Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp1568242pxv; Fri, 16 Jul 2021 12:14:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyBOjYrSwhiJiE/h2Pt6ttOA6ieTxduQVGwD3Bf3TrKqrCCfioMsnjciYq15cbZeQ4F4jxr X-Received: by 2002:a5d:9ccb:: with SMTP id w11mr3420261iow.174.1626462840084; Fri, 16 Jul 2021 12:14:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626462840; cv=none; d=google.com; s=arc-20160816; b=Llw39269LY7Mn+jkOYJEgD2zCnSdncgP75ji5i/6xx+vW9raPmyhVwJMRFYWshtZu/ 50Qb/wU12v8s03hW+/K3nlyanN1oovh7Jl3d1Kw4d3JlTUMtUaQkzG/je+TN64OD6sOj tukcujNhbjjVizSzu0r6HKd+pMd/YqmI39KWRfnU1O2GkUnRQkleA429a+/4l4myityV 6dxCUNEoh540UYTmDWULucCvbfTGBn4VQIxD23xWlMZ8xHpl1YNRrrBiMq+qJXuXCNGg 8u+TkUUb83ptbv07FzTX5CM8FoibupidE9rq5SQnUTHq6RP3bXf0SNSVNUTlpn891plV bvKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Ps3YKAkMPQCr54CoIkJfQF0HxMdsGrNOAI0OEZIH6SA=; b=xETcNuYll4K4VWeXLkV6+RiZBaZ18OsxvzkA7eSJHBpgDo4A8wU0IqHPow+ev9CaTL lpRWqC3EMnVa1KOMdH2d25kZZWUvyAyzkogrKqFyb3Mlm9tx+ri1IPaX8f+A0SX//4UX BBfib/VeYfEyk/TWmNpShO3zHJ7KkCdda6w05ToAv+B3TqF5HfmjLnMqeKVlY22iM+3r dqXBDeS/gWijTqpJa1WFlAf3RoN3dBiv6Pun6h5i+pkOOl6fNUfxM3EXkEHjsA9g2RCw 9vwIFloRi0BMQ+XrysevFLoTtRPM6p0kq64iWhwik5WEDm8dKtlRmQUWUNwDIVnX76EU jZYA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=jHXi3+DI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y13si3866612ilu.34.2021.07.16.12.13.46; Fri, 16 Jul 2021 12:14:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=jHXi3+DI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230376AbhGPTOd (ORCPT + 99 others); Fri, 16 Jul 2021 15:14:33 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:31024 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229534AbhGPTOd (ORCPT ); Fri, 16 Jul 2021 15:14:33 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1626462697; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Ps3YKAkMPQCr54CoIkJfQF0HxMdsGrNOAI0OEZIH6SA=; b=jHXi3+DIkYzFe1dxmz/vIII07zrpbvFxf/uQL0xtS7SaDt6Gba2v/urgN+yXQoOJF1tGLg SB74UHh5FC8ohVrfBqrALaZkjQWQvtGqko0IWCTPUp7g8im6J2oKD8FyeEjXrUQYycje3U yadugUh2OPu2OUlECc5CnGyuC+vJ8g4= Received: from mail-qv1-f69.google.com (mail-qv1-f69.google.com [209.85.219.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-188-TdiA63ZWPj24e0yDxxU7fQ-1; Fri, 16 Jul 2021 15:11:35 -0400 X-MC-Unique: TdiA63ZWPj24e0yDxxU7fQ-1 Received: by mail-qv1-f69.google.com with SMTP id r13-20020a0cf60d0000b02902f3a4c41d77so7359181qvm.18 for ; Fri, 16 Jul 2021 12:11:35 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=Ps3YKAkMPQCr54CoIkJfQF0HxMdsGrNOAI0OEZIH6SA=; b=mKLSm9ncsSHkIbQ7uRW+OEq08w3xmrmSaUk3TKHE5dFUest9C83sc/cPLA1PsQj3PA rKIo2OEt67C3ei6fmlIa27QOl5W2WE5f/m/mx7QZGJLFYRgemUpzrPE0BDhIF5Xrbb2z HHFo4YNuOONec4FsDFqtwnhzJqFLsigCp9r0nYYomDCM2YDyH4oFIwqs/9TnOpADoQQv 7bjsHG7eAGxBKV1v6QM8S2tM0+pcYSdU6bDSPovvpfoRkFYL1Qsfx7+ueunvN1gEpSBI Rif2kICGKxu8s/gKhBUVKT1R7NgrXENP2ZSZIyujFMrKjHR7CG/y4TAycWEgXqzywzQ4 azJg== X-Gm-Message-State: AOAM533EEmnWlkPVYpp7PET/4elVkdLiaJDxhTYY0z1ebDQS2O1g0nt2 68UIDzcfOmrPSCrcS2vyR79Y+wQVLh9Len9cDs1rqtfysxF5UCvVrBqCpP/1w56fKfxRRyrvNDL aGilZ+GckeutyI56NOtZ9MNHD X-Received: by 2002:a05:620a:2991:: with SMTP id r17mr11114043qkp.252.1626462695271; Fri, 16 Jul 2021 12:11:35 -0700 (PDT) X-Received: by 2002:a05:620a:2991:: with SMTP id r17mr11114021qkp.252.1626462695004; Fri, 16 Jul 2021 12:11:35 -0700 (PDT) Received: from t490s (bras-base-toroon474qw-grc-65-184-144-111-238.dsl.bell.ca. [184.144.111.238]) by smtp.gmail.com with ESMTPSA id c190sm3787428qkg.46.2021.07.16.12.11.