Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp638565imu; Thu, 3 Jan 2019 04:34:32 -0800 (PST) X-Google-Smtp-Source: ALg8bN7ZHt7pxTQvUxgvsvyG98dlwwDIPP88bokU3u2w6IlVYskKkhm/yyw8O/faWjtxE7YLdVbJ X-Received: by 2002:a63:c10f:: with SMTP id w15mr16773493pgf.199.1546518872108; Thu, 03 Jan 2019 04:34:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546518872; cv=none; d=google.com; s=arc-20160816; b=Xqjlmc1Qw1hJ+afVp1UFjWd/r7BJdec2U8GexbHWxdkwlK1FBv7E7gUwRnJqnYeKc6 eBwW60a5vFdoeUsrchhGuoqzRgmUZPeQMPFRiPH5zsmldfcxNPt60MM0Ci9mmxn1s9wT RWpe5Md/tHJ49HP3zCzqK42TGWWsEbbQb6zP0HcVZzwH0es5xNFtB6r8yJ8b5Xw5KsgP 7wkDsQawae8qC5y147DIBu2dilktpz5HFQB1dwNjn2J+PZ8XyiSxoruFvosrvMTabb5X eSzUEIo9jjsIt+gZT/NteIJ8sHcLV1psq0vFStNvwum1iV8zeS9FKtY2XqxulvPfolMy JyxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=vXKbmOIfFs0hZeCYkn2j3EVI3Y5AHLs5tpCpmU+8MOI=; b=SCkdBTKj1fibcrZWUWG7uQxQoMH6jAjJ0gT0Mbi1Pxw3SApDEGnr5uQtl2pFCdZidn 0nT5TmlJ2XAZsQWUsQqvrMU6/cI4RMOE7Xq99H1wb2O8SU2uVfGaamKjz/PjY8ONA8bJ S7c3kUjg3MGk9GiV3vewT+JLgjzxBJXfK2WXX8SYkj0qRE1VIETMgEjG+I7N9rKjP2yV P/T9f0+cG0nxQd8Em6RPT1uvXyo9xGnilJEt7Hd/VziVdAUm+eUORigrBDj/P903fnwb 8NqsIN4FFQYlCSxlMbqM93+fImQ3AOHSs1EpsX70WEvyfyd8ok4eR4sBlwEFNjaE6sHe HNOQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 13si35550987pld.398.2019.01.03.04.34.16; Thu, 03 Jan 2019 04:34:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730462AbfACJ07 (ORCPT + 99 others); Thu, 3 Jan 2019 04:26:59 -0500 Received: from mx2.suse.de ([195.135.220.15]:43582 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726152AbfACJ07 (ORCPT ); Thu, 3 Jan 2019 04:26:59 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 8B68FACC8; Thu, 3 Jan 2019 09:26:55 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 523F21E1588; Thu, 3 Jan 2019 10:26:54 +0100 (CET) Date: Thu, 3 Jan 2019 10:26:54 +0100 From: Jan Kara To: Jerome Glisse Cc: Jan Kara , John Hubbard , Matthew Wilcox , Dave Chinner , Dan Williams , John Hubbard , Andrew Morton , Linux MM , tom@talpey.com, Al Viro , benve@cisco.com, Christoph Hellwig , Christopher Lameter , "Dalessandro, Dennis" , Doug Ledford , Jason Gunthorpe , Michal Hocko , mike.marciniszyn@intel.com, rcampbell@nvidia.com, Linux Kernel Mailing List , linux-fsdevel Subject: Re: [PATCH 1/2] mm: introduce put_user_page*(), placeholder versions Message-ID: <20190103092654.GA31370@quack2.suse.cz> References: <20181212214641.GB29416@dastard> <20181214154321.GF8896@quack2.suse.cz> <20181216215819.GC10644@dastard> <20181217181148.GA3341@redhat.com> <20181217183443.GO10600@bombadil.infradead.org> <20181218093017.GB18032@quack2.suse.cz> <9f43d124-2386-7bfd-d90b-4d0417f51ccd@nvidia.com> <20181219020723.GD4347@redhat.com> <20181219110856.GA18345@quack2.suse.cz> <20190103015533.GA15619@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20190103015533.GA15619@redhat.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 02-01-19 20:55:33, Jerome Glisse wrote: > On Wed, Dec 19, 2018 at 12:08:56PM +0100, Jan Kara wrote: > > On Tue 18-12-18 21:07:24, Jerome Glisse wrote: > > > On Tue, Dec 18, 2018 at 03:29:34PM -0800, John Hubbard wrote: > > > > OK, so let's take another look at Jerome's _mapcount idea all by itself (using > > > > *only* the tracking pinned pages aspect), given that it is the lightest weight > > > > solution for that. > > > > > > > > So as I understand it, this would use page->_mapcount to store both the real > > > > mapcount, and the dma pinned count (simply added together), but only do so for > > > > file-backed (non-anonymous) pages: > > > > > > > > > > > > __get_user_pages() > > > > { > > > > ... > > > > get_page(page); > > > > > > > > if (!PageAnon) > > > > atomic_inc(page->_mapcount); > > > > ... > > > > } > > > > > > > > put_user_page(struct page *page) > > > > { > > > > ... > > > > if (!PageAnon) > > > > atomic_dec(&page->_mapcount); > > > > > > > > put_page(page); > > > > ... > > > > } > > > > > > > > ...and then in the various consumers of the DMA pinned count, we use page_mapped(page) > > > > to see if any mapcount remains, and if so, we treat it as DMA pinned. Is that what you > > > > had in mind? > > > > > > Mostly, with the extra two observations: > > > [1] We only need to know the pin count when a write back kicks in > > > [2] We need to protect GUP code with wait_for_write_back() in case > > > GUP is racing with a write back that might not the see the > > > elevated mapcount in time. > > > > > > So for [2] > > > > > > __get_user_pages() > > > { > > > get_page(page); > > > > > > if (!PageAnon) { > > > atomic_inc(page->_mapcount); > > > + if (PageWriteback(page)) { > > > + // Assume we are racing and curent write back will not see > > > + // the elevated mapcount so wait for current write back and > > > + // force page fault > > > + wait_on_page_writeback(page); > > > + // force slow path that will fault again > > > + } > > > } > > > } > > > > This is not needed AFAICT. __get_user_pages() gets page reference (and it > > should also increment page->_mapcount) under PTE