Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3144164imu; Mon, 19 Nov 2018 11:18:23 -0800 (PST) X-Google-Smtp-Source: AJdET5cRmzSEYJOO0jTwDLjxbFVNR+/PJBcmqjN13r5rkJbK84PVqMBhAq8L9PdjDNxmbBoWpG7D X-Received: by 2002:a63:d70e:: with SMTP id d14mr21312063pgg.159.1542655103214; Mon, 19 Nov 2018 11:18:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542655103; cv=none; d=google.com; s=arc-20160816; b=hvBt/VvUANtNdowtxDm20Af66ZqpA3ztqz/vgzCqm+M9ejm8vb5w9Sen1A8bLWGNNf XfMGK7iimC/lKMqVAvPLKnSNEWQYZr9K/5+3Wk8yMrF/PtsAjyFvs0q2DKfv6V6Wlc1x 86AeSJQqMyD8/yspvNNHXGTwvkJ4WwjBjVa2+EIPLJJnizCrzVsgvAQSq2SuYKsbLy60 egqhTmgzL+I1m4onIiTjwRPmSuWL05Kg0/H1ETGTYYX7+NhYKqNEH7McEUlyHA9s5I/f STEKHQXBX8f5P6JDpeEHGgZ5MqbIm6uU4juLq2eeYNym5jPymWh6Gd6nVC5T721uGdfb v0Ug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=tS3EkME5MAC8RWeQqrtPhuMBD4hO/kH8gy3TBt2igwY=; b=judR28dc8cwCDHLx/OkIhG516sjzNJ4AeMsTd1SMK9LG61T4u7BvypvAdXAIwY4SO+ ZY6uqFYrg39uBlHxPyLEvAQnPws1W3HACtdIdSeqQziTESatmSIdMoN8ZH5HsAVPTOj0 mR61C2Z95/m0mlSIfC5jVIKPWvJWXhUjOX51UhmHS644cTaIp6KkDSMZ9Oe+Dkf+g1RL zGTzI1R6l3aKknSPF5fWR9+/NZRgDUWTtdK57CGSJAJA6+2TA1DfneJqf34Nc/52LyNP AMDV8NEFkSCuQaBY+VIx0fG0YEaqR7MCyuLr2usTcbmbRJ0dx+kaIau2BcQghGvE6Clr fjNA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c2-v6si41605690plb.123.2018.11.19.11.18.07; Mon, 19 Nov 2018 11:18:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730387AbeKTFm2 (ORCPT + 99 others); Tue, 20 Nov 2018 00:42:28 -0500 Received: from mx1.redhat.com ([209.132.183.28]:36108 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726347AbeKTFm2 (ORCPT ); Tue, 20 Nov 2018 00:42:28 -0500 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 8FAEC309EFF4; Mon, 19 Nov 2018 19:17:27 +0000 (UTC) Received: from redhat.com (ovpn-124-1.rdu2.redhat.com [10.10.124.1]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 7136BBAAC; Mon, 19 Nov 2018 19:17:23 +0000 (UTC) Date: Mon, 19 Nov 2018 14:17:21 -0500 From: Jerome Glisse To: Jason Gunthorpe Cc: Leon Romanovsky , Kenneth Lee , Tim Sell , linux-doc@vger.kernel.org, Alexander Shishkin , Zaibo Xu , zhangfei.gao@foxmail.com, linuxarm@huawei.com, haojian.zhuang@linaro.org, Christoph Lameter , Hao Fang , Gavin Schenk , RDMA mailing list , Zhou Wang , Doug Ledford , Uwe =?iso-8859-1?Q?Kleine-K=F6nig?= , David Kershner , Kenneth Lee , Johan Hovold , Cyrille Pitchen , Sagar Dharia , Jens Axboe , guodong.xu@linaro.org, linux-netdev , Randy Dunlap , linux-kernel@vger.kernel.org, Vinod Koul , linux-crypto@vger.kernel.org, Philippe Ombredanne , Sanyog Kale , "David S. Miller" , linux-accelerators@lists.ozlabs.org Subject: Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce Message-ID: <20181119191721.GC4593@redhat.com> References: <20181114160017.GI3759@mtr-leonro.mtl.com> <20181115085109.GD157308@Turing-Arch-b> <20181115145455.GN3759@mtr-leonro.mtl.com> <20181119091405.GE157308@Turing-Arch-b> <20181119091910.GF157308@Turing-Arch-b> <20181119104801.GF8268@mtr-leonro.mtl.com> <20181119164853.GA4593@redhat.com> <20181119182752.GA4890@ziepe.ca> <20181119184215.GB4593@redhat.com> <20181119185333.GC4890@ziepe.ca> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20181119185333.GC4890@ziepe.ca> User-Agent: Mutt/1.10.1 (2018-07-13) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.41]); Mon, 19 Nov 2018 19:17:28 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Nov 19, 2018 at 11:53:33AM -0700, Jason Gunthorpe wrote: > On Mon, Nov 19, 2018 at 01:42:16PM -0500, Jerome Glisse wrote: > > On Mon, Nov 19, 2018 at 11:27:52AM -0700, Jason Gunthorpe wrote: > > > On Mon, Nov 19, 2018 at 11:48:54AM -0500, Jerome Glisse wrote: > > > > > > > Just to comment on this, any infiniband driver which use umem and do > > > > not have ODP (here ODP for me means listening to mmu notifier so all > > > > infiniband driver except mlx5) will be affected by same issue AFAICT. > > > > > > > > AFAICT there is no