Received: by 10.213.65.68 with SMTP id h4csp1174313imn; Sat, 7 Apr 2018 20:13:56 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+FEJCITGGrU/zBWbtJS/NfRfnDrr5ZcbE4sQuZAs7Z+dMTm2ZeKf0tVamUomD6+88CAWFr X-Received: by 2002:a17:902:7b96:: with SMTP id w22-v6mr31665738pll.116.1523157236798; Sat, 07 Apr 2018 20:13:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523157236; cv=none; d=google.com; s=arc-20160816; b=glWc66kjnRpGh+rmqZxiQdpDyltiQwgTbDNbhdPQaU5ya3wmIUauIMci6V6X9LGLPO Ijru0hq9e7XsKtmy9b4yZAPda0p7dV56DsU+A5iq+Nv+SYY2LZ5efuSc/ehZeXx2xeSq kJEHTYJkHsFceW9kKeoTXsqagnJl+mKV+WUwhraDI43RED7+8/pKGrTQwOyQrAqQFpJZ Eh7sFcsHq82fZiwdYVzUQ9h+56OjlA4Zp9QjRTlZVfa4GWVA1gMedajk/Y4ChSnI4oo5 9r4IMzb4ef0njBFEW4AxrRO7JOEscqZwAtJkmbKRu+1om4LrGx5NwULVEjARaGuM9D2W e7Zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:subject:cc:to :from:date:arc-authentication-results; bh=brRBQu2mx8igWn43hpQxPmoK6mVnyFBnuExT0Vubpsk=; b=Hb9AIPh0kc9hoeiF4llSXRFlyipT95Y+SDPZ/2XtJE8goDu65gsk/ZSAWZdiycEOcU n5xzaKx+LDmkHZyyMatvj5dUF9pCjt8YCcqhw/dKua5Ng9mHAZS3YrU+vrO23eWKhxZJ X9UvQ2FJBO+tTvwhbrzsDx3GNxvlEBG2GHjKSBn1tNBzmrgcHIkmIJMEZ+pl9S3oqOPh ax37bJvJ3ArGYT/VXwPY/Li7zKnx/yWXIW805t4t6hbOa4RVFmZB0STiu4LejsPat2nQ bcEtj7ebcBziw1tVtGRxusZybEpXEMYAUZumqYeZl+BPS+8/u3BgM26o7uPAeh71tvbk REsg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u8si9253673pgp.94.2018.04.07.20.13.19; Sat, 07 Apr 2018 20:13:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752759AbeDHDK2 (ORCPT + 99 others); Sat, 7 Apr 2018 23:10:28 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:48488 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752466AbeDHDK0 (ORCPT ); Sat, 7 Apr 2018 23:10:26 -0400 Received: from pps.filterd (m0098409.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w38398OJ022695 for ; Sat, 7 Apr 2018 23:10:26 -0400 Received: from e13.ny.us.ibm.com (e13.ny.us.ibm.com [129.33.205.203]) by mx0a-001b2d01.pphosted.com with ESMTP id 2h6sa7bsm1-1 (version=TLSv1.2 cipher=AES256-SHA256 bits=256 verify=NOT) for ; Sat, 07 Apr 2018 23:10:20 -0400 Received: from localhost by e13.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Sat, 7 Apr 2018 23:10:18 -0400 Received: from b01cxnp22035.gho.pok.ibm.com (9.57.198.25) by e13.ny.us.ibm.com (146.89.104.200) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Sat, 7 Apr 2018 23:10:13 -0400 Received: from b01ledav003.gho.pok.ibm.com (b01ledav003.gho.pok.ibm.com [9.57.199.108]) by b01cxnp22035.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w383ACSC55115836; Sun, 8 Apr 2018 03:10:12 GMT Received: from b01ledav003.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 23D56B2046; Sun, 8 Apr 2018 00:12:19 -0400 (EDT) Received: from paulmck-ThinkPad-W541 (unknown [9.80.213.214]) by b01ledav003.gho.pok.ibm.com (Postfix) with ESMTP id C9B29B2050; Sun, 8 Apr 2018 00:12:18 -0400 (EDT) Received: by paulmck-ThinkPad-W541 (Postfix, from userid 1000) id D9E5516C2AAC; Sat, 7 Apr 2018 20:11:13 -0700 (PDT) Date: Sat, 7 Apr 2018 20:11:13 -0700 From: "Paul E. McKenney" To: Dan Williams Cc: Jan Kara , linux-nvdimm , Jeff Moyer , Dave Chinner , Matthew Wilcox , Alexander Viro , "Darrick J. Wong" , Ross Zwisler , Dave Hansen , Andrew Morton , Christoph Hellwig , linux-fsdevel , linux-xfs , Linux Kernel Mailing List , Mike Snitzer , Josh Triplett Subject: Re: [PATCH v8 15/18] mm, fs, dax: handle layout changes to pinned dax mappings Reply-To: paulmck@linux.vnet.ibm.com References: <152246892890.36038.18436540150980653229.stgit@dwillia2-desk3.amr.corp.intel.com> <152246901060.36038.4487158506830998280.stgit@dwillia2-desk3.amr.corp.intel.com> <20180404094656.dssixqvvdcp5jff2@quack2.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) X-TM-AS-GCONF: 00 x-cbid: 18040803-0008-0000-0000-000002F2BDD4 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00008816; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000256; SDB=6.01014707; UDB=6.00517332; IPR=6.00793962; MB=3.00020464; MTD=3.00000008; XFM=3.00000015; UTC=2018-04-08 03:10:17 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18040803-0009-0000-0000-000038D21EDE Message-Id: <20180408031113.GO3948@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-04-07_11:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 malwarescore=0 lowpriorityscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1804080033 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Apr 07, 2018 at 12:38:24PM -0700, Dan Williams wrote: > [ adding Paul and Josh ] > > On Wed, Apr 4, 2018 at 2:46 AM, Jan Kara wrote: > > On Fri 30-03-18 21:03:30, Dan Williams wrote: > >> Background: > >> > >> get_user_pages() in the filesystem pins file backed memory pages for > >> access by devices performing dma. However, it only pins the memory pages > >> not the page-to-file offset association. If a file is truncated the > >> pages are mapped out of the file and dma may continue indefinitely into > >> a page that is owned by a device driver. This breaks coherency of the > >> file vs dma, but the assumption is that