Received: by 10.213.65.68 with SMTP id h4csp2845996imn; Mon, 9 Apr 2018 09:57:24 -0700 (PDT) X-Google-Smtp-Source: AIpwx48qOlX8WYm3XWkzOnWJnb1ubDmwXoeUQZ674ZY063PZOn0Yyv/ELgVmQMKWTzDkzNoZG8j4 X-Received: by 2002:a17:902:a5c9:: with SMTP id t9-v6mr39644846plq.265.1523293044827; Mon, 09 Apr 2018 09:57:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523293044; cv=none; d=google.com; s=arc-20160816; b=Orcsbvdw6LEUhXRQUGLVW8eC4JDokwblUOcGJdRsEION/kzyOE62s9uA6qQOF0j6Nj Ci2j38ph6vnuPYeAh+jeSrIiXILSwKRX5iQ2TeFq75AcsXNIimJS0+IRfABsNgMPPIMV zhJkr26LJUSk9yocnEUnZgO/rXyMUXliH/HFbsi4MzWIGY0iHyHEE51c7Jtr5ClEAJH/ TCLxtvitC0g/BVHGbTYZhjTeXK29vqxQ+6G6Z6Wl3WGRvSor0OV6cqjda/YQVSHoaG7V FXdE7vuMpsUeMNbmxbJxsm2EfLHAXfkH3V30Ps6fTIMiEj4oNxqX1fto5tvTUcqgXixT qbnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=b2Z0zPGmV+hFR3zxqFP+pGo4EyhRM7Eg2h2EbxYxQaU=; b=ne59E5GF5qKCqFtwbxq7EmvUc5LQoNqJMEL0qrJnT1fT6ltq4+FQowzkv8FQOhDFyQ fFExhhjQXM6JhpJOx37aVA3ydBRo4nPuQ8Ak4RTdsRd5K7Qhx9jyiRnTQHzBxvg+Nrup gd9aQIYiLmw0okfZzt3YmXVAL7bK7Dutlh4NJ34aVe5+w5891DYo0nhbhGamGmxdsb6W qZk+XbloQkpikjiEM1ofL049aUKn8tWSG8Sg/o1dif5nlZBWn2ClkiGAL+Nxz7biIRJt 054kLp5MCkYTvSlVH1E1+P5vu4w4UP/rHTyCffNVjfp+sa51SDsN8/luBbcZ+uWoqf4B 2aVw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u75si516233pfd.183.2018.04.09.09.56.47; Mon, 09 Apr 2018 09:57:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753522AbeDIQtu (ORCPT + 99 others); Mon, 9 Apr 2018 12:49:50 -0400 Received: from mx2.suse.de ([195.135.220.15]:32831 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752163AbeDIQts (ORCPT ); Mon, 9 Apr 2018 12:49:48 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 66142AF44; Mon, 9 Apr 2018 16:49:46 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id BBF8E1E09FD; Mon, 9 Apr 2018 18:49:44 +0200 (CEST) Date: Mon, 9 Apr 2018 18:49:44 +0200 From: Jan Kara To: Dan Williams Cc: Jan Kara , linux-nvdimm , Jeff Moyer , Dave Chinner , Matthew Wilcox , Alexander Viro , "Darrick J. Wong" , Ross Zwisler , Dave Hansen , Andrew Morton , Christoph Hellwig , linux-fsdevel , linux-xfs , Linux Kernel Mailing List , Mike Snitzer , Paul McKenney , Josh Triplett Subject: Re: [PATCH v8 15/18] mm, fs, dax: handle layout changes to pinned dax mappings Message-ID: <20180409164944.6u7i4wgbp6yihvin@quack2.suse.cz> References: <152246892890.36038.18436540150980653229.stgit@dwillia2-desk3.amr.corp.intel.com> <152246901060.36038.4487158506830998280.stgit@dwillia2-desk3.amr.corp.intel.com> <20180404094656.dssixqvvdcp5jff2@quack2.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat 07-04-18 12:38:24, Dan Williams wrote: > [ adding Paul and Josh ] > > On Wed, Apr 4, 2018 at 2:46 AM, Jan Kara wrote: > > On Fri 30-03-18 21:03:30, Dan Williams wrote: > >> Background: > >> > >> get_user_pages() in the filesystem pins file backed memory pages for > >> access by devices performing dma. However, it only pins the memory pages > >> not the page-to-file offset association. If a file is truncated the > >> pages are mapped out of the file and dma may continue indefinitely into > >> a page that is owned by a device driver. This breaks coherency of the > >> file vs dma, but the assumption is that if userspace wants the > >> file-space truncated it does not matter what data is inbound from the > >> device, it is not relevant anymore. The only expectation is that dma can > >> safely continue while the filesystem reallocates the block(s). > >> > >> Problem: > >> > >> This expectation that dma can safely continue while the filesystem > >> changes the block map is broken by dax. With dax the target dma page > >> *is* the filesystem block. The model of leaving the page pinned for dma, > >> but truncating the file block out of the file, means that the filesytem > >> is free to reallocate a block under active dma to another file and now > >> the expected data-incoherency situation has turned into active > >> data-corruption. > >> > >> Solution: > >> > >> Defer all filesystem operations (fallocate(), truncate()) on a dax mode > >> file while any page/block in the file is under active dma. This solution > >> assumes that dma is transient. Cases where dma