2twcXa1VSi1+QL76NDntIv9QJlAlVjJYSKAeZylhhl9wMgOBvaGquk4B56jHBSC8WFYfUw0QWvauA9uh13rvuSyv1NLVYRNMBxwbjJFFlnqjkLgnmxoRUEuzjn9NoWaTOk084adq7JIcujyWfwONKhcdAe4aQvmPbrf+FJ5L0iE/EZa1yY3Akk3pqmFftOK5j8VYo3x9yv589vvTrObDGR1Ymt8e384PGFXngFnor1KjS74Ippad6Tfm9O5QdSlzfSp7xay X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR10MB8218.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: e6a85d14-a196-4700-04cd-08dd68607f42 X-MS-Exchange-CrossTenant-AuthSource: DM4PR10MB8218.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2025 10:09:41.8540 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: glN+/i/X1cuuRUVm5Ko5oKHZyFe6vZ1kOdafwdUmn4m+I2/l991gARJwAh7y8GCLqMSKkeTyZpDwmw8oHnTT+HiT6nvV951BSIjDEckQ5po= X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW5PR10MB5850 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1093,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-21_04,2025-03-20_01,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 malwarescore=0 mlxlogscore=999 suspectscore=0 spamscore=0 bulkscore=0 mlxscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502280000 definitions=main-2503210075 X-Proofpoint-ORIG-GUID: WGPCNJUISooEdO4sFJ9QDQ4aoNEDu9to X-Proofpoint-GUID: WGPCNJUISooEdO4sFJ9QDQ4aoNEDu9to X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 8E8E680004 X-Stat-Signature: 1y3s5tydnu8xjrhhhtautiu531rm3ear X-Rspam-User: X-HE-Tag: 1742551790-516842 X-HE-Meta: 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 G21g9i83 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Currently, if a VMA merge fails due to an OOM condition arising on commit merge or a failure to duplicate anon_vma's, we report this so the caller can handle it. However there are cases where the caller is only ostensibly trying a merge, and doesn't mind if it fails due to this condition. Since we do not want to introduce an implicit assumption that we only actually modify VMAs after OOM conditions might arise, add a 'give up on oom' option and make an explicit contract that, should this flag be set, we absolutely will not modify any VMAs should OOM arise and just bail out. Since it'd be very unusual for a user to try to vma_modify() with this flag set but be specifying a range within a VMA which ends up being split (which can fail due to rlimit issues, not only OOM), we add a debug warning for this condition. The motivating reason for this is uffd release - syzkaller (and Pedro Falcato's VERY astute analysis) found a way in which an injected fault on allocation, triggering an OOM condition on commit merge, would result in uffd code becoming confused and treating an error value as if it were a VMA pointer. To avoid this, we make use of this new VMG flag to ensure that this never occurs, utilising the fact that, should we be clearing entire VMAs, we do not wish an OOM event to be reported to us. Many thanks to Pedro Falcato for his excellent analysis and Jann Horn for his insightful and intelligent analysis of the situation, both of whom were instrumental in this fix. Reported-by: syzbot+20ed41006cf9d842c2b5@syzkaller.appspotmail.com Closes: https://lore.kernel.org/all/67dc67f0.050a0220.25ae54.001e.GAE@google.com/ Fixes: 47b16d0462a4 ("mm: abort vma_modify() on merge out of memory failure") Suggested-by: Pedro Falcato Suggested-by: Jann Horn Signed-off-by: Lorenzo Stoakes --- mm/userfaultfd.c | 13 ++++++++++-- mm/vma.c | 51 ++++++++++++++++++++++++++++++++++++++++++++---- mm/vma.h | 9 ++++++++- 3 files changed, 66 insertions(+), 7 deletions(-) -- 2.48.1 diff --git a/mm/userfaultfd.c b/mm/userfaultfd.c index fbf2cf62ab9f..7d5d709cc838 100644 --- a/mm/userfaultfd.c +++ b/mm/userfaultfd.c @@ -1902,6 +1902,14 @@ struct vm_area_struct *userfaultfd_clear_vma(struct vma_iterator *vmi, unsigned long end) { struct vm_area_struct *ret; + bool give_up_on_oom = false; + + /* + * If we are modifying only and not splitting, just give up on the merge + * if OOM prevents us from merging successfully. + */ + if (start == vma->vm_start && end == vma->vm_end) + give_up_on_oom = true; /* Reset ptes for the whole vma range if wr-protected */ if (userfaultfd_wp(vma)) @@ -1909,7 +1917,7 @@ struct vm_area_struct *userfaultfd_clear_vma(struct vma_iterator *vmi, ret = vma_modify_flags_uffd(vmi, prev, vma, start, end, vma->vm_flags & ~__VM_UFFD_FLAGS, - NULL_VM_UFFD_CTX); + NULL_VM_UFFD_CTX, give_up_on_oom); /* * In the vma_merge() successful mprotect-like case 8: @@ -1960,7 +1968,8 @@ int userfaultfd_register_range(struct userfaultfd_ctx *ctx, new_flags = (vma->vm_flags & ~__VM_UFFD_FLAGS) | vm_flags; vma = vma_modify_flags_uffd(&vmi, prev, vma, start, vma_end, new_flags, - (struct vm_userfaultfd_ctx){ctx}); + (struct vm_userfaultfd_ctx){ctx}, + /* give_up_on_oom = */false); if (IS_ERR(vma)) return PTR_ERR(vma); diff --git a/mm/vma.c b/mm/vma.c index 5cdc5612bfc1..839d12f02c88 100644 --- a/mm/vma.c +++ b/mm/vma.c @@ -666,6 +666,9 @@ static void vmg_adjust_set_range(struct vma_merge_struct *vmg) /* * Actually perform the VMA merge operation. * + * IMPORTANT: We guarantee that, should vmg->give_up_on_oom is set, to not + * modify any VMAs or cause inconsistent state should an OOM condition arise. + * * Returns 0 on success, or an error value on failure. */ static int commit_merge(struct vma_merge_struct *vmg) @@ -685,6 +688,12 @@ static int commit_merge(struct vma_merge_struct *vmg) init_multi_vma_prep(&vp, vma, vmg); + /* + * If vmg->give_up_on_oom is set, we're safe, because we don't actually + * manipulate any VMAs until we succeed at preallocation. + * + * Past this point, we will not return an error. + */ if (vma_iter_prealloc(vmg->vmi, vma)) return -ENOMEM; @@ -915,7 +924,13 @@ static __must_check struct vm_area_struct *vma_merge_existing_range( if (anon_dup) unlink_anon_vmas(anon_dup); - vmg->state = VMA_MERGE_ERROR_NOMEM; + /* + * We've cleaned up any cloned anon_vma's, no VMAs have been + * modified, no harm no foul if the user requests that we not + * report this and just give up, leaving the VMAs unmerged. + */ + if (!vmg->give_up_on_oom) + vmg->state = VMA_MERGE_ERROR_NOMEM; return NULL; } @@ -926,7 +941,15 @@ static __must_check struct vm_area_struct *vma_merge_existing_range( abort: vma_iter_set(vmg->vmi, start); vma_iter_load(vmg->vmi); - vmg->state = VMA_MERGE_ERROR_NOMEM; + + /* + * This means we have failed to clone anon_vma's correctly, but no + * actual changes to VMAs have occurred, so no harm no foul - if the + * user doesn't want this reported and instead just wants to give up on + * the merge, allow it. + */ + if (!vmg->give_up_on_oom) + vmg->state = VMA_MERGE_ERROR_NOMEM; return NULL; } @@ -1068,6 +1091,10 @@ int vma_expand(struct vma_merge_struct *vmg) /* This should already have been checked by this point. */ VM_WARN_ON_VMG(!can_merge_remove_vma(next), vmg); vma_start_write(next); + /* + * In this case we don't report OOM, so vmg->give_up_on_mm is + * safe. + */ ret = dup_anon_vma(middle, next, &anon_dup); if (ret) return ret; @@ -1090,9 +1117,15 @@ int vma_expand(struct vma_merge_struct *vmg) return 0; nomem: - vmg->state = VMA_MERGE_ERROR_NOMEM; if (anon_dup) unlink_anon_vmas(anon_dup); + /* + * If the user requests that we just give upon OOM, we are safe to do so + * here, as commit merge provides this contract to us. Nothing has been + * changed - no harm no foul, just don't report it. + */ + if (!vmg->give_up_on_oom) + vmg->state = VMA_MERGE_ERROR_NOMEM; return -ENOMEM; } @@ -1534,6 +1567,13 @@ static struct vm_area_struct *vma_modify(struct vma_merge_struct *vmg) if (vmg_nomem(vmg)) return ERR_PTR(-ENOMEM); + /* + * Split can fail for reasons other than OOM, so if the user requests + * this it's probably a mistake. + */ + VM_WARN_ON(vmg->give_up_on_oom && + (vma->vm_start != start || vma->vm_end != end)); + /* Split any preceding portion of the VMA. */ if (vma->vm_start < start) { int err = split_vma(vmg->vmi, vma, start, 1); @@ -1602,12 +1642,15 @@ struct vm_area_struct struct vm_area_struct *vma, unsigned long start, unsigned long end, unsigned long new_flags, - struct vm_userfaultfd_ctx new_ctx) + struct vm_userfaultfd_ctx new_ctx, + bool give_up_on_oom) { VMG_VMA_STATE(vmg, vmi, prev, vma, start, end); vmg.flags = new_flags; vmg.uffd_ctx = new_ctx; + if (give_up_on_oom) + vmg.give_up_on_oom = true; return vma_modify(&vmg); } diff --git a/mm/vma.h b/mm/vma.h index 7356ca5a22d3..149926e8a6d1 100644 --- a/mm/vma.h +++ b/mm/vma.h @@ -114,6 +114,12 @@ struct vma_merge_struct { */ bool just_expand :1; + /* + * If a merge is possible, but an OOM error occurs, give up and don't + * execute the merge, returning NULL. + */ + bool give_up_on_oom :1; + /* Internal flags set during merge process: */ /* @@ -255,7 +261,8 @@ __must_check struct vm_area_struct struct vm_area_struct *vma, unsigned long start, unsigned long end, unsigned long new_flags, - struct vm_userfaultfd_ctx new_ctx); + struct vm_userfaultfd_ctx new_ctx, + bool give_up_on_oom); __must_check struct vm_area_struct *vma_merge_new_range(struct vma_merge_struct *vmg);