Received: by 2002:a05:7412:2a91:b0:fc:a2b0:25d7 with SMTP id u17csp32157rdh; Tue, 13 Feb 2024 08:32:00 -0800 (PST) X-Forwarded-Encrypted: i=2; AJvYcCVk4t6KxR6ktY2b7uMmuj7td4/IZi5KzbWktS0Q9XA36y92MEH2LZQ4QXjelpr5c1kazA4SAzy8vjjXtBqMFTOtn08H3qs8tI46jXRrZA== X-Google-Smtp-Source: AGHT+IG7pruWKOT+ZD60UqfoPtuMYiDT2QHk466uZS8gxMYPf7BrQC1Shrcjkc2ZBpe/vTqThFB7 X-Received: by 2002:a05:6402:1254:b0:562:1819:bbc4 with SMTP id l20-20020a056402125400b005621819bbc4mr128020edw.6.1707841920426; Tue, 13 Feb 2024 08:32:00 -0800 (PST) X-Forwarded-Encrypted: i=2; AJvYcCUcFhzs87O+FkEH/W01m3bZ2WpMsB3qcs+5zfBFQhR6EGcSufeXfGCulExXd0fDNXY7bKDgYCFgf4CdjUaVv4AvbcUMHOR7uejqmEwQIQ== Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id j27-20020a508a9b000000b00560d6e9cd4esi3773965edj.335.2024.02.13.08.32.00 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 13 Feb 2024 08:32:00 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-63891-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; arc=fail (body hash mismatch); spf=pass (google.com: domain of linux-kernel+bounces-63891-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-63891-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 06AC71F2394A for ; Tue, 13 Feb 2024 16:32:00 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id A409BBA53; Tue, 13 Feb 2024 16:31:51 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id DD4902919 for ; Tue, 13 Feb 2024 16:31:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707841910; cv=none; b=ry4Ai4pJz3WYkanYqnUxF1nS9jDT9LB/yrpCKBRAW50pLs0KZLvyDakIPE7R2bleY1tzDp7M8zdJlLL16P+GdQqZlOv6N7S/HtdVyHH+imRDN7TPH7oz89nT2/wc98cvDnx3ea5V8Lt+B9WVn2BIkDvLdenGj1QdPCQr7Y51ezo= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707841910; c=relaxed/simple; bh=/kkLoYdzhCdq3WELOZKd9MgucjRXD6NUBDgH9zSLoyw=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=XvPqi4wb4yN9pFUsofoV+1VsUgJ16ybMJsAprc0L/CxfTF2QYW2WH93bvhxNsDaPj/N1N3t9CtdK5QdGlaA92zrvrSGCm5kEH8+cM91LweQ7c03vxoUWy+Fzwccb6yh9S4GEiVg1hJEgHSIYe72740RxNdFlvF4AzhUCLUxujfs= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 09511DA7; Tue, 13 Feb 2024 08:32:27 -0800 (PST) Received: from FVFF77S0Q05N.cambridge.arm.com (FVFF77S0Q05N.cambridge.arm.com [10.1.36.130]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1051A3F5A1; Tue, 13 Feb 2024 08:31:41 -0800 (PST) Date: Tue, 13 Feb 2024 16:31:36 +0000 From: Mark Rutland To: Ryan Roberts Cc: Catalin Marinas , Will Deacon , Ard Biesheuvel , Marc Zyngier , James Morse , Andrey Ryabinin , Andrew Morton , Matthew Wilcox , David Hildenbrand , Kefeng Wang , John Hubbard , Zi Yan , Barry Song <21cnbao@gmail.com>, Alistair Popple , Yang Shi , Nicholas Piggin , Christophe Leroy , "Aneesh Kumar K.V" , "Naveen N. Rao" , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , linux-arm-kernel@lists.infradead.org, x86@kernel.org, linuxppc-dev@lists.ozlabs.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v5 20/25] arm64/mm: Implement new wrprotect_ptes() batch API Message-ID: References: <20240202080756.1453939-1-ryan.roberts@arm.com> <20240202080756.1453939-21-ryan.roberts@arm.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240202080756.1453939-21-ryan.roberts@arm.com> On Fri, Feb 02, 2024 at 08:07:51AM +0000, Ryan Roberts wrote: > Optimize the contpte implementation to fix some of the fork performance > regression introduced by the initial contpte commit. Subsequent patches > will solve it entirely. > > During fork(), any private memory in the parent must be write-protected. > Previously this was done 1 PTE at a time. But the core-mm supports > batched wrprotect via the new wrprotect_ptes() API. So let's implement > that API and for fully covered contpte mappings, we no longer need to > unfold the contpte. This has 2 benefits: > > - reduced unfolding, reduces the number of tlbis that must be issued. > - The memory remains contpte-mapped ("folded") in the parent, so it > continues to benefit from the more efficient use of the TLB after > the fork. > > The optimization to wrprotect a whole contpte block without unfolding is > possible thanks to the