Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp22779212rwd; Fri, 30 Jun 2023 12:31:19 -0700 (PDT) X-Google-Smtp-Source: APBJJlF07LeH806c40saZTHmada3BMyKnXk6DaLnoK0MB4IYwjHwPqwbHjnEWtFN7txo2y/J/zKc X-Received: by 2002:a05:6a00:1a0b:b0:67a:39c4:5bb5 with SMTP id g11-20020a056a001a0b00b0067a39c45bb5mr3272901pfv.6.1688153478633; Fri, 30 Jun 2023 12:31:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1688153478; cv=none; d=google.com; s=arc-20160816; b=uniO0XVkl9NtB189sCmp3PjQ/CIrD6XR22XCenxgGPUt8v0QQJvocNMmxtsNc7+/vv Az9fdtnAaymEDRzM+gt9A9Kja+/Z9VAQkL2ZscS5bxK8y2dowD0Ily9E0z+6li75tWwz neigPuxvBqq2duE1aTrwa4gb8Q4uDf3cLWc5Ycb2j0HIGdBQna/BFiaxc/PR+t6ZU7kd rSbMBHtsrsWdTVWPm9s9+SRmiYl0LPLSKudrOQw8981ksQkdEsGXPRGfiRijVtJQ0vDH 9GnOTQIHbOueX6i0uHMhP8jNEMQEm9GV+3lmTvKid4ADHbZZr1mBms/e2uETAEJDXo3h bd/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:message-id:in-reply-to :subject:cc:to:from:date:dkim-signature; bh=UpA/3MkDA4Bbb6eJ6xeemnz64HxyzKE7wrEAQ570pfY=; fh=AdfoamapdZUvbC/I2wGhR7ceMnYUZ9zrn8UQ+HX/8vQ=; b=sbtXfMPtgKeofLiA3f7H85nB4InArwBQ2tptshVVZbM8yC4GBxMgIWZ5MXP4Ab+WCW GUDVJ+noU/tVKntfPMtNk5gScIyJUv1k/aL/0uKwwh27I/kcixkubOL0tf9TbMg6Bzgm 5y7igYro2f1eWXV8MV0qMx78XU1KmfOizfxXsVrrTjDDQkj8DtCIGHaVZMySV5avRsHu 1P3AJLwD/U9FzScQuHx/XCkrbB7hUrXadwkMY9JA4Xn4QiG5LM0BRWCkBk3Psznyr1jG 1h3gagTHzuS0lEklTKzVmhjM3gUDpkajRGDMfaWPVSrlO953uCQf/JbNlzWpMNk9xiGP E/UA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=qrvgu39+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i185-20020a6387c2000000b0053490e8df50si12745502pge.223.2023.06.30.12.31.03; Fri, 30 Jun 2023 12:31:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=qrvgu39+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229484AbjF3TXA (ORCPT + 99 others); Fri, 30 Jun 2023 15:23:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58872 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229546AbjF3TW6 (ORCPT ); Fri, 30 Jun 2023 15:22:58 -0400 Received: from mail-yb1-xb32.google.com (mail-yb1-xb32.google.com [IPv6:2607:f8b0:4864:20::b32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 171783C3A for ; Fri, 30 Jun 2023 12:22:56 -0700 (PDT) Received: by mail-yb1-xb32.google.com with SMTP id 3f1490d57ef6-bd744ffc263so2189753276.3 for ; Fri, 30 Jun 2023 12:22:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1688152975; x=1690744975; h=mime-version:references:message-id:in-reply-to:subject:cc:to:from :date:from:to:cc:subject:date:message-id:reply-to; bh=UpA/3MkDA4Bbb6eJ6xeemnz64HxyzKE7wrEAQ570pfY=; b=qrvgu39+Pjzc0ty+cMKIrH7Eni71vn8ej746goZG1tt82sCTsmWg6sBEtMY5CYHkvc xclnmytvO77Jk7WZZk/il6ovWRv1QJV2T5YBR38m1fpA60DTf2h7Xd6BRbHgj9AvET1p tRCXjgGhJ6lxaDD/J1iU2O9lhqpC8W/NCc+eL3bbCVdX54HfuY4wUAcwYj6APMOTcz4G f66Hj1VDT8JxouLBXxbgSCkSfpv2cMeVkvsNVflvvYlmarJ0nMeAwtFB3YcpKUnimWJd M0kxVMaVqi4PmA2kSbzsqFbGlI4UBRtOwklt4JjwKtiq8VRHxGS9MYdDm87KrkMzPwwX AxHQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1688152975; x=1690744975; h=mime-version:references:message-id:in-reply-to:subject:cc:to:from :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=UpA/3MkDA4Bbb6eJ6xeemnz64HxyzKE7wrEAQ570pfY=; b=ihuPq/QUdG4yB+Jo7Jjw1kcWf1JHnbGcgWgMWqQs3HQpU+uW1M9WZXAe4qxvEr52dj A5DR9ha0XZqJl5UYtHtmsz3/j7zHOvht5gIh2YqAVxsikb24nbnL24x4eOhBtuIzVC5A VB2dSJCbsr1lbdPGmCtTNDtnuJKSs4zysXW8XIz7sYWgAUXHtSQruzLuTO/5WTAUX8VZ l2z63JWnq81c2j36hjJeyadjTfruLGdwCX2omqav1GTZ654LjqZOR/4WUELW2tRgwOHL ow9NzgmEXiTAWhpiXlA38ScHrwCY2SZO+l8OxpbTFEbc3BkWhdcIKf1timqUkT5Gzibw PDNw== X-Gm-Message-State: ABy/qLZp/+DVSo3Rfja8THKG7C4P3MGOs3aDexjB7dA6b1oavAOnlpJi /vIX39HGtC7GlMRB580ykQ8uGQ== X-Received: by 2002:a25:ce04:0:b0:c22:82b1:17ee with SMTP id x4-20020a25ce04000000b00c2282b117eemr3233485ybe.63.1688152975093; Fri, 30 Jun 2023 12:22:55 -0700 (PDT) Received: from ripple.attlocal.net (172-10-233-147.lightspeed.sntcca.sbcglobal.net. [172.10.233.147]) by smtp.gmail.com with ESMTPSA id t4-20020a259ac4000000b00bb144da7d68sm2968477ybo.13.2023.06.30.12.22.