lock. So at that point we > > are sure we have writeable PTE nobody can change. So page_mkclean() has to > > block on PTE lock to make PTE read-only and only after going through all > > PTEs like this, it can check page->_mapcount. So the PTE lock provides > > enough synchronization. > > > > > For [1] only needing pin count during write back turns page_mkclean into > > > the perfect spot to check for that so: > > > > > > int page_mkclean(struct page *page) > > > { > > > int cleaned = 0; > > > + int real_mapcount = 0; > > > struct address_space *mapping; > > > struct rmap_walk_control rwc = { > > > .arg = (void *)&cleaned, > > > .rmap_one = page_mkclean_one, > > > .invalid_vma = invalid_mkclean_vma, > > > + .mapcount = &real_mapcount, > > > }; > > > > > > BUG_ON(!PageLocked(page)); > > > > > > if (!page_mapped(page)) > > > return 0; > > > > > > mapping = page_mapping(page); > > > if (!mapping) > > > return 0; > > > > > > // rmap_walk need to change to count mapping and return value > > > // in .mapcount easy one > > > rmap_walk(page, &rwc); > > > > > > // Big fat comment to explain what is going on > > > + if ((page_mapcount(page) - real_mapcount) > 0) { > > > + SetPageDMAPined(page); > > > + } else { > > > + ClearPageDMAPined(page); > > > + } > > > > This is the detail I'm not sure about: Why cannot rmap_walk_file() race > > with e.g. zap_pte_range() which decrements page->_mapcount and thus the > > check we do in page_mkclean() is wrong? > > > > Ok so i found a solution for that. First GUP must wait for racing > write back. If GUP see a valid write-able PTE and the page has > write back flag set then it must back of as if the PTE was not > valid to force fault. It is just a race with page_mkclean and we > want ordering between the two. Note this is not strictly needed > so we can relax that but i believe this ordering is better to do > in GUP rather then having each single user of GUP test for this > to avoid the race. > > GUP increase mapcount only after checking that it is not racing > with writeback it also set a page flag (SetPageDMAPined(page)). > > When clearing a write-able pte we set a special entry inside the > page table (might need a new special swap type for this) and change > page_mkclean_one() to clear to 0 those special entry. > > > Now page_mkclean: > > int page_mkclean(struct page *page) > { > int cleaned = 0; > + int real_mapcount = 0; > struct address_space *mapping; > struct rmap_walk_control rwc = { > .arg = (void *)&cleaned, > .rmap_one = page_mkclean_one, > .invalid_vma = invalid_mkclean_vma, > + .mapcount = &real_mapcount, > }; > + int mapcount1, mapcount2; > > BUG_ON(!PageLocked(page)); > > if (!page_mapped(page)) > return 0; > > mapping = page_mapping(page); > if (!mapping) > return 0; > > + mapcount1 = page_mapcount(page); > // rmap_walk need to change to count mapping and return value > // in .mapcount easy one > rmap_walk(page, &rwc); So what prevents GUP_fast() to grab reference here and the test below would think the page is not pinned? Or do you assume that every page_mkclean() call will be protected by PageWriteback (currently it is not) so that GUP_fast() blocks / bails out? But I think that detecting pinned pages with small false positive rate is OK. The extra page bouncing will cost some performance but if it is rare, then we are OK. So I think we can go for the simple version of detecting pinned pages as you mentioned in some earlier email. We just have to be sure there are no false negatives. Honza > + if (PageDMAPined(page)) { > + int rc2; > + > + if (mapcount1 == real_count) { > + /* Page is no longer pin, no zap pte race */ > + ClearPageDMAPined(page); > + goto out; > + } > + /* No new mapping of the page so mp1 < rc is illegal. */ > + VM_BUG_ON(mapcount1 < real_count); > + /* Page might be pin. */ > + mapcount2 = page_mapcount(page); > + if (mapcount2 > real_count) { > + /* Page is pin for sure. */ > + goto out; > + } > + /* We had a race with zap pte we need to rewalk again. */ > + rc2 = real_mapcount; > + real_mapcount = 0; > + rwc.rmap_one = page_pin_one; > + rmap_walk(page, &rwc); > + if (mapcount2 <= (real_count + rc2)) { > + /* Page is no longer pin */ > + ClearPageDMAPined(page); > + } > + /* At this point the page pin flag reflect pin status of the page */ > + } > + > +out: > ... > } > > The page_pin_one() function count the number of special PTE entry so > which match the count of pte that have been zapped since the first > reverse map walk. > > So worst case a page that was pin by a GUP would need 2 reverse map > walk during page_mkclean(). Moreover this is only needed if we race > with something that clear pte. I believe this is an acceptable worst > case. I will work on some RFC patchset next week (once i am down with > email catch up). > > > I do not think i made mistake here, i have been torturing my mind > trying to think of any race scenario and i believe it holds to any > racing zap and page_mkclean() > > Cheers, > J?r?me -- Jan Kara SUSE Labs, CR