Received: by 2002:ac0:aed5:0:0:0:0:0 with SMTP id t21csp5726204imb; Fri, 8 Mar 2019 00:32:43 -0800 (PST) X-Google-Smtp-Source: APXvYqzY7sjavpnw+k8LfJ/93AcDTqgYAan/vNoBltcUjn9h+UtnBcHTMjbPoqhynm9eWDh742gC X-Received: by 2002:a62:46cc:: with SMTP id o73mr17703254pfi.182.1552033963089; Fri, 08 Mar 2019 00:32:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1552033963; cv=none; d=google.com; s=arc-20160816; b=AVvRJxw5PEnD4KzvKYS7Jz/wt2XvHxImlczbTom6yMt34B4Gw0r/vin/1rI39vbpns 5vXCwvANqVsZkPi4n0pniAOUffYdr8kVB56LGpdwATYyi/y1BDCRjK8kn6TxUNJnPjSo RHK+j3vPH0qafRTgVlCHIU7cFInBlUf2nnE4RKzX33Zb66HCbePKk7ClOy8ZE/eBMH1N bc3ITu+v+GdMNE+RBTnc4FSmhjaQPZc6LJWI4NtJGLOTV3fVISaksCqi0UX7PQQyVbbv jeI0Y2EORGQhmf1/RQnJnzLjvbwgUSM3QmYDqQqgfthOdf1ZPdn3N3qZ09GTLptEiefG iBXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=LDLvu3bgPlLprKlle7wIEeDM1lyxWYMbYNm7tRx0nR4=; b=pIGd7HQmTeZaYk+sHptFAgXIFdmg9821L2YqlNx1bBFUNfuwO93+yI4H+1eet8zW59 j/VT+WsyQtA46p3sxcilAoacKgEoi4nHg2cI3cKjgzb+ArbYRzQtiUB9GSPe19MHbgvJ TdG2zqMd9YzUlyX9Q1AygYndU3d4aD1r2K7rGugFYBKENdhNG9bq8Qgw9vtfwDRU5mlj hHdchybhtsQUlLb+atbPuosg2ShU9DJh/D7CvbGv5gyYFpdnvlmatIb2gpg37ITZHEHk nl9cNcWiPEhZOckD7auJd/jz/E+gHugXKnHxFa77IHAU1oOKRmLgr9WErtRPkWYwuXD7 i5IA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 91si6766123ply.258.2019.03.08.00.32.27; Fri, 08 Mar 2019 00:32:43 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726508AbfCHIbl (ORCPT + 99 others); Fri, 8 Mar 2019 03:31:41 -0500 Received: from mx1.redhat.com ([209.132.183.28]:50694 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726476AbfCHIbj (ORCPT ); Fri, 8 Mar 2019 03:31:39 -0500 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id E0B2310C6C; Fri, 8 Mar 2019 08:31:38 +0000 (UTC) Received: from [10.72.12.27] (ovpn-12-27.pek2.redhat.com [10.72.12.27]) by smtp.corp.redhat.com (Postfix) with ESMTP id C3731611D1; Fri, 8 Mar 2019 08:31:31 +0000 (UTC) Subject: Re: [RFC PATCH V2 5/5] vhost: access vq metadata through kernel virtual address To: "Michael S. Tsirkin" Cc: kvm@vger.kernel.org, virtualization@lists.linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, peterx@redhat.com, linux-mm@kvack.org, aarcange@redhat.com References: <1551856692-3384-1-git-send-email-jasowang@redhat.com> <1551856692-3384-6-git-send-email-jasowang@redhat.com> <20190306092837-mutt-send-email-mst@kernel.org> <15105894-4ec1-1ed0-1976-7b68ed9eeeda@redhat.com> <20190307101708-mutt-send-email-mst@kernel.org> From: Jason Wang Message-ID: <92dfa6cc-a86c-0cef-6384-98aeb8b9e567@redhat.com> Date: Fri, 8 Mar 2019 16:31:29 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.5.1 MIME-Version: 1.0 In-Reply-To: <20190307101708-mutt-send-email-mst@kernel.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.38]); Fri, 08 Mar 2019 08:31:38 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019/3/7 下午11:34, Michael S. Tsirkin wrote: > On Thu, Mar 07, 2019 at 10:45:57AM +0800, Jason Wang wrote: >> On 2019/3/7 上午12:31, Michael S. Tsirkin wrote: >>>> +static void vhost_set_vmap_dirty(struct vhost_vmap *used) >>>> +{ >>>> + int i; >>>> + >>>> + for (i = 0; i < used->npages; i++) >>>> + set_page_dirty_lock(used->pages[i]); >>> This seems to rely on page lock to mark page dirty. >>> >>> Could it happen that page writeback will check the >>> page, find it clean, and then you mark it dirty and then >>> invalidate callback is called? >>> >>> >> Yes. But does this break anything? >> The page is still there, we just remove a >> kernel mapping to it. >> >> Thanks > Yes it's the same problem as e.g. RDMA: > we've just marked the page as dirty without having buffers. > Eventually writeback will find it and filesystem will complain... > So if the pages are backed by a non-RAM-based filesystem, it’s all just broken. Yes, we can't depend on the pages that might have been invalidated. As suggested, the only suitable place is the MMU notifier callbacks. Thanks > one can hope that RDMA guys will fix it in some way eventually. > For now, maybe add a flag in e.g. VMA that says that there's no > writeback so it's safe to mark page dirty at any point? > > > > >