Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp191146pxu; Thu, 10 Dec 2020 23:09:20 -0800 (PST) X-Google-Smtp-Source: ABdhPJydjjrA5oZdDjJc6HdOIG00G393RV+bGEkRb6+McMKmu4kPkyjZf5nahiUfCwSoqta8+JcR X-Received: by 2002:a17:906:134f:: with SMTP id x15mr9874726ejb.278.1607670560380; Thu, 10 Dec 2020 23:09:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607670560; cv=none; d=google.com; s=arc-20160816; b=MB0RY4McaNn/TAoO7tkuY9UI0kQcdF6RPJRtn7osgDBv5RV+1EVtksChuNvSzRIWJr CVdyl+MGS26rFIQPG8nDBR6w6PvXALIY+OXky3hpm/D8+mhbz1biLvGJpetmvvoSw5y4 7ttwkRHS7NctGlLW2eBGn5oJNdic7seXl6d13zagynZHIHvXPCp55kjgMEIcluacWaNj FCI+wAcV7DVBj2Pul4TKTZnCWRhai2GjBwQSeyFmW93uQksndi+OUGwe/dsdeF0n8AmN pm2EfzBemBpBZMl3ZRlsf5KpDTgEJqRokECmsVL4tK3uMzcYVzKPdXWU8OnlPUVlhCM0 WlSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:ironport-sdr :ironport-sdr; bh=uUFFR+013wqrLVI3WTcua3mGpNY7yk8MysolqpcyoEA=; b=wHauSvu5W8zdnduWGjPcNNE9DeBspxQ6MAP08HEo2fHlmLUwCxLVCHBosbxNG4B5K8 XgHu/NgS+zvVySehvxAzTR1QX7ftEK1XVDTa4yv/3x+eOhKSd6fOq/jI5F/2Oll0hfUW 2c7GOA49q912pqNgm8uQsDnE15AuOuiA99W1k9Bqm9WmbiDctE42Y/1Hssqz5pdVveEu C1EEUr8PtM4Hj/nnZ+olMHcJ+W33CSGPB8eAEzvB3J9uQtkEJg2x2dz9FhNUYfNy62ux RzH3e3hqZtvAul7bBrJcr2aqkkmv4aeblSevrD75Tvk/hKWKhXn63cBUPDeKAbVHV+fq 6enw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n3si3903819ejx.102.2020.12.10.23.08.57; Thu, 10 Dec 2020 23:09:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727618AbgLJPK2 (ORCPT + 99 others); Thu, 10 Dec 2020 10:10:28 -0500 Received: from mga11.intel.com ([192.55.52.93]:34208 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388303AbgLJPKT (ORCPT ); Thu, 10 Dec 2020 10:10:19 -0500 IronPort-SDR: 525is8uDzPP/dxHikRk0qD4XlfdYtYfi0Ca6mTLZliJSD5RgnimfnVVn/AeF0aUYtPCfajLjQw yp+w3qisfhig== X-IronPort-AV: E=McAfee;i="6000,8403,9830"; a="170760076" X-IronPort-AV: E=Sophos;i="5.78,408,1599548400"; d="scan'208";a="170760076" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Dec 2020 07:08:32 -0800 IronPort-SDR: yhytHYnRwcoxGuhv+plejjvU03V+/oIYYHGLEHd/o2G9Le9BiY9788yscnFXxCoRa4C2zHZAnk 2RzzCP8E1EWw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.78,408,1599548400"; d="scan'208";a="553273805" Received: from black.fi.intel.com ([10.237.72.28]) by orsmga005.jf.intel.com with ESMTP; 10 Dec 2020 07:08:29 -0800 Received: by black.fi.intel.com (Postfix, from userid 1000) id 89E481C8; Thu, 10 Dec 2020 17:08:28 +0200 (EET) Date: Thu, 10 Dec 2020 18:08:28 +0300 From: "Kirill A. Shutemov" To: Linus Torvalds Cc: Will Deacon , Linux Kernel Mailing List , Linux-MM , Linux ARM , Catalin Marinas , Jan Kara , Minchan Kim , Andrew Morton , Vinayak Menon , Android Kernel Team Subject: Re: [PATCH 1/2] mm: Allow architectures to request 'old' entries when prefaulting Message-ID: <20201210150828.4b7pg5lx666r7l2u@black.fi.intel.com> References: <20201209163950.8494-1-will@kernel.org> <20201209163950.8494-2-will@kernel.org> <20201209184049.GA8778@willie-the-truck> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Dec 09, 2020 at 11:04:13AM -0800, Linus Torvalds wrote: > > Kirill - I think you know this code