if userspace wants the > >> file-space truncated it does not matter what data is inbound from the > >> device, it is not relevant anymore. The only expectation is that dma can > >> safely continue while the filesystem reallocates the block(s). > >> > >> Problem: > >> > >> This expectation that dma can safely continue while the filesystem > >> changes the block map is broken by dax. With dax the target dma page > >> *is* the filesystem block. The model of leaving the page pinned for dma, > >> but truncating the file block out of the file, means that the filesytem > >> is free to reallocate a block under active dma to another file and now > >> the expected data-incoherency situation has turned into active > >> data-corruption. > >> > >> Solution: > >> > >> Defer all filesystem operations (fallocate(), truncate()) on a dax mode > >> file while any page/block in the file is under active dma. This solution > >> assumes that dma is transient. Cases where dma operations are known to > >> not be transient, like RDMA, have been explicitly disabled via > >> commits like 5f1d43de5416 "IB/core: disable memory registration of > >> filesystem-dax vmas". > >> > >> The dax_layout_busy_page() routine is called by filesystems with a lock > >> held against mm faults (i_mmap_lock) to find pinned / busy dax pages. > >> The process of looking up a busy page invalidates all mappings > >> to trigger any subsequent get_user_pages() to block on i_mmap_lock. > >> The filesystem continues to call dax_layout_busy_page() until it finally > >> returns no more active pages. This approach assumes that the page > >> pinning is transient, if that assumption is violated the system would > >> have likely hung from the uncompleted I/O. > >> > >> Cc: Jan Kara > >> Cc: Jeff Moyer > >> Cc: Dave Chinner > >> Cc: Matthew Wilcox > >> Cc: Alexander Viro > >> Cc: "Darrick J. Wong" > >> Cc: Ross Zwisler > >> Cc: Dave Hansen > >> Cc: Andrew Morton > >> Reported-by: Christoph Hellwig > >> Reviewed-by: Christoph Hellwig > >> Signed-off-by: Dan Williams > >> --- > >> drivers/dax/super.c | 2 + > >> fs/dax.c | 92 +++++++++++++++++++++++++++++++++++++++++++++++++++ > >> include/linux/dax.h | 25 ++++++++++++++ > >> mm/gup.c | 5 +++ > >> 4 files changed, 123 insertions(+), 1 deletion(-) > > > > ... > > > >> +/** > >> + * dax_layout_busy_page - find first pinned page in @mapping > >> + * @mapping: address space to scan for a page with ref count > 1 > >> + * > >> + * DAX requires ZONE_DEVICE mapped pages. These pages are never > >> + * 'onlined' to the page allocator so they are considered idle when > >> + * page->count == 1. A filesystem uses this interface to determine if > >> + * any page in the mapping is busy, i.e. for DMA, or other > >> + * get_user_pages() usages. > >> + * > >> + * It is expected that the filesystem is holding locks to block the > >> + * establishment of new mappings in this address_space. I.e. it expects > >> + * to be able to run unmap_mapping_range() and subsequently not race > >> + * mapping_mapped() becoming true. It expects that get_user_pages() pte > >> + * walks are performed under rcu_read_lock(). > >> + */ > >> +struct page *dax_layout_busy_page(struct address_space *mapping) > >> +{ > >> + pgoff_t indices[PAGEVEC_SIZE]; > >> + struct page *page = NULL; > >> + struct pagevec pvec; > >> + pgoff_t index, end; > >> + unsigned i; > >> + > >> + /* > >> + * In the 'limited' case get_user_pages() for dax is disabled. > >> + */ > >> + if (IS_ENABLED(CONFIG_FS_DAX_LIMITED)) > >> + return NULL; > >> + > >> + if (!dax_mapping(mapping) || !mapping_mapped(mapping)) > >> + return NULL; > >> + > >> + pagevec_init(&pvec); > >> + index = 0; > >> + end = -1; > >> + /* > >> + * Flush dax_layout_lock() sections to ensure all possible page > >> + * references have been taken, or otherwise arrange for faults > >> + * to block on the filesystem lock that is taken for > >> + * establishing new mappings. > >> + */ > >> + unmap_mapping_range(mapping, 0, 0, 1); > >> + synchronize_rcu(); > > > > So I still don't like the use of RCU for this. It just seems as an abuse to > > use RCU like that. Furthermore it has a hefty latency cost for the truncate > > path. A trivial test to truncate 100 times the last page of a 16k file that > > is mmaped (only the first page): > > > > DAX+your patches 3.899s > > non-DAX 0.015s > > > > So you can see synchronize_rcu() increased time to run truncate(2) more > > than 200 times (the process is indeed sitting in __wait_rcu_gp all the > > time). IMHO that's just too costly. > > I wonder if this can be trivially solved by using srcu. I.e. we don't > need to wait for a global quiescent state, just a > get_user_pages_fast() quiescent state. ...or is that an abuse of the > srcu api? From what I can see (not that I claim to understand DAX), SRCU is worth trying. Another thing to try (as a test) is to replace the synchronize_rcu() above with synchronize_rcu_expedited(), which might get you an order of magnitude or thereabouts. Thanx, Paul