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 16 Jul 2021 12:11:34 -0700 (PDT) Date: Fri, 16 Jul 2021 15:11:33 -0400 From: Peter Xu To: Alistair Popple Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, Jason Gunthorpe , Mike Kravetz , David Hildenbrand , Matthew Wilcox , "Kirill A . Shutemov" , Hugh Dickins , Tiberiu Georgescu , Andrea Arcangeli , Axel Rasmussen , Nadav Amit , Mike Rapoport , Jerome Glisse , Andrew Morton , Miaohe Lin Subject: Re: [PATCH v5 05/26] mm/swap: Introduce the idea of special swap ptes Message-ID: References: <20210715201422.211004-1-peterx@redhat.com> <20210715201422.211004-6-peterx@redhat.com> <6116877.MhgVfB7NV9@nvdebian> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <6116877.MhgVfB7NV9@nvdebian> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 16, 2021 at 03:50:52PM +1000, Alistair Popple wrote: > Hi Peter, > > [...] > > > diff --git a/mm/memcontrol.c b/mm/memcontrol.c > > index ae1f5d0cb581..4b46c099ad94 100644 > > --- a/mm/memcontrol.c > > +++ b/mm/memcontrol.c > > @@ -5738,7 +5738,7 @@ static enum mc_target_type get_mctgt_type(struct vm_area_struct *vma, > > > > if (pte_present(ptent)) > > page = mc_handle_present_pte(vma, addr, ptent); > > - else if (is_swap_pte(ptent)) > > + else if (pte_has_swap_entry(ptent)) > > page = mc_handle_swap_pte(vma, ptent, &ent); > > else if (pte_none(ptent)) > > page = mc_handle_file_pte(vma, addr, ptent, &ent); > > As I understand things pte_none() == False for a special swap pte, but > shouldn't this be treated as pte_none() here? Ie. does this need to be > pte_none(ptent) || is_swap_special_pte() here? Looks correct; here the page/swap cache could hide behind the special pte just like a none pte. Will fix it. Thanks! > > > diff --git a/mm/memory.c b/mm/memory.c > > index 0e0de08a2cd5..998a4f9a3744 100644 > > --- a/mm/memory.c > > +++ b/mm/memory.c > > @@ -3491,6 +3491,13 @@ vm_fault_t do_swap_page(struct vm_fault *vmf) > > if (!pte_unmap_same(vmf)) > > goto out; > > > > + /* > > + * We should never call do_swap_page upon a swap special pte; just be > > + * safe to bail out if it happens. > > + */ > > + if (WARN_ON_ONCE(is_swap_special_pte(vmf->orig_pte))) > > + goto out; > > + > > entry = pte_to_swp_entry(vmf->orig_pte); > > if (unlikely(non_swap_entry(entry))) { > > if (is_migration_entry(entry)) { > > Are there other changes required here? Because we can end up with stale special > pte's and a special pte is !pte_none don't we need to fix some of the !pte_none > checks in these functions: > > insert_pfn() -> checks for !pte_none > remap_pte_range() -> BUG_ON(!pte_none) > apply_to_pte_range() -> didn't check further but it tests for !pte_none > > In general it feels like I might be missing something here though. There are > plenty of checks in the kernel for pte_none() which haven't been updated. Is > there some rule that says none of those paths can see a special pte? My rule on doing this was to only care about vma that can be backed by RAM, majorly shmem/hugetlb, so the special pte can only exist there within those vmas. I believe in most pte_none() users this special pte won't exist. So if it's not related to RAM backed memory at all, maybe it's fine to keep the pte_none() usage