best. Would you be willing to look > at splitting out that "allocate and map" from alloc_set_pte() and into > the callers? See lightly tested patch below. Is it something you had in mind? I don't like map_set_pte() name. Any suggestions? > At that point, I think the current very special and odd > do_fault_around() pre-allocation could be made into just a _regular_ > "allocate the pmd if it doesn't exist". And then the pte locking could > be moved into filemap_map_pages(), and suddenly the semantics and > rules around all that would be a whole lot more obvious. No. It would stop faultaround code from mapping huge pages. We had to defer pte page table mapping until we know we don't have huge pages in page cache. diff --git a/include/linux/mm.h b/include/linux/mm.h index db6ae4d3fb4e..6b1bfa0fd488 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -535,7 +535,7 @@ struct vm_fault { */ pgtable_t prealloc_pte; /* Pre-allocated pte page table. * vm_ops->map_pages() calls - * alloc_set_pte() from atomic context. + * map_set_pte() from atomic context. * do_fault_around() pre-allocates * page table to avoid allocation from * atomic context. @@ -972,7 +972,7 @@ static inline pte_t maybe_mkwrite(pte_t pte, struct vm_area_struct *vma) return pte; } -vm_fault_t alloc_set_pte(struct vm_fault *vmf, struct page *page); +vm_fault_t map_set_pte(struct vm_fault *vmf, struct page *page); vm_fault_t finish_fault(struct vm_fault *vmf); vm_fault_t finish_mkwrite_fault(struct vm_fault *vmf); #endif diff --git a/mm/filemap.c b/mm/filemap.c index 331f4261d723..4446ae6d6d09 100644 --- a/mm/filemap.c +++ b/mm/filemap.c @@ -2884,7 +2884,7 @@ void filemap_map_pages(struct vm_fault *vmf, if (vmf->pte) vmf->pte += xas.xa_index - last_pgoff; last_pgoff = xas.xa_index; - if (alloc_set_pte(vmf, page)) + if (map_set_pte(vmf, page)) goto unlock; unlock_page(head); goto next; diff --git a/mm/memory.c b/mm/memory.c index c48f8df6e502..1db1000767fc 100644 --- a/mm/memory.c +++ b/mm/memory.c @@ -3490,7 +3490,7 @@ static vm_fault_t do_anonymous_page(struct vm_fault *vmf) if (pte_alloc(vma->vm_mm, vmf->pmd)) return VM_FAULT_OOM; - /* See the comment in pte_alloc_one_map() */ + /* See the comment in map_set_pte() */ if (unlikely(pmd_trans_unstable(vmf->pmd))) return 0; @@ -3641,55 +3641,6 @@ static int pmd_devmap_trans_unstable(pmd_t *pmd) return pmd_devmap(*pmd) || pmd_trans_unstable(pmd); } -static vm_fault_t pte_alloc_one_map(struct vm_fault *vmf) -{ - struct vm_area_struct *vma = vmf->vma; - - if (!pmd_none(*vmf->pmd)) - goto map_pte; - if (vmf->prealloc_pte) { - vmf->ptl = pmd_lock(vma->vm_mm, vmf->pmd); - if (unlikely(!pmd_none(*vmf->pmd))) { - spin_unlock(vmf->ptl); - goto map_pte; - } - - mm_inc_nr_ptes(vma->vm_mm); - pmd_populate(vma->vm_mm, vmf->pmd, vmf->prealloc_pte); - spin_unlock(vmf->ptl); - vmf->prealloc_pte = NULL; - } else if (unlikely(pte_alloc(vma->vm_mm, vmf->pmd))) { - return VM_FAULT_OOM; - } -map_pte: - /* - * If a huge pmd materialized under us just retry later. Use - * pmd_trans_unstable() via pmd_devmap_trans_unstable() instead