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jun 2023 12:22:54 -0700 (PDT) Date: Fri, 30 Jun 2023 12:22:43 -0700 (PDT) From: Hugh Dickins X-X-Sender: hugh@ripple.attlocal.net To: Claudio Imbrenda cc: Hugh Dickins , Andrew Morton , Gerald Schaefer , Vasily Gorbik , Mike Kravetz , Mike Rapoport , "Kirill A. Shutemov" , Matthew Wilcox , David Hildenbrand , Suren Baghdasaryan , Qi Zheng , Yang Shi , Mel Gorman , Peter Xu , Peter Zijlstra , Will Deacon , Yu Zhao , Alistair Popple , Ralph Campbell , Ira Weiny , Steven Price , SeongJae Park , Lorenzo Stoakes , Huang Ying , Naoya Horiguchi , Christophe Leroy , Zack Rusin , Jason Gunthorpe , Axel Rasmussen , Anshuman Khandual , Pasha Tatashin , Miaohe Lin , Minchan Kim , Christoph Hellwig , Song Liu , Thomas Hellstrom , Russell King , "David S. Miller" , Michael Ellerman , "Aneesh Kumar K.V" , Heiko Carstens , Christian Borntraeger , Alexander Gordeev , Jann Horn , Vishal Moola , Vlastimil Babka , linux-arm-kernel@lists.infradead.org, sparclinux@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: Re: [PATCH v2 07/12] s390: add pte_free_defer() for pgtables sharing page In-Reply-To: <20230630182556.7727ef50@p-imbrenda> Message-ID: <7f6d399b-c47-1faa-f7f6-9932b9811f8c@google.com> References: <54cb04f-3762-987f-8294-91dafd8ebfb0@google.com> <20230630153852.31163592@p-imbrenda> <062b19-4cf1-261-a9bf-9cefd32382fc@google.com> <20230630182556.7727ef50@p-imbrenda> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 30 Jun 2023, Claudio Imbrenda wrote: > On Fri, 30 Jun 2023 08:28:54 -0700 (PDT) > Hugh Dickins wrote: > > On Fri, 30 Jun 2023, Claudio Imbrenda wrote: > > > On Tue, 20 Jun 2023 00:51:19 -0700 (PDT) > > > Hugh Dickins wrote: > > > > > > [...] > > > > > > > +void pte_free_defer(struct mm_struct *mm, pgtable_t pgtable) > > > > +{ > > > > + unsigned int bit, mask; > > > > + struct page *page; > > > > + > > > > + page = virt_to_page(pgtable); > > > > + if (mm_alloc_pgste(mm)) { > > > > + call_rcu(&page->rcu_head, pte_free_pgste); > > > > > > so is this now going to be used to free page tables > > > instead of page_table_free_rcu? > > > > No. > > > > All pte_free_defer() is being used for (in this series; and any future > > use beyond this series will have to undertake its own evaluations) is > > for the case of removing an empty page table, which used to map a group > > of PTE mappings of a file, in order to make way for one PMD mapping of > > the huge page which those scattered pages have now been gathered into. > > > > You're worried by that mm_alloc_pgste() block: it's something I didn't > > actually no, but thanks for bringing it up :D > > > have at all in my first draft, then I thought that perhaps the pgste > > case might be able to come this way, so it seemed stupid to leave out > > the handling for it. > > > > I hope that you're implying that should be dead code here? Perhaps, > > that the pgste case corresponds to the case in s390 where THPs are > > absolutely forbidden? That would be good news for us. > > > > Gerald, in his version of this block, added a comment asking: > > /* > > * TODO: Do we need