like before. Take the example of insert_pfn() referenced first - I think it can be used to map some MMIO regions, but I don't think we'll call that upon a RAM region (either shmem or hugetlb), nor can it be uffd wr-protected. So I'm not sure adding special pte check there would be helpful. apply_to_pte_range() seems to be a bit special - I think the pte_fn_t matters more on whether the special pte will matter. I had a quick look, it seems still be used mostly by all kinds of driver code not mm core. It's used in two forms: apply_to_page_range apply_to_existing_page_range The first one creates ptes only, so it ignores the pte_none() check so I skipped. The second one has two call sites: *** arch/powerpc/mm/pageattr.c: change_memory_attr[99] return apply_to_existing_page_range(&init_mm, start, size, set_memory_attr[132] return apply_to_existing_page_range(&init_mm, start, sz, set_page_attr, *** mm/kasan/shadow.c: kasan_release_vmalloc[485] apply_to_existing_page_range(&init_mm, I'll leave the ppc callers for now as uffd-wp is not even supported there. The kasan_release_vmalloc() should be for kernel allocated memories only, so should not be a target for special pte either. So indeed it's hard to 100% cover all pte_none() users to make sure things are used right. As stated above I still believe most callers don't need that, but the worst case is if someone triggered uffd-wp issues with a specific feature, we can look into it. I am not sure whether it's good we add this for all the pte_none() users, because mostly they'll be useless checks, imho. So far what I planned to do is to cover most things we know that may be affected like this patch so the change may bring a difference, hopefully we won't miss any important spots. > > > diff --git a/mm/migrate.c b/mm/migrate.c > > index 23cbd9de030b..b477d0d5f911 100644 > > --- a/mm/migrate.c > > +++ b/mm/migrate.c > > @@ -294,7 +294,7 @@ void __migration_entry_wait(struct mm_struct *mm, pte_t *ptep, > > > > spin_lock(ptl); > > pte = *ptep; > > - if (!is_swap_pte(pte)) > > + if (!pte_has_swap_entry(pte)) > > goto out; > > > > entry = pte_to_swp_entry(pte); > > @@ -2276,7 +2276,7 @@ static int migrate_vma_collect_pmd(pmd_t *pmdp, > > > > pte = *ptep; > > > > - if (pte_none(pte)) { > > + if (pte_none(pte) || is_swap_special_pte(pte)) { > > I was wondering if we can loose the special pte information here? However I see > that in migrate_vma_insert_page() we check again and fail the migration if > !pte_none() so I think this is ok. > > I think it would be better if this check was moved below so the migration fails > early. Ie: > > if (pte_none(pte)) { > if (vma_is_anonymous(vma) && !is_swap_special_pte(pte)) { Hmm.. but shouldn't vma_is_anonymous()==true already means it must not be a swap special pte? Because swap special pte only exists when !vma_is_anonymous(). > > Also how does this work for page migration in general? I can see in > page_vma_mapped_walk() that we skip special pte's, but doesn't this mean we > loose the special pte in that instance? Or is that ok for some reason? Do you mean try_to_migrate_one()? Does it need to be aware of that? Per my understanding that's only for anonymous private memory, while in that world there should have no swap special pte (page_lock_anon_vma_read will return NULL early for !vma_is_anonymous). Thanks, -- Peter Xu