Received: by 2002:a05:6504:1d0:b0:1de:de76:8684 with SMTP id e16csp899326ltn; Fri, 2 Sep 2022 09:52:25 -0700 (PDT) X-Google-Smtp-Source: AA6agR5yynIVqhnfwATj7/gl239GVC4aK+j1G3nYG1VxePtvDg39Yd+RPGPL7qhtPIWrnYAay/9c X-Received: by 2002:a17:907:7630:b0:73d:d749:975b with SMTP id jy16-20020a170907763000b0073dd749975bmr26649569ejc.632.1662137545461; Fri, 02 Sep 2022 09:52:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662137545; cv=none; d=google.com; s=arc-20160816; b=MKK3nn/9SbM4xZ2yZN5bNIugyuuBZMdmI77XL9vJctuAzMqzSuy1MeQqdNJ0j6J5A6 RiLfCEbPD5GhkhgNweYtFBKMmtmRkIgFMT7IFYppigQ+5srLzVlhApQsPYpdyMuic37l txXf2jK0yg23y3vm9zRGwmkhGvOaJ0wnwBDoUtFHHmtES2Up4BKgiinjmZ9ERYpVRH6L WWF4pHgRE6WX8k9c/qa8foxFT1u0EGquDLWsW8n03UxNn86Or7goiKbEScCNXWjtFWap Du2U/l1CAZ1R/ey41qi7zJOKhvHSfiS5hPB5FQMxd6EYHK8d7h4rKnrnMagasOR2OClo eOKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=KHRvRVn7dZqjAbla/kU+RaIkGJZYLm02v4kWZjDrnLI=; b=QCGLK1KSmJ2wWRe8x81T/QPABDg/fgcT01RmIgk5Mrdedfmp8xfv/D05UweFE9TUiw Z3Z5aHQCf5NbIKNs+DEwTHKpPNqY9ifDLmHP62ZsN+fli0uUSWGhZA5z4rvOzxyj5GvR uV+8P3vxK5FpJkUrHwp7JvQpPqKxcQOVXH3X71tM3Da02x5uxbJgIjUP8+q/rzee96k3 uIDeZ7LKIvDc/cLLgpiObi84b1dDlmpqYPNZm+NKONpaAWZKYo57sfx+JUMf/t+k6QLD 12uu8ncP4qJQh8G8avHX42BRotZ2NCWUQDfM3t3m+ATAsLaBCrC/+BxmARWzCIIhkHuX vnUg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="H/8D9PVV"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h3-20020a17090791c300b0073dd390029asi1520544ejz.535.2022.09.02.09.51.58; Fri, 02 Sep 2022 09:52:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="H/8D9PVV"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236460AbiIBQIr (ORCPT + 99 others); Fri, 2 Sep 2022 12:08:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47032 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237156AbiIBQIP (ORCPT ); Fri, 2 Sep 2022 12:08:15 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 20BFDADCD2 for ; Fri, 2 Sep 2022 09:01:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1662134402; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=KHRvRVn7dZqjAbla/kU+RaIkGJZYLm02v4kWZjDrnLI=; b=H/8D9PVV+MsGyMlx9HAwUakBBDHsn8oO489Ywh7P+6t0Obpr23nyKFuuhKN2znNMU51g8J rnp1JKXLGgkX2THQlS6Ml/n3ShcRjBrpf9sgppvc8fzTkmbREfXFiYomcrBuqdR6kVt6NZ PD7nkwhZ732pG22040jrIFhmz/zCC4Y= Received: from mail-qk1-f199.google.com (mail-qk1-f199.google.com [209.85.222.199]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_128_GCM_SHA256) id us-mta-623-ybbCAw4yNmuM96IHl2YSLA-1; Fri, 02 Sep 2022 12:00:00 -0400 X-MC-Unique: ybbCAw4yNmuM96IHl2YSLA-1 Received: by mail-qk1-f199.google.com with SMTP id bq19-20020a05620a469300b006c097741d3dso2257808qkb.2 for ; Fri, 02 Sep 2022 08:59:59 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date; bh=KHRvRVn7dZqjAbla/kU+RaIkGJZYLm02v4kWZjDrnLI=; b=m1hc1+X1clUz0GE0LomnpifJP+WA3BSRuhCYNHEGM3YhBlyKClh0f1oRYCP5YXAOaR 2tW3nMPerQiFgAOnNVABEqLv6dndtzGarvGPFNtL1sLuOqVlMAgKfNALNco5yuy9e77a eW8dDVLz6+Xwcxm5qKA0ANdCTeWMmJS+yhiuNWFxS+EyR+ZvQuypSjhIPPaBmFc15uG5 BvOIM8NHIG+3LGwNe0VFmSkV8OmZvxkXuntvjxXP2lnXdhhj8eLA//Qk7RlzlA+bzTKG MBsQBG9tYRch8rD9W7Gcua+q3w2aDKOXA3IHhba5BNK32LeDsEeL6sZojmPhnJ+K3Hw/ lvgw== X-Gm-Message-State: ACgBeo0TJAV3cqiSjOnjJewMcTitQbkNsxEPtmEZGfoB4btsCW1d7Eeq AWDat18LJD9BhI/NMQnIx8Z7qmBpeljGBd7J4XUkXx1oe6u5EwVxPtuN22Tcl73TKNYjayiBbfb vUfOpvNVn9K2hmCatZBJor9yf X-Received: by 2002:a05:622a:b:b0:342:f3de:e055 with SMTP id x11-20020a05622a000b00b00342f3dee055mr28058440qtw.43.1662134399266; Fri, 02 Sep 2022 08:59:59 -0700 (PDT) X-Received: by 2002:a05:622a:b:b0:342:f3de:e055 with SMTP id x11-20020a05622a000b00b00342f3dee055mr28058426qtw.43.1662134398993; Fri, 02 Sep 2022 08:59:58 -0700 (PDT) Received: from xz-m1.local (bras-base-aurron9127w-grc-35-70-27-3-10.dsl.bell.ca. [70.27.3.10]) by smtp.gmail.com with ESMTPSA id x9-20020a05620a448900b006b5e296452csm1757651qkp.54.2022.09.02.08.59.