Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 05D06C433F5 for ; Mon, 29 Nov 2021 19:33:58 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245569AbhK2ThO (ORCPT ); Mon, 29 Nov 2021 14:37:14 -0500 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:49258 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240131AbhK2TfN (ORCPT ); Mon, 29 Nov 2021 14:35:13 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1638214315; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=yaRvpoInOnEEHMP7nyqwnXQsh6SAlooVZxGGKWanykI=; b=XJ1pAsE32ri8rH0SbpcewNuf2+3hlFbgX6AkjNHhaczGrF8O9f576DXuCqucsNUxJjWZae nzq6uQZBrUpfmSjsVcmBYWcafiYkxPPQBDw0UBQXg7N+SYmI3ALzvp/8+gmE++5X2D0EhP 34DtutJNNfcW9VnKhDWSEhpj4gRqF20= Received: from mail-wm1-f69.google.com (mail-wm1-f69.google.com [209.85.128.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-504-Rd__vpB7Mk6gNeS1ZOfM4A-1; Mon, 29 Nov 2021 14:31:52 -0500 X-MC-Unique: Rd__vpB7Mk6gNeS1ZOfM4A-1 Received: by mail-wm1-f69.google.com with SMTP id 138-20020a1c0090000000b00338bb803204so9147110wma.1 for ; Mon, 29 Nov 2021 11:31:52 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=yaRvpoInOnEEHMP7nyqwnXQsh6SAlooVZxGGKWanykI=; b=7w2eYmCAECnwkCS+/oFFl8J3Gbips/Q7u0hxEToGw6/UDi54BtKb3yD6pXXndv2Ao4 NuvZDPyEA9f7X+wM8Lb/qMiD44R2w71sCxLmUKR9b2odWaiZkaS9+LUC/10TeygDIDnX iCZtP41gOWnmyny4OCuF3mGf/cg4A2CHafpX8Srhqnw+Duoyd4oedrPjEexm8kqYmNL0 EKgCFgVNdIHR+3oxjidSW7OqlJOEm5tblKCdYLiGiYTMifwVzYmo404lw/6Mpl0BYRZt i5j1ObOI4waAil++aXKBZxJelIKemFUeBC5vynyyeakw5eZ7nOCqHJo+HOomLLgi25mP Ym0w== X-Gm-Message-State: AOAM530emAPJP+sxkNs8gC+HUYCNecH/+xtgh+qlB2kr7gUlVXpnDSBC rZB0wrLXBLGbug31sTOm2UfMRO+eaGsGxGplXYmadpMFTtqL60ogcffRAM1/0W8uyZb7WmtTSEF OrhiQp9Ju71wrfbgvacFzyRxhine5FIxAH/JddgGs X-Received: by 2002:adf:f749:: with SMTP id z9mr36910291wrp.379.1638214311587; Mon, 29 Nov 2021 11:31:51 -0800 (PST) X-Google-Smtp-Source: ABdhPJwSv2WybHRedA4NST/0L7m41HCQb6LRVF5wHW9P5FzzrZgkSDOaniNFjz8BjqBW06bNnR5BfRT4OlQsVo6M068= X-Received: by 2002:adf:f749:: with SMTP id z9mr36910269wrp.379.1638214311399; Mon, 29 Nov 2021 11:31:51 -0800 (PST) MIME-Version: 1.0 References: <20211124192024.2408218-1-catalin.marinas@arm.com> <20211124192024.2408218-4-catalin.marinas@arm.com> <20211127123958.588350-1-agruenba@redhat.com> In-Reply-To: From: Andreas Gruenbacher Date: Mon, 29 Nov 2021 20:31:39 +0100 Message-ID: Subject: Re: [PATCH 3/3] btrfs: Avoid live-lock in search_ioctl() on hardware with sub-page faults To: Linus Torvalds Cc: Catalin Marinas , Matthew Wilcox , Josef Bacik , David Sterba , Al Viro , Andrew Morton , Will Deacon , linux-fsdevel , LKML , Linux ARM , linux-btrfs Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Nov 29, 2021 at 7:41 PM Linus Torvalds wrote: > On Mon, Nov 29, 2021 at 7:36 AM Catalin Marinas wrote: > > > > That's what this series does when it probes the whole range in > > fault_in_writeable(). The main reason was that it's more efficient to do > > a read than a write on a large range (the latter dirtying the cache > > lines). > > The more this thread goes on, the more I'm starting to think that we > should just make "fault_in_writable()" (and readable, of course) only > really work on the beginning of the area. > > Not just for the finer-granularity pointer color probing, but for the > page probing too. > > I'm looking at our current fault_in_writeable(), and I'm going > > (a) it uses __put_user() without range checks, which is really not great > > (b) it looks like a disaster from another standpoint: essentially > user-controlled loop size with no limit checking, no preemption, and > no check for fatal signals. > > Now, (a) should be fixed with a access_ok() or similar. > > And (b) can easily be fixed multiple ways, with one option simply just > being adding a can_resched() call and checking for fatal signals. > > But faulting in the whole region is actually fundamentally wrong in > low-memory situations - the beginning of the region might be swapped > out by the time we get to the end. That's unlikely to be a problem in > real life, but it's an example of how it's simply not conceptually > sensible. > > So I do wonder why we don't just say "fault_in_writable will fault in > _at_most_ X bytes", and simply limit the actual fault-in size to > something reasonable. > > That solves _all_ the problems. It solves the lack of preemption and > fatal signals (by virtue of just limiting the amount of work we do). > It solves the low memory situation. And it solves the "excessive dirty > cachelines" case too. > > Of course, we want to have some minimum bytes we fault in too, but > that minimum range might well be "we guarantee at least a full page > worth of data" (and in practice make it a couple of pages). > > It's not like fault_in_writeable() avoids page faults or anything like > that - it just moves them around. So there's really very little reason > to fault in a large range, and there are multiple reasons _not_ to do > it. > > Hmm? This would mean that we could get rid of gfs2's should_fault_in_pages() logic, which is based on what's in btrfs_buffered_write(). Andreas > > Linus >