Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp1486743img; Tue, 19 Mar 2019 08:37:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqxdpKwEzS7WyGI/YK+8PB3nbbZzSs1002f2t6Lgq49iqbaP2kPeRfzgLc+v2v1/+pLjQrpe X-Received: by 2002:a62:12d0:: with SMTP id 77mr2582098pfs.15.1553009872003; Tue, 19 Mar 2019 08:37:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553009871; cv=none; d=google.com; s=arc-20160816; b=feFo3kpf3rt+KY/oeoHALZl9LXLpodOtaXldZZ8da3X3L3vFG1zgewvbeo8u1xDCoj wP4NTBW+XpP23+sMEulY9EI0Gi4ACQp4jKMIFzQUqsPIIwmuK5coOkJqYCHZEnPji75Q 9V/hr+dv4gZ27Hf4pOjCYT1H1+GEuFu6P3BioqQ4U6JI7X6O2GxjOtIMK8CWMwVtl8uE y9Z0vmpcg7jyCkPErKIHzfLN1tT8uUHDfzm+9COLGQXV1erZFk3v9UqBKzEWlEyy3dr5 2kSk5VfVNQ2eIbHAZCTW8guinYg//TZL4RWhABvAUXKHXi/8WhAyB2Kuq0xW9iwNsr9j QrIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=4HclYlxqZFClIDBSlq0fgR2k//e8VBAx9WbdxQZLJoM=; b=HtfZP/H/2o2ovlmDxppCrcH1EFZDDH6XzLdneXYJl0YmsgCmgWwFh2cnp7o6s0Rft4 zh0LEwSoCpNG18HaOO9Q9cShbDAIh4uTKtLdk2tAPmgSizqpxIEfXHbe7ekjneHIba6L 2aBa+GfAaV1toItYHIogPVg8sGqM9aKAe062TUDrQ9wvgxdnzufDv8yMQzyNiXpSqqOR e+H8KVUA0reJFfC50Yz8IkSnwB1oqcx8qNSVP0g0J5GDn6CIgm7XS3NW/prRfwsr+ZXi wfGeY+S8/GlEsCW7FKNFQ+U6QgrZdeZnim5ZRjnDEm8ul+3zi825wcWMSmSYyCV1X0Zq B+ng== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t7si2062623pfh.78.2019.03.19.08.37.36; Tue, 19 Mar 2019 08:37:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727685AbfCSPgs (ORCPT + 99 others); Tue, 19 Mar 2019 11:36:48 -0400 Received: from mx2.suse.de ([195.135.220.15]:41364 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726579AbfCSPgs (ORCPT ); Tue, 19 Mar 2019 11:36:48 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 884FDAEA1; Tue, 19 Mar 2019 15:36:45 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 9ED241E429B; Tue, 19 Mar 2019 16:36:44 +0100 (CET) Date: Tue, 19 Mar 2019 16:36:44 +0100 From: Jan Kara To: "Kirill A. Shutemov" Cc: Jerome Glisse , john.hubbard@gmail.com, Andrew Morton , linux-mm@kvack.org, Al Viro , Christian Benvenuti , Christoph Hellwig , Christopher Lameter , Dan Williams , Dave Chinner , Dennis Dalessandro , Doug Ledford , Ira Weiny , Jan Kara , Jason Gunthorpe , Matthew Wilcox , Michal Hocko , Mike Rapoport , Mike Marciniszyn , Ralph Campbell , Tom Talpey , LKML , linux-fsdevel@vger.kernel.org, John Hubbard , Andrea Arcangeli Subject: Re: [PATCH v4 1/1] mm: introduce put_user_page*(), placeholder versions Message-ID: <20190319153644.GB26099@quack2.suse.cz> References: <20190308213633.28978-1-jhubbard@nvidia.com> <20190308213633.28978-2-jhubbard@nvidia.com> <20190319120417.yzormwjhaeuu7jpp@kshutemo-mobl1> <20190319134724.GB3437@redhat.com> <20190319141416.GA3879@redhat.com> <20190319142918.6a5vom55aeojapjp@kshutemo-mobl1> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190319142918.6a5vom55aeojapjp@kshutemo-mobl1> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 19-03-19 17:29:18, Kirill A. Shutemov wrote: > On Tue, Mar 19, 2019 at 10:14:16AM -0400, Jerome Glisse wrote: > > On Tue, Mar 19, 2019 at 09:47:24AM -0400, Jerome Glisse wrote: > > > On Tue, Mar 19, 2019 at 03:04:17PM +0300, Kirill A. Shutemov wrote: > > > > On Fri, Mar 08, 2019 at 01:36:33PM -0800, john.hubbard@gmail.com wrote: > > > > > From: John Hubbard > > > > > > [...] > > > > > > > > diff --git a/mm/gup.c b/mm/gup.c > > > > > index f84e22685aaa..37085b8163b1 100644 > > > > > --- a/mm/gup.c > > > > > +++ b/mm/gup.c > > > > > @@ -28,6 +28,88 @@ struct follow_page_context { > > > > > unsigned int page_mask; > > > > > }; > > > > > > > > > > +typedef int (*set_dirty_func_t)(struct page *page); > > > > > + > > > > > +static void __put_user_pages_dirty(struct page **pages, > > > > > + unsigned long npages, > > > > > + set_dirty_func_t sdf) > > > > > +{ > > > > > + unsigned long index; > > > > > + > > > > > + for (index = 0; index < npages; index++) { > > > > > + struct page *page = compound_head(pages[index]); > > > > > + > > > > > + if (!PageDirty(page)) > > > > > + sdf(page); > > > > > > > > How is this safe? What prevents the page to be cleared under you? > > > > > > > > If it's safe to race clear_page_dirty*() it has to be stated explicitly > > > > with a reason why. It's not very clear to me as it is. > > > > > > The PageDirty() optimization above is fine to race with clear the > > > page flag as it means it is racing after a page_mkclean() and the > > > GUP user is done with the page so page is about to be write back > > > ie if (!PageDirty(page)) see the page as dirty and skip the sdf() > > > call while a split second after TestClearPageDirty() happens then > > > it means the racing clear is about to write back the page so all > > > is fine (the page was dirty and it is being clear for write back). > > > > > > If it does call the sdf() while racing with write back then we > > > just redirtied the page just like clear_page_dirty_for_io() would > > > do if page_mkclean() failed so nothing harmful will come of that > > > neither. Page stays dirty despite write back it just means that > > > the page might be write back twice in a row. > > > > Forgot to mention one thing, we had a discussion with Andrea and Jan > > about set_page_dirty() and Andrea had the good idea of maybe doing > > the set_page_dirty() at GUP time (when GUP with write) not when the > > GUP user calls put_page(). We can do that by setting the dirty bit > > in the pte for instance. They are few bonus of doing things that way: > > - amortize the cost of calling set_page_dirty() (ie one call for > > GUP and page_mkclean() > > - it is always safe to do so at GUP time (ie the pte has write > > permission and thus the page is in correct state) > > - safe from truncate race > > - no need to ever lock the page > > > > Extra bonus from my point of view, it simplify thing for my generic > > page protection patchset (KSM for file back page). > > > > So maybe we should explore that ? It would also be a lot less code. > > Yes, please. It sounds more sensible to me to dirty the page on get, not > on put. I fully agree this is a desirable final state of affairs. And with changes to how we treat pinned pages during writeback there won't have to be any explicit dirtying at all in the end because the page is guaranteed to be dirty after a write page fault and pin would make sure it stays dirty until unpinned. However initially I want the helpers to be as close to code they are replacing as possible. Because it will be hard to catch all the bugs due to driver conversions even in that situation. So I still think that these helpers as they are a good first step. Then we need to convert GUP users to use them and then it is much easier to modify the behavior since it is no longer opencoded in two hudred or how many places... Honza -- Jan Kara SUSE Labs, CR