Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp7159886rwr; Tue, 2 May 2023 10:14:20 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5fveJ/qCqLF5pmuh8Tkb+6pl0STJorD1l9r3Utl4o4Oj/E3dS6Ll/zSqlcumYENUOe+0dx X-Received: by 2002:a05:6a21:598:b0:ef:e240:b552 with SMTP id lw24-20020a056a21059800b000efe240b552mr20332189pzb.46.1683047659825; Tue, 02 May 2023 10:14:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683047659; cv=none; d=google.com; s=arc-20160816; b=y85l4Y3UDvL4Nv72p/30uD1pfc1SYpHsGfTFwfc3VZ9vCEnwejAW2s2VcUXkbdMnSp pCNTPCmfaHBRwz+1URjar3re4v0N80N4p74tv0KZQqh40EJse38PG3eRQA+iNXembrDL rKVg+DPbtMAGWqKQBGnBdYOg4j9pL7NsU//yCDq0gmmW2cBI7iMxqd+naT6BsIcn8nQz ur1Mt6qVDFt93t4ZgvXvL+vIvql1yubgHyBgtbSLwpJPcJ9T2AOjMRcciRY/xuCA2U3l f9FXtolIxDi0rR+nexvWIAB69FedYExxFbDG4nSAob9xiO7lKEYu3lZUNzt61z7tQsKE skeA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=gDM4DO3TbkRL3r8IKhcmVsV7m/y1S1/C/3x0ontbi30=; b=LFvs4t092nYWddvo5zm3692Vo3zUSGr4mh+PmReZzMwavHBTTcEd0+QPnhfQJYfStn D8uZ6+pVPYxexK5XtxB6clCbqRCN5kgQ3gmgYsuXKykUeHb4ofMobGUEucxC5cGRhYHa i+TrMkjy2DyPS9iAUUe1a4tGjF/Ie9zo7PSp23hh0ypXzEZYGBsQdzgVyl5aMgwCMIAH cl2n7Mnz5LnUQe25NJBsNc0BB95/djITGGNAN2+Bu/6RfPfnfuMlW3tRHlvlFSzNqN5d tQS0p0pBunYSgvPK4F6WWNFwYC4BGEdNG1pw2wnA5OsFcb8lXf91SfzBGxqZT3+t/+F5 Yn1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b=i+Ng0svd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j71-20020a638b4a000000b0052c4fdb2c7esi983215pge.466.2023.05.02.10.13.55; Tue, 02 May 2023 10:14:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b=i+Ng0svd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233957AbjEBRJV (ORCPT + 99 others); Tue, 2 May 2023 13:09:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50780 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231964AbjEBRJT (ORCPT ); Tue, 2 May 2023 13:09:19 -0400 Received: from mail-wr1-x434.google.com (mail-wr1-x434.google.com [IPv6:2a00:1450:4864:20::434]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3B4A2AB; Tue, 2 May 2023 10:09:18 -0700 (PDT) Received: by mail-wr1-x434.google.com with SMTP id ffacd0b85a97d-2f7db354092so2547448f8f.2; Tue, 02 May 2023 10:09:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1683047356; x=1685639356; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date:from:to :cc:subject:date:message-id:reply-to; bh=gDM4DO3TbkRL3r8IKhcmVsV7m/y1S1/C/3x0ontbi30=; b=i+Ng0svdbjvDz1lU1l9oIS0x0EA11QMmwFOFitHGKRiM43QlOtWkKU0hY0Wfdcw2VC qKmLjZ3YTZRUzcb8DpjLz1C1aVhCEfv2AiLR2PidmVAfbisNEPMEJD7T11Cjm6V0j2qV OPzJ0R8I0moMTXA0GQeoWhzKPav3yvaX9dsvS99xspaIb2zr0tlLFodP62ffsXdp5Yn5 GtxZ3CQn8XTbv0skW4BbfKpsRnMi/9O3HqdEYcpdQ6ogwMNuen5Omd0vKURs3DEamOy8 EkmyOsBLGiuzYnHV+oxhTz1r4oqQUsZSGKJRZ2Pa92PMlXCAv3hbvO7bL5Mc/Peyj7iR GCGg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683047357; x=1685639357; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=gDM4DO3TbkRL3r8IKhcmVsV7m/y1S1/C/3x0ontbi30=; b=ZiHCCgJhndn9QbGw0nJ1BFztNyfwqufJqf48E3gcVp1AVhkXmfRtotG5gE/fPreDcK ErG/99shDgetbP7uxX6jwblHju99c2XPwpnEctvonBlX7HSPJnrWBXvYPXhC3nz2edm/ UTz5pSKAa7DYHz7CjpJ1YSCz8sL1hauhv8W+PJbUFHq6HmgQbWUuIB/jB9LFjMfd566q V0DHgDgR34sItx5CoVVkgGvJiiywFFQ0j4j9oqZXpvCFFcnM7dTYHR6RsG7JvCKeu+h3 