Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp698911ybx; Wed, 6 Nov 2019 07:09:00 -0800 (PST) X-Google-Smtp-Source: APXvYqxRfboza75iD2elITgu53ReQHgHYCDgk7+TlJ9gU+6NXKCrkxiRlSbkGFO9O9mfuCTOVjDH X-Received: by 2002:a17:906:6b94:: with SMTP id l20mr32612854ejr.238.1573052940479; Wed, 06 Nov 2019 07:09:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573052940; cv=none; d=google.com; s=arc-20160816; b=rcjpnMvdYrwMrsJ51358p0EWLrAAIfTO+PvDrVYW96s3mmS8R/TR6vlerVGV7UoD3y y4006n+ZtXc0nhSaGbgjO7M3sSyv1GH26noXEhdyoxWseknG46GGgwONaM+87BhWeAEX GaPWVD1FYgcg40GkSPgt3epoVu7esPkZI0ggIv9oqK0PBTE4kZ8zS5uhShrsULrdpbik 1P5JqLIxQts0vbTu9AeFEwL8Tj+MDyd5qhyiVMsV49gVEObQJV3Vl9XQcVF7i7akr3u6 YVQW7HBHMQxb66fEMZPOa7htmggpn3d6ZHtLb0m1bxdxNaZIDDkU7HUR+6v8WuekobGl aH7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=K8ew8MlXjnlW8qqtfxhEIqAzG26aN1iDI3LM8p6IKKk=; b=HrhZoYPLrMDqn4buEJBCe680VGy0lPuGLYW+sTsfdXaWIGvHlABU5cJcz/I9X8NyMJ JdsW1bxLa6FTgBDISZCRZ8Kl4AM7tRY6ZN9o1IgRtgMIoNgzqA6InJg7oMHCpS9oW4Om wgSYr+iILcCZIABKMgWRmXN1i4v54+XQT+pj4SCJgKixaaitWx5fTv7Op9jFzc3PzTnH 6yuLgkPlSnBf5sGW1qyjXxhVx4n2VGwxkv8avrnHyLlAOH8MlJa8aqlAPDGVEZaPHgM5 W1LY0W3iyS4tYXQEJGGzpJu/pWFjfR1RuP2JKAF7aEZNBYZBP3M1Zr6+Z2gRoZJgSdHU tQmw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w2si13670043edc.300.2019.11.06.07.08.37; Wed, 06 Nov 2019 07:09:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731826AbfKFPF1 (ORCPT + 99 others); Wed, 6 Nov 2019 10:05:27 -0500 Received: from mx2.suse.de ([195.135.220.15]:40126 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727548AbfKFPF1 (ORCPT ); Wed, 6 Nov 2019 10:05:27 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id F0AA5AC18; Wed, 6 Nov 2019 15:05:24 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id A02211E4353; Wed, 6 Nov 2019 16:05:24 +0100 (CET) Date: Wed, 6 Nov 2019 16:05:24 +0100 From: Jan Kara To: Josef Bacik Cc: snazy@snazy.de, Jan Kara , Johannes Weiner , Vlastimil Babka , Michal Hocko , "Kirill A. Shutemov" , Randy Dunlap , linux-kernel@vger.kernel.org, Linux MM , Andrew Morton , "Potyra, Stefan" Subject: Re: mlockall(MCL_CURRENT) blocking infinitely Message-ID: <20191106150524.GL16085@quack2.suse.cz> References: <707b72c6dac76c534dcce60830fa300c44f53404.camel@gmx.de> <20191025135749.GK17610@dhcp22.suse.cz> <20191025140029.GL17610@dhcp22.suse.cz> <20191105182211.GA33242@cmpxchg.org> <20191106120315.GF16085@quack2.suse.cz> <4edf4dea97f6c1e3c7d4fed0e12c3dc6dff7575f.camel@gmx.de> <20191106145608.ucvuwsuyijvkxz22@macbook-pro-91.dhcp.thefacebook.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191106145608.ucvuwsuyijvkxz22@macbook-pro-91.dhcp.thefacebook.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 06-11-19 09:56:09, Josef Bacik wrote: > On Wed, Nov 06, 2019 at 02:45:43PM +0100, Robert Stupp wrote: > > On Wed, 2019-11-06 at 13:03 +0100, Jan Kara wrote: > > > On Tue 05-11-19 13:22:11, Johannes Weiner wrote: > > > > What I don't quite understand yet is why the fault path doesn't > > > > make > > > > progress eventually. We must drop the mmap_sem without changing the > > > > state in any way. How can we keep looping on the same page? > > > > > > That may be a slight suboptimality with Josef's patches. If the page > > > is marked as PageReadahead, we always drop mmap_sem if we can and > > > start > > > readahead without checking whether that makes sense or not in > > > do_async_mmap_readahead(). OTOH page_cache_async_readahead() then > > > clears > > > PageReadahead so the only way how I can see we could loop like this > > > is when > > > file->ra->ra_pages is 0. Not sure if that's what's happening through. > > > We'd > > > need to find which of the paths in filemap_fault() calls > > > maybe_unlock_mmap_for_io() to tell more. > > > > Yes, ra_pages==0 > > Attached the dmesg + smaps outputs > > > > > > Ah ok I see what's happening, __get_user_pages() returns 0 if we get an EBUSY > from faultin_page, and then __mm_populate does nend = nstart + ret * PAGE_SIZE, > which just leaves us where we are. > > We need to handle the non-blocking and the locking separately in __mm_populate > so we know what's going on. Jan's fix for the readahead thing is definitely > valid as well, but this will keep us from looping forever in other retry cases. I don't think this will work. AFAICS faultin_page() just checks whether 'nonblocking' is != NULL but doesn't ever look at its value... Honestly the whole interface is rather weird like lots of things around gup(). Honza > > diff --git a/mm/gup.c b/mm/gup.c > index 8f236a335ae9..ac625805d569 100644 > --- a/mm/gup.c > +++ b/mm/gup.c > @@ -1237,6 +1237,7 @@ int __mm_populate(unsigned long start, unsigned long len, int ignore_errors) > unsigned long end, nstart, nend; > struct vm_area_struct *vma = NULL; > int locked = 0; > + int nonblocking = 1; > long ret = 0; > > end = start + len; > @@ -1268,7 +1269,7 @@ int __mm_populate(unsigned long start, unsigned long len, int ignore_errors) > * double checks the vma flags, so that it won't mlock pages > * if the vma was already munlocked. > */ > - ret = populate_vma_page_range(vma, nstart, nend, &locked); > + ret = populate_vma_page_range(vma, nstart, nend, &nonblocking); > if (ret < 0) { > if (ignore_errors) { > ret = 0; > @@ -1276,6 +1277,14 @@ int __mm_populate(unsigned long start, unsigned long len, int ignore_errors) > } > break; > } > + > + /* > + * We dropped the mmap_sem, so we need to re-lock, and the next > + * loop around we won't drop because nonblocking is now 0. > + */ > + if (!nonblocking) > + locked = 0; > + > nend = nstart + ret * PAGE_SIZE; > ret = 0; > } -- Jan Kara SUSE Labs, CR