of - * pmd_trans_huge() to ensure the pmd didn't become pmd_trans_huge - * under us and then back to pmd_none, as a result of MADV_DONTNEED - * running immediately after a huge pmd fault in a different thread of - * this mm, in turn leading to a misleading pmd_trans_huge() retval. - * All we have to ensure is that it is a regular pmd that we can walk - * with pte_offset_map() and we can do that through an atomic read in - * C, which is what pmd_trans_unstable() provides. - */ - if (pmd_devmap_trans_unstable(vmf->pmd)) - return VM_FAULT_NOPAGE; - - /* - * At this point we know that our vmf->pmd points to a page of ptes - * and it cannot become pmd_none(), pmd_devmap() or pmd_trans_huge() - * for the duration of the fault. If a racing MADV_DONTNEED runs and - * we zap the ptes pointed to by our vmf->pmd, the vmf->ptl will still - * be valid and we will re-check to make sure the vmf->pte isn't - * pte_none() under vmf->ptl protection when we return to - * alloc_set_pte(). - */ - vmf->pte = pte_offset_map_lock(vma->vm_mm, vmf->pmd, vmf->address, - &vmf->ptl); - return 0; -} - #ifdef CONFIG_TRANSPARENT_HUGEPAGE static void deposit_prealloc_pte(struct vm_fault *vmf) { @@ -3769,45 +3720,11 @@ static vm_fault_t do_set_pmd(struct vm_fault *vmf, struct page *page) } #endif -/** - * alloc_set_pte - setup new PTE entry for given page and add reverse page - * mapping. If needed, the function allocates page table or use pre-allocated. - * - * @vmf: fault environment - * @page: page to map - * - * Caller must take care of unlocking vmf->ptl, if vmf->pte is non-NULL on - * return. - * - * Target users are page handler itself and implementations of - * vm_ops->map_pages. - * - * Return: %0 on success, %VM_FAULT_ code in case of error. - */ -vm_fault_t alloc_set_pte(struct vm_fault *vmf, struct page *page) +static void do_set_pte(struct vm_fault *vmf, struct page *page) { struct vm_area_struct *vma = vmf->vma; bool write = vmf->flags & FAULT_FLAG_WRITE; pte_t entry; - vm_fault_t ret; - - if (pmd_none(*vmf->pmd) && PageTransCompound(page)) { - ret = do_set_pmd(vmf, page); - if (ret != VM_FAULT_FALLBACK) - return ret; - } - - if (!vmf->pte) { - ret = pte_alloc_one_map(vmf); - if (ret) - return ret; - } - - /* Re-check under ptl */ - if (unlikely(!pte_none(*vmf->pte))) { - update_mmu_tlb(vma, vmf->address, vmf->pte); - return VM_FAULT_NOPAGE; - } flush_icache_page(vma, page); entry = mk_pte(page, vma->vm_page_prot); @@ -3824,14 +3741,56 @@ vm_fault_t alloc_set_pte(struct vm_fault *vmf, struct page *page) page_add_file_rmap(page, false); } set_pte_at(vma->vm_mm, vmf->address, vmf->pte, entry); +} - /* no need to invalidate: a not-present page won't be cached */ - update_mmu_cache(vma, vmf->address, vmf->pte); +vm_fault_t map_set_pte(struct vm_fault *vmf, struct page *page) +{ + struct vm_area_struct *vma = vmf->vma; + vm_fault_t ret; + + if (pmd_none(*vmf->pmd) && PageTransCompound(page)) { + ret = do_set_pmd(vmf, page); + if (ret != VM_FAULT_FALLBACK) + return ret; + } + + if (!vmf->pte) { + vmf->ptl = pmd_lock(vma->vm_mm, vmf->pmd); + if (likely(pmd_none(*vmf->pmd))) { + mm_inc_nr_ptes(vma->vm_mm); + pmd_populate(vma->vm_mm, vmf->pmd, vmf->prealloc_pte); + vmf->prealloc_pte = NULL; + } + spin_unlock(vmf->ptl); + + /* + * If a huge pmd materialized under us just retry later. Use + * pmd_trans_unstable() via pmd_devmap_trans_unstable() instead + * of pmd_trans_huge() to ensure the pmd didn't become + * pmd_trans_huge under us and then back to pmd_none, as a + * result of MADV_DONTNEED running immediately after a huge pmd + * fault in a different thread of this mm, in turn leading to a + * misleading pmd_trans_huge() retval. All we have to ensure is + * that it is a regular pmd that we can walk with + * pte_offset_map() and we can do that through an atomic read + * in C, which is what pmd_trans_unstable() provides. + */ + if (pmd_devmap_trans_unstable(vmf->pmd)) + return VM_FAULT_NOPAGE; + + vmf->pte = pte_offset_map_lock(vma->vm_mm, vmf->pmd, + vmf->address, &vmf->ptl); + } + + /* Re-check under ptl */ + if (likely(pte_none(*vmf->pte))) + do_set_pte(vmf, page); + /* no need to invalidate: a not-present page won't be cached */ + update_mmu_cache(vmf->vma, vmf->address, vmf->pte); return 0; } - /** * finish_fault - finish page fault once we have prepared the page to fault * @@ -3849,12 +3808,12 @@ vm_fault_t alloc_set_pte(struct vm_fault *vmf, struct page *page) */ vm_fault_t finish_fault(struct vm_fault *vmf) { + struct vm_area_struct *vma = vmf->vma; struct page *page; - vm_fault_t ret = 0; + vm_fault_t ret; /* Did we COW the page? */ - if ((vmf->flags & FAULT_FLAG_WRITE) && - !(vmf->vma->vm_flags & VM_SHARED)) + if ((vmf->flags & FAULT_FLAG_WRITE) && !(vma->vm_flags & VM_SHARED)) page = vmf->cow_page; else page = vmf->page; @@ -3863,13 +3822,34 @@ vm_fault_t finish_fault(struct vm_fault *vmf) * check even for read faults because we might have lost our CoWed * page */ - if (!(vmf->vma->vm_flags & VM_SHARED)) - ret = check_stable_address_space(vmf->vma->vm_mm); - if (!ret) - ret = alloc_set_pte(vmf, page); - if (vmf->pte) - pte_unmap_unlock(vmf->pte, vmf->ptl); - return ret; + if (!(vma->vm_flags & VM_SHARED)) + ret = check_stable_address_space(vma->vm_mm); + if (ret) + return ret; + + if (pmd_none(*vmf->pmd)) { + if (PageTransCompound(page)) { + ret = do_set_pmd(vmf, page); + if (ret != VM_FAULT_FALLBACK) + return ret; + } + + if (unlikely(pte_alloc(vma->vm_mm, vmf->pmd))) + return VM_FAULT_OOM; + } + + if (pmd_devmap_trans_unstable(vmf->pmd)) + return 0; + + vmf->pte = pte_offset_map_lock(vma->vm_mm, vmf->pmd, + vmf->address, &vmf->ptl); + /* Re-check under ptl */ + if (likely(pte_none(*vmf->pte))) + do_set_pte(vmf, page); + + update_mmu_tlb(vma, vmf->address, vmf->pte); + pte_unmap_unlock(vmf->pte, vmf->ptl); + return 0; } static unsigned long fault_around_bytes __read_mostly = @@ -4340,7 +4320,7 @@ static vm_fault_t handle_pte_fault(struct vm_fault *vmf) */ vmf->pte = NULL; } else { - /* See comment in pte_alloc_one_map() */ + /* See comment in map_set_pte() */ if (pmd_devmap_trans_unstable(vmf->pmd)) return 0; /* -- Kirill A. Shutemov