operations are known to > >> not be transient, like RDMA, have been explicitly disabled via > >> commits like 5f1d43de5416 "IB/core: disable memory registration of > >> filesystem-dax vmas". > >> > >> The dax_layout_busy_page() routine is called by filesystems with a lock > >> held against mm faults (i_mmap_lock) to find pinned / busy dax pages. > >> The process of looking up a busy page invalidates all mappings > >> to trigger any subsequent get_user_pages() to block on i_mmap_lock. > >> The filesystem continues to call dax_layout_busy_page() until it finally > >> returns no more active pages. This approach assumes that the page > >> pinning is transient, if that assumption is violated the system would > >> have likely hung from the uncompleted I/O. > >> > >> Cc: Jan Kara > >> Cc: Jeff Moyer > >> Cc: Dave Chinner > >> Cc: Matthew Wilcox > >> Cc: Alexander Viro > >> Cc: "Darrick J. Wong" > >> Cc: Ross Zwisler > >> Cc: Dave Hansen > >> Cc: Andrew Morton > >> Reported-by: Christoph Hellwig > >> Reviewed-by: Christoph Hellwig > >> Signed-off-by: Dan Williams > >> --- > >> drivers/dax/super.c | 2 + > >> fs/dax.c | 92 +++++++++++++++++++++++++++++++++++++++++++++++++++ > >> include/linux/dax.h | 25 ++++++++++++++ > >> mm/gup.c | 5 +++ > >> 4 files changed, 123 insertions(+), 1 deletion(-) > > > > ... > > > >> +/** > >> + * dax_layout_busy_page - find first pinned page in @mapping > >> + * @mapping: address space to scan for a page with ref count > 1 > >> + * > >> + * DAX requires ZONE_DEVICE mapped pages. These pages are never > >> + * 'onlined' to the page allocator so they are considered idle when > >> + * page->count == 1. A filesystem uses this interface to determine if > >> + * any page in the mapping is busy, i.e. for DMA, or other > >> + * get_user_pages() usages. > >> + * > >> + * It is expected that the filesystem is holding locks to block the > >> + * establishment of new mappings in this address_space. I.e. it expects > >> + * to be able to run unmap_mapping_range() and subsequently not race > >> + * mapping_mapped() becoming true. It expects that get_user_pages() pte > >> + * walks are performed under rcu_read_lock(). > >> + */ > >> +struct page *dax_layout_busy_page(struct address_space *mapping) > >> +{ > >> + pgoff_t indices[PAGEVEC_SIZE]; > >> + struct page *page = NULL; > >> + struct pagevec pvec; > >> + pgoff_t index, end; > >> + unsigned i; > >> + > >> + /* > >> + * In the 'limited' case get_user_pages() for dax is disabled. > >> + */ > >> + if (IS_ENABLED(CONFIG_FS_DAX_LIMITED)) > >> + return NULL; > >> + > >> + if (!dax_mapping(mapping) || !mapping_mapped(mapping)) > >> + return NULL; > >> + > >> + pagevec_init(&pvec); > >> + index = 0; > >> + end = -1; > >> + /* > >> + * Flush dax_layout_lock() sections to ensure all possible page > >> + * references have been taken, or otherwise arrange for faults > >> + * to block on the filesystem lock that is taken for > >> + * establishing new mappings. > >> + */ > >> + unmap_mapping_range(mapping, 0, 0, 1); > >> + synchronize_rcu(); > > > > So I still don't like the use of RCU for this. It just seems as an abuse to > > use RCU like that. Furthermore it has a hefty latency cost for the truncate > > path. A trivial test to truncate 100 times the last page of a 16k file that > > is mmaped (only the first page): > > > > DAX+your patches 3.899s > > non-DAX 0.015s > > > > So you can see synchronize_rcu() increased time to run truncate(2) more > > than 200 times (the process is indeed sitting in __wait_rcu_gp all the > > time). IMHO that's just too costly. > > I wonder if this can be trivially solved by using srcu. I.e. we don't > need to wait for a global quiescent state, just a > get_user_pages_fast() quiescent state. ...or is that an abuse of the > srcu api? Well, I'd rather use the percpu rwsemaphore (linux/percpu-rwsem.h) than SRCU. It is a more-or-less standard locking mechanism rather than relying on implementation properties of SRCU which is a data structure protection method. And the overhead of percpu rwsemaphore for your use case should be about the same as that of SRCU. Honza -- Jan Kara SUSE Labs, CR