gmap_unlink(mm, pgtable, addr), like in > > * page_table_free_rcu()? > > * If yes -> need addr parameter here, like in pte_free_tlb(). > > */ > > Do you have the answer to that? Neither of us could work it out. > > this is the thing I'm worried about; removing a page table that was > used to map a guest will leave dangling pointers in the gmap that will > cause memory corruption (I actually ran into that problem myself for > another patchseries). > > gmap_unlink() is needed to clean up the pointers before they become > dangling (and also potentially do some TLB purging as needed) That's something I would have expected to be handled already via mmu_notifiers, rather than buried inside the page table freeing. If s390 is the only architecture to go that way, and could instead do it via mmu_notifiers, then I think that will be more easily supported in the long term. But I'm writing from a position of very great ignorance: advising KVM on s390 is many dimensions away from what I'm capable of. > > the point here is: we need that only for page_table_free_rcu(); all > other users of page_table_free() cannot act on guest page tables I might be wrong, but I think that most users of page_table_free() are merely freeing a page table which had to be allocated up front, but was then found unnecessary (maybe a racing task already inserted one): page tables which were never exposed to actual use. > (because we don't allow THP for KVM guests). and that is why > page_table_free() does not do gmap_unlink() currently. But THP collapse does (or did before this series) use it to free a page table which had been exposed to use. The fact that s390 does not allow THP for KVM guests makes page_table_free(), and this new pte_free_defer(), safe for that; but it feels dangerously coincidental. It's easy to imagine a future change being made, which would stumble over this issue. I have imagined that pte_free_defer() will be useful in future, in the freeing of empty page tables: but s390 may pose a problem there - though perhaps no more of a problem than additionally needing to pass a virtual address down the stack. > > > > > > > > > or will it be used instead of page_table_free? > > > > Not always; but yes, this case of removing a page table used > > page_table_free() before; but now, with the lighter locking, needs > > to keep the page table valid until the RCU grace period expires. > > so if I understand correctly your code will, sometimes, under some > circumstances, replace what page_table_free() does, but it will never > replace page_table_free_rcu()? > > because in that case there would be no issues Yes, thanks for confirming: we have no issue here at present, but may do if use of pte_free_defer() is extended to other contexts in future. Would it be appropriate to add a WARN_ON_ONCE around that > > > > + if (mm_alloc_pgste(mm)) { in pte_free_defer()? I ask that somewhat rhetorically: that block disappears in the later version I was working on last night (and will return to shortly), in which pte_free_defer() just sets a bit and calls page_table_free(). But I'd like to understand the possibilities better: does mm_alloc_pgste() correspond 1:1 to KVM guest on s390, or does it cover several different possibilities of which KVM guest is one, or am I just confused to be thinking there's any relationship? Thanks, Hugh > > > > > > > > > this is actually quite important for KVM on s390 > > > > None of us are wanting to break KVM on s390: your guidance appreciated! > > > > Thanks, > > Hugh