g2GKUVUD+5Y4PBfe0EoCab52wyCnFdo5GoO2NOu0ovaXkL4/GvhK1M76H+uoXHQ7+/Pl r6zA== X-Gm-Message-State: AC+VfDxlA3V0SZD3gmI6Jh9GI8WCDY7vZ0DjVSqUQA5SeCkycqGwjY99 zJ4XcCHPbIr8Gmvg7+MDHOw33wQe7XNiCA== X-Received: by 2002:a5d:6d4b:0:b0:2f5:8e8b:572c with SMTP id k11-20020a5d6d4b000000b002f58e8b572cmr12254538wri.49.1683047356442; Tue, 02 May 2023 10:09:16 -0700 (PDT) Received: from localhost (host86-156-84-164.range86-156.btcentralplus.com. [86.156.84.164]) by smtp.gmail.com with ESMTPSA id g2-20020a5d5402000000b002da75c5e143sm31378906wrv.29.2023.05.02.10.09.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 02 May 2023 10:09:15 -0700 (PDT) Date: Tue, 2 May 2023 18:09:14 +0100 From: Lorenzo Stoakes To: David Hildenbrand Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, Andrew Morton , Jason Gunthorpe , Jens Axboe , Matthew Wilcox , Dennis Dalessandro , Leon Romanovsky , Christian Benvenuti , Nelson Escobar , Bernard Metzler , Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Mark Rutland , Alexander Shishkin , Jiri Olsa , Namhyung Kim , Ian Rogers , Adrian Hunter , Bjorn Topel , Magnus Karlsson , Maciej Fijalkowski , Jonathan Lemon , "David S . Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Christian Brauner , Richard Cochran , Alexei Starovoitov , Daniel Borkmann , Jesper Dangaard Brouer , John Fastabend , linux-fsdevel@vger.kernel.org, linux-perf-users@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org, Oleg Nesterov , Jason Gunthorpe , John Hubbard , Jan Kara , "Kirill A . Shutemov" , Pavel Begunkov , Mika Penttila , Dave Chinner , Theodore Ts'o , Peter Xu , Matthew Rosato , "Paul E . McKenney" , Christian Borntraeger Subject: Re: [PATCH v7 1/3] mm/mmap: separate writenotify and dirty tracking logic Message-ID: References: <72a90af5a9e4445a33ae44efa710f112c2694cb1.1683044162.git.lstoakes@gmail.com> <56696a72-24fa-958e-e6a1-7a17c9e54081@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 02, 2023 at 05:53:46PM +0100, Lorenzo Stoakes wrote: > On Tue, May 02, 2023 at 06:38:53PM +0200, David Hildenbrand wrote: > > On 02.05.23 18:34, Lorenzo Stoakes wrote: > > > vma_wants_writenotify() is specifically intended for setting PTE page table > > > flags, accounting for existing PTE flag state and whether that might > > > already be read-only while mixing this check with a check whether the > > > filesystem performs dirty tracking. > > > > > > Separate out the notions of dirty tracking and a PTE write notify checking > > > in order that we can invoke the dirty tracking check from elsewhere. > > > > > > Note that this change introduces a very small duplicate check of the > > > separated out vm_ops_needs_writenotify(). This is necessary to avoid making > > > vma_needs_dirty_tracking() needlessly complicated (e.g. passing a > > > check_writenotify flag or having it assume this check was already > > > performed). This is such a small check that it doesn't seem too egregious > > > to do this. > > > > > > Signed-off-by: Lorenzo Stoakes > > > Reviewed-by: John Hubbard > > > Reviewed-by: Mika Penttil? > > > Reviewed-by: Jan Kara > > > Reviewed-by: Jason Gunthorpe > > > --- > > > include/linux/mm.h | 1 + > > > mm/mmap.c | 36 +++++++++++++++++++++++++++--------- > > > 2 files