special thing happening after fork() inside any of > > > > those driver. So if parent create a umem mr before fork() and program > > > > hardware with it then after fork() the parent might start using new > > > > page for the umem range while the old memory is use by the child. The > > > > reverse is also true (parent using old memory and child new memory) > > > > bottom line you can not predict which memory the child or the parent > > > > will use for the range after fork(). > > > > > > > > So no matter what you consider the child or the parent, what the hw > > > > will use for the mr is unlikely to match what the CPU use for the > > > > same virtual address. In other word: > > > > > > > > Before fork: > > > > CPU parent: virtual addr ptr1 -> physical address = 0xCAFE > > > > HARDWARE: virtual addr ptr1 -> physical address = 0xCAFE > > > > > > > > Case 1: > > > > CPU parent: virtual addr ptr1 -> physical address = 0xCAFE > > > > CPU child: virtual addr ptr1 -> physical address = 0xDEAD > > > > HARDWARE: virtual addr ptr1 -> physical address = 0xCAFE > > > > > > > > Case 2: > > > > CPU parent: virtual addr ptr1 -> physical address = 0xBEEF > > > > CPU child: virtual addr ptr1 -> physical address = 0xCAFE > > > > HARDWARE: virtual addr ptr1 -> physical address = 0xCAFE > > > > > > IIRC this is solved in IB by automatically calling > > > madvise(MADV_DONTFORK) before creating the MR. > > > > > > MADV_DONTFORK > > > .. This is useful to prevent copy-on-write semantics from changing the > > > physical location of a page if the parent writes to it after a > > > fork(2) .. > > > > This would work around the issue but this is not transparent ie > > range marked with DONTFORK no longer behave as expected from the > > application point of view. > > Do you know what the difference is? The man page really gives no > hint.. > > Does it sometimes unmap the pages during fork? It is handled in kernel/fork.c look for DONTCOPY, basicaly it just leave empty page table in the child process so child will have to fault in new page. This also means that child will get 0 as initial value for all memory address under DONTCOPY/DONTFORK which breaks application expectation of what fork() do. > > I actually wonder if the kernel is a bit broken here, we have the same > problem with O_DIRECT and other stuff, right? No it is not, O_DIRECT is fine. The only corner case i can think of with O_DIRECT is one thread launching an O_DIRECT that write to private anonymous memory (other O_DIRECT case do not matter) while another thread call fork() then what the child get can be undefined ie either it get the data before the O_DIRECT finish or it gets the result of the O_DIRECT. But this is realy what you should expect when doing such thing without synchronization. So O_DIRECT is fine. > > Really, if I have a get_user_pages FOLL_WRITE on a page and we fork, > then shouldn't the COW immediately be broken during the fork? > > The kernel can't guarentee that an ongoing DMA will not write to those > pages, and it breaks the fork semantic to write to both processes. Fixing that would incur a high cost: need to grow struct page, need to copy potentialy gigabyte of memory during fork() ... this would be a serious performance regression for many folks just to work around an abuse of device driver. So i don't think anything on that front would be welcome. umem without proper ODP and VFIO are the only bad user i know of (for VFIO you can argue that it is part of the API contract and thus that it is not an abuse but it is not spell out loud in documentation). I have been trying to push back on any people trying to push thing that would make the same mistake or at least making sure they understand what is happening. What really need to happen is people fixing their hardware and do the right thing (good software engineer versus evil hardware engineer ;)) Cheers, J?r?me