Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp805049ybm; Tue, 21 May 2019 03:58:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqziJxD288oyzRY6+s6H+S8GXmySZCYAjuSqcRLyiyVWChyQAuSDgQQOhV216HEF1aYD5EPP X-Received: by 2002:a65:624f:: with SMTP id q15mr81497032pgv.436.1558436314369; Tue, 21 May 2019 03:58:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558436314; cv=none; d=google.com; s=arc-20160816; b=hF2NTVzkubz29m/Zahr5dLG1Ry6OFsn9MmnA6dTV36LW29/DbyWEl2mpn4ui3esFzh EKiJV1+iMVDpDsXQTqyJda8xcAm3MO0CWYT1d4p5+8zxMxIxTVNuz5gqCA1LmTIv+NUn TUPx6z4HW+qlpipYZBF4no1DT/TKe1mYxqN2myYEd9iriSK6M/Lb5NcZJHLbnXXHrjCc /uHB1b5eGYiBgCsOwI2DyJ/ej8p6KbntR3x97oNqJfmiAvgVjbH6PIouZ2YJzekETvv3 jJQLqfCegKOxr0HY1RJJG7JI32n8VJqkdbQYoCFNkonj8/Dze95mN12WO1UoGFHb9zTd XMJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=1nYeTedA8kwi8btjBOD06Kuvm3EO7ScK5u4iFYAOYAI=; b=W5SxGMHrj6+aKRrBLYOFpRT5/7amgEp9DoPZnD1J6yOQ4KqFDDaulv23HbeLE+Hi+L c5ZWwYrt+wyspkSe1g/p9C0fMp1FtRBMnjSeH8rG6HPy3/acIVFqxmNuhDYQIuBIPGas +lt4nIRHn/Z+8T2KOuh3GD1PawCmBraahitKoRyCYEAzBONyR69jnl3JmWP+LRgqnzPN MX+9Q8PpzBpmnlj6I//VgD6LD7y+xFJOWF0+pdzD9LLxuPinlZ49c76+poj+RlafiLIC QeMIvFsYZgNyCrRT+TPkUE5hT0192RP5aSIDQwD98sPxgxO2XphbdH16uxO0LF5pfK4u bi2A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 31si21185632plb.30.2019.05.21.03.58.18; Tue, 21 May 2019 03:58:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727903AbfEUKzG (ORCPT + 99 others); Tue, 21 May 2019 06:55:06 -0400 Received: from mx2.suse.de ([195.135.220.15]:42094 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726750AbfEUKzG (ORCPT ); Tue, 21 May 2019 06:55:06 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 2FCA9ACBC; Tue, 21 May 2019 10:55:04 +0000 (UTC) Date: Tue, 21 May 2019 12:55:03 +0200 From: Michal Hocko To: Minchan Kim Cc: Oleksandr Natalenko , Andrew Morton , LKML , linux-mm , Johannes Weiner , Tim Murray , Joel Fernandes , Suren Baghdasaryan , Daniel Colascione , Shakeel Butt , Sonny Rao , Brian Geffon Subject: Re: [RFC 4/7] mm: factor out madvise's core functionality Message-ID: <20190521105503.GQ32329@dhcp22.suse.cz> References: <20190520035254.57579-1-minchan@kernel.org> <20190520035254.57579-5-minchan@kernel.org> <20190520142633.x5d27gk454qruc4o@butterfly.localdomain> <20190521012649.GE10039@google.com> <20190521063628.x2npirvs75jxjilx@butterfly.localdomain> <20190521104949.GE219653@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190521104949.GE219653@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 21-05-19 19:49:49, Minchan Kim wrote: > On Tue, May 21, 2019 at 08:36:28AM +0200, Oleksandr Natalenko wrote: > > Hi. > > > > On Tue, May 21, 2019 at 10:26:49AM +0900, Minchan Kim wrote: > > > On Mon, May 20, 2019 at 04:26:33PM +0200, Oleksandr Natalenko wrote: > > > > Hi. > > > > > > > > On Mon, May 20, 2019 at 12:52:51PM +0900, Minchan Kim wrote: > > > > > This patch factor out madvise's core functionality so that upcoming > > > > > patch can reuse it without duplication. > > > > > > > > > > It shouldn't change any behavior. > > > > > > > > > > Signed-off-by: Minchan Kim > > > > > --- > > > > > mm/madvise.c | 168 +++++++++++++++++++++++++++------------------------ > > > > > 1 file changed, 89 insertions(+), 79 deletions(-) > > > > > > > > > > diff --git a/mm/madvise.c b/mm/madvise.c > > > > > index 9a6698b56845..119e82e1f065 100644 > > > > > --- a/mm/madvise.c > > > > > +++ b/mm/madvise.c > > > > > @@ -742,7 +742,8 @@ static long madvise_dontneed_single_vma(struct vm_area_struct *vma, > > > > > return 0; > > > > > } > > > > > > > > > > -static long madvise_dontneed_free(struct vm_area_struct *vma, > > > > > +static long madvise_dontneed_free(struct task_struct *tsk, > > > > > + struct vm_area_struct *vma, > > > > > struct