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 02 Sep 2022 08:59:57 -0700 (PDT) Date: Fri, 2 Sep 2022 11:59:56 -0400 From: Peter Xu To: Yang Shi Cc: david@redhat.com, kirill.shutemov@linux.intel.com, jhubbard@nvidia.com, jgg@nvidia.com, hughd@google.com, akpm@linux-foundation.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] mm: gup: fix the fast GUP race against THP collapse Message-ID: References: <20220901222707.477402-1-shy828301@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 01, 2022 at 04:50:45PM -0700, Yang Shi wrote: > On Thu, Sep 1, 2022 at 4:26 PM Peter Xu wrote: > > > > Hi, Yang, > > > > On Thu, Sep 01, 2022 at 03:27:07PM -0700, Yang Shi wrote: > > > Since general RCU GUP fast was introduced in commit 2667f50e8b81 ("mm: > > > introduce a general RCU get_user_pages_fast()"), a TLB flush is no longer > > > sufficient to handle concurrent GUP-fast in all cases, it only handles > > > traditional IPI-based GUP-fast correctly. > > > > If TLB flush (or, IPI broadcasts) used to work to protect against gup-fast, > > I'm kind of confused why it's not sufficient even if with RCU gup? Isn't > > that'll keep working as long as interrupt disabled (which current fast-gup > > will still do)? > > Actually the wording was copied from David's commit log for his > PageAnonExclusive fix. My understanding is the IPI broadcast still > works, but it may not be supported by all architectures and not > preferred anymore. So we should avoid depending on IPI broadcast IIUC. > > > > > IIUC the issue is you suspect not all archs correctly implemented > > pmdp_collapse_flush(), or am I wrong? > > This is a possible fix, please see below for details. > > > > > > On architectures that send > > > an IPI broadcast on TLB flush, it works as expected. But on the > > > architectures that do not use IPI to broadcast TLB flush, it may have > > > the below race: > > > > > > CPU A CPU B > > > THP collapse fast GUP > > > gup_pmd_range() <-- see valid pmd > > > gup_pte_range() <-- work on pte > > > pmdp_collapse_flush() <-- clear pmd and flush > > > __collapse_huge_page_isolate() > > > check page pinned <-- before GUP bump refcount > > > pin the page > > > check PTE <-- no change > > > __collapse_huge_page_copy() > > > copy data to huge page > > > ptep_clear() > > > install huge pmd for the huge page > > > return the stale page > > > discard the stale page > > > > > > The race could be fixed by checking whether PMD is changed or not after > > > taking the page pin in fast GUP, just like what it does for PTE. If the > > > PMD is changed it means there may be parallel THP collapse, so GUP > > > should back off. > > > > Could the race also be fixed by impl pmdp_collapse_flush() correctly for > > the archs that are missing? Do you know which arch(s) is broken with it? > > Yes, and this was suggested by me in the first place, but per the > suggestion from John and David, this is not the preferred way. I think > it is because: > > Firstly, using IPI to serialize against fast GUP is not recommended > anymore since fast GUP does check PTE then back off so we should avoid > it. > Secondly, if checking PMD then backing off could solve the problem, > why do we still need broadcast IPI? It doesn't sound performant. > > > > > It's just not clear to me whether this patch is an optimization or a fix, > > if it's a fix whether the IPI broadcast in ppc pmdp_collapse_flush() would > > still be needed. > > It