changed, 28 insertions(+), 9 deletions(-) > > > > > > diff --git a/include/linux/mm.h b/include/linux/mm.h > > > index 27ce77080c79..7b1d4e7393ef 100644 > > > --- a/include/linux/mm.h > > > +++ b/include/linux/mm.h > > > @@ -2422,6 +2422,7 @@ extern unsigned long move_page_tables(struct vm_area_struct *vma, > > > #define MM_CP_UFFD_WP_ALL (MM_CP_UFFD_WP | \ > > > MM_CP_UFFD_WP_RESOLVE) > > > +bool vma_needs_dirty_tracking(struct vm_area_struct *vma); > > > int vma_wants_writenotify(struct vm_area_struct *vma, pgprot_t vm_page_prot); > > > static inline bool vma_wants_manual_pte_write_upgrade(struct vm_area_struct *vma) > > > { > > > diff --git a/mm/mmap.c b/mm/mmap.c > > > index 5522130ae606..295c5f2e9bd9 100644 > > > --- a/mm/mmap.c > > > +++ b/mm/mmap.c > > > @@ -1475,6 +1475,31 @@ SYSCALL_DEFINE1(old_mmap, struct mmap_arg_struct __user *, arg) > > > } > > > #endif /* __ARCH_WANT_SYS_OLD_MMAP */ > > > +/* Do VMA operations imply write notify is required? */ > > > +static bool vm_ops_needs_writenotify(const struct vm_operations_struct *vm_ops) > > > +{ > > > + return vm_ops && (vm_ops->page_mkwrite || vm_ops->pfn_mkwrite); > > > +} > > > + > > > +/* > > > + * Does this VMA require the underlying folios to have their dirty state > > > + * tracked? > > > + */ > > > +bool vma_needs_dirty_tracking(struct vm_area_struct *vma) > > > +{ > > > > Sorry for not noticing this earlier, but ... > > pints_owed++ > > > > > what about MAP_PRIVATE mappings? When we write, we populate an anon page, > > which will work as expected ... because we don't have to notify the fs? > > > > I think you really also want the "If it was private or non-writable, the > > write bit is already clear */" part as well and remove "false" in that case. > > > > Not sure a 'write bit is already clear' case is relevant to checking > whether a filesystem dirty tracks? That seems specific entirely to the page > table bits. > > That's why I didn't include it, > > A !VM_WRITE shouldn't be GUP-writable except for FOLL_FORCE, and that > surely could be problematic if VM_MAYWRITE later? > > Thinking about it though a !VM_SHARE should probably can be safely assumed > to not be dirty-trackable, so we probably do need to add a check for > !VM_SHARED -> !vma_needs_dirty_tracking > On second thoughts, we explicitly check FOLL_FORCE && !is_cow_mapping() in check_vma_flags() so that case cannot occur. So actually yes we should probably include this on the basis of that and the fact that a FOLL_WRITE operation will CoW the MAP_PRIVATE mapping. This was an (over)abundance of caution. Will fix on respin. > > Or was there a good reason to disallow private mappings as well? > > > > Until the page is CoW'd walking the page tables will get you to the page > cache page right? This was the reason I (perhaps rather too quickly) felt > MAP_PRIVATE should be excluded. > > However a FOLL_WRITE would trigger CoW... and then we'd be trivially OK. > > So yeah, ok perhaps I dismissed that a little too soon. I was concerned > about some sort of egregious FOLL_FORCE case where somehow we'd end up with > the page cache folio. But actually, that probably can't happen... > > > -- > > Thanks, > > > > David / dhildenb > >