tightening of the Arm ARM in respect to the > definition and behaviour when 'Misprogramming the Contiguous bit'. See > section D21194 at https://developer.arm.com/documentation/102105/latest/ Minor nit, but it'd be better to refer to a specific revision of the document, e.g. https://developer.arm.com/documentation/102105/ja-07/ That way people can see the specific version of the text you were referring to even if that changes later, and it means the link is still useful when D21194 gets merged into the ARM ARM and dropped from the known issues doc. > > Tested-by: John Hubbard > Signed-off-by: Ryan Roberts > --- > arch/arm64/include/asm/pgtable.h | 61 ++++++++++++++++++++++++++------ > arch/arm64/mm/contpte.c | 35 ++++++++++++++++++ > 2 files changed, 86 insertions(+), 10 deletions(-) > > diff --git a/arch/arm64/include/asm/pgtable.h b/arch/arm64/include/asm/pgtable.h > index 34892a95403d..c07f0d563733 100644 > --- a/arch/arm64/include/asm/pgtable.h > +++ b/arch/arm64/include/asm/pgtable.h > @@ -978,16 +978,12 @@ static inline pmd_t pmdp_huge_get_and_clear(struct mm_struct *mm, > } > #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ > > -/* > - * __ptep_set_wrprotect - mark read-only while trasferring potential hardware > - * dirty status (PTE_DBM && !PTE_RDONLY) to the software PTE_DIRTY bit. > - */ > -static inline void __ptep_set_wrprotect(struct mm_struct *mm, > - unsigned long address, pte_t *ptep) > +static inline void ___ptep_set_wrprotect(struct mm_struct *mm, > + unsigned long address, pte_t *ptep, > + pte_t pte) > { > - pte_t old_pte, pte; > + pte_t old_pte; > > - pte = __ptep_get(ptep); > do { > old_pte = pte; > pte = pte_wrprotect(pte); > @@ -996,6 +992,25 @@ static inline void __ptep_set_wrprotect(struct mm_struct *mm, > } while (pte_val(pte) != pte_val(old_pte)); > } > > +/* > + * __ptep_set_wrprotect - mark read-only while trasferring potential hardware > + * dirty status (PTE_DBM && !PTE_RDONLY) to the software PTE_DIRTY bit. > + */ > +static inline void __ptep_set_wrprotect(struct mm_struct *mm, > + unsigned long address, pte_t *ptep) > +{ > + ___ptep_set_wrprotect(mm, address, ptep, __ptep_get(ptep)); > +} > + > +static inline void __wrprotect_ptes(struct mm_struct *mm, unsigned long address, > + pte_t *ptep, unsigned int nr) > +{ > + unsigned int i; > + > + for (i = 0; i < nr; i++, address += PAGE_SIZE, ptep++) > + __ptep_set_wrprotect(mm, address, ptep); > +} > + > #ifdef CONFIG_TRANSPARENT_HUGEPAGE > #define __HAVE_ARCH_PMDP_SET_WRPROTECT > static inline void pmdp_set_wrprotect(struct mm_struct *mm, > @@ -1156,6 +1171,8 @@ extern int contpte_ptep_test_and_clear_young(struct vm_area_struct *vma, > unsigned long addr, pte_t *ptep); > extern int contpte_ptep_clear_flush_young(struct vm_area_struct *vma, > unsigned long addr, pte_t *ptep); > +extern void contpte_wrprotect_ptes(struct mm_struct *mm, unsigned long addr, > + pte_t *ptep, unsigned int nr); > extern int contpte_ptep_set_access_flags(struct vm_area_struct *vma, > unsigned long addr, pte_t *ptep, > pte_t entry, int dirty); > @@ -1269,12 +1286,35 @@ static inline int ptep_clear_flush_young(struct vm_area_struct *vma, > return contpte_ptep_clear_flush_young(vma, addr, ptep); > } > > +#define wrprotect_ptes wrprotect_ptes > +static inline void wrprotect_ptes(struct mm_struct *mm, unsigned long addr, > + pte_t *ptep, unsigned int nr) > +{ > + if (likely(nr == 1)) { > + /* > + * Optimization: wrprotect_ptes() can only be called for present > + * ptes so we only need to check contig bit as condition for > + * unfold, and we can remove the contig bit from the pte we read > + * to avoid re-reading. This speeds up fork() which is sensitive > + * for order-0 folios. Equivalent to contpte_try_unfold(). > + */ > + pte_t orig_pte = __ptep_get(ptep); > + > + if (unlikely(pte_cont(orig_pte))) { > + __contpte_try_unfold(mm, addr, ptep, orig_pte); > + orig_pte = pte_mknoncont(orig_pte); > + } > + ___ptep_set_wrprotect(mm, addr, ptep, orig_pte); > + } else { > + contpte_wrprotect_ptes(mm, addr, ptep, nr); > + } > +} > + > #define __HAVE_