vm_area_struct **prev, > > > > > unsigned long start, unsigned long end, > > > > > int behavior) > > > > > @@ -754,8 +755,8 @@ static long madvise_dontneed_free(struct vm_area_struct *vma, > > > > > if (!userfaultfd_remove(vma, start, end)) { > > > > > *prev = NULL; /* mmap_sem has been dropped, prev is stale */ > > > > > > > > > > - down_read(¤t->mm->mmap_sem); > > > > > - vma = find_vma(current->mm, start); > > > > > + down_read(&tsk->mm->mmap_sem); > > > > > + vma = find_vma(tsk->mm, start); > > > > > if (!vma) > > > > > return -ENOMEM; > > > > > if (start < vma->vm_start) { > > > > > @@ -802,7 +803,8 @@ static long madvise_dontneed_free(struct vm_area_struct *vma, > > > > > * Application wants to free up the pages and associated backing store. > > > > > * This is effectively punching a hole into the middle of a file. > > > > > */ > > > > > -static long madvise_remove(struct vm_area_struct *vma, > > > > > +static long madvise_remove(struct task_struct *tsk, > > > > > + struct vm_area_struct *vma, > > > > > struct vm_area_struct **prev, > > > > > unsigned long start, unsigned long end) > > > > > { > > > > > @@ -836,13 +838,13 @@ static long madvise_remove(struct vm_area_struct *vma, > > > > > get_file(f); > > > > > if (userfaultfd_remove(vma, start, end)) { > > > > > /* mmap_sem was not released by userfaultfd_remove() */ > > > > > - up_read(¤t->mm->mmap_sem); > > > > > + up_read(&tsk->mm->mmap_sem); > > > > > } > > > > > error = vfs_fallocate(f, > > > > > FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE, > > > > > offset, end - start); > > > > > fput(f); > > > > > - down_read(¤t->mm->mmap_sem); > > > > > + down_read(&tsk->mm->mmap_sem); > > > > > return error; > > > > > } > > > > > > > > > > @@ -916,12 +918,13 @@ static int madvise_inject_error(int behavior, > > > > > #endif > > > > > > > > What about madvise_inject_error() and get_user_pages_fast() in it > > > > please? > > > > > > Good point. Maybe, there more places where assume context is "current" so > > > I'm thinking to limit hints we could allow from external process. > > > It would be better for maintainance point of view in that we could know > > > the workload/usecases when someone ask new advises from external process > > > without making every hints works both contexts. > > > > Well, for madvise_inject_error() we still have a remote variant of > > get_user_pages(), and that should work, no? > > Regardless of madvise_inject_error, it seems to be risky to expose all > of hints for external process, I think. For example, MADV_DONTNEED with > race, it's critical for stability. So, until we could get the way to > prevent the race, I want to restrict hints. Well, if you allow the full ptrace access then you can shoot the target whatever you like. > > Regarding restricting the hints, I'm definitely interested in having > > remote MADV_MERGEABLE/MADV_UNMERGEABLE. But, OTOH, doing it via remote > > madvise() introduces another issue with traversing remote VMAs reliably. > > How is it signifiact when the race happens? It could waste CPU cycle > and make unncessary break of that merged pages but expect it should be > rare so such non-desruptive hint could be exposed via process_madvise, I think. > > If the hint is critical for the race, yes, as Michal suggested, we need a way > to close it and I guess non-cooperative userfaultfd with synchronous support > would help private anonymous vma. If we have a per vma fd approach then we can revalidate atomically and make sure the operation is performed on the range that was really requested. I do not think we want to provide a more specific guarantees. Monitor process has to be careful same way ptrace doesn't want to harm the target. -- Michal Hocko SUSE Labs