is a fix and the fix will make IPI broadcast not useful anymore. How about another patch to remove the ppc impl too? Then it can be a two patches series. So that ppc developers can be copied and maybe it helps to have the ppc people looking at current approach too. Then the last piece of it is the s390 pmdp_collapse_flush(). I'm wondering whether generic pmdp_collapse_flush() would be good enough, since the only addition comparing to the s390 one will be flush_tlb_range() (which is a further __tlb_flush_mm_lazy). David may have some thoughts. The patch itself looks good to me, one trivial nit below. > > > > > Thanks, > > > > > > > > Also update the stale comment about serializing against fast GUP in > > > khugepaged. > > > > > > Fixes: 2667f50e8b81 ("mm: introduce a general RCU get_user_pages_fast()") > > > Signed-off-by: Yang Shi > > > --- > > > mm/gup.c | 30 ++++++++++++++++++++++++------ > > > mm/khugepaged.c | 10 ++++++---- > > > 2 files changed, 30 insertions(+), 10 deletions(-) > > > > > > diff --git a/mm/gup.c b/mm/gup.c > > > index f3fc1f08d90c..4365b2811269 100644 > > > --- a/mm/gup.c > > > +++ b/mm/gup.c > > > @@ -2380,8 +2380,9 @@ static void __maybe_unused undo_dev_pagemap(int *nr, int nr_start, > > > } > > > > > > #ifdef CONFIG_ARCH_HAS_PTE_SPECIAL > > > -static int gup_pte_range(pmd_t pmd, unsigned long addr, unsigned long end, > > > - unsigned int flags, struct page **pages, int *nr) > > > +static int gup_pte_range(pmd_t pmd, pmd_t *pmdp, unsigned long addr, > > > + unsigned long end, unsigned int flags, > > > + struct page **pages, int *nr) > > > { > > > struct dev_pagemap *pgmap = NULL; > > > int nr_start = *nr, ret = 0; > > > @@ -2423,7 +2424,23 @@ static int gup_pte_range(pmd_t pmd, unsigned long addr, unsigned long end, > > > goto pte_unmap; > > > } > > > > > > - if (unlikely(pte_val(pte) != pte_val(*ptep))) { > > > + /* > > > + * THP collapse conceptually does: > > > + * 1. Clear and flush PMD > > > + * 2. Check the base page refcount > > > + * 3. Copy data to huge page > > > + * 4. Clear PTE > > > + * 5. Discard the base page > > > + * > > > + * So fast GUP may race with THP collapse then pin and > > > + * return an old page since TLB flush is no longer sufficient > > > + * to serialize against fast GUP. > > > + * > > > + * Check PMD, if it is changed just back off since it > > > + * means there may be parallel THP collapse. Would you mind rewording this comment a bit? I feel it a bit weird to suddenly mention about thp collapse especially its details. Maybe some statement on the whole history of why check pte, and in what case pmd check is needed (where the thp collapse example can be moved to, imho)? One of my attempt for reference.. /* * Fast-gup relies on pte change detection to avoid * concurrent pgtable operations. * * To pin the page, fast-gup needs to do below in order: * (1) pin the page (by prefetching pte), then (2) check * pte not changed. * * For the rest of pgtable operations where pgtable updates * can be racy with fast-gup, we need to do (1) clear pte, * then (2) check whether page is pinned. * * Above will work for all pte-level operations, including * thp split. * * For thp collapse, it's a bit more complicated because * with RCU pgtable free fast-gup can be walking a pgtable * page that is being freed (so pte is still valid but pmd * can be cleared already). To avoid race in such * condition, we need to also check pmd here to make sure * pmd doesn't change (corresponds to pmdp_collapse_flush() * in the thp collide code path). */ If you agree with the comment change, feel free to add: Acked-by: Peter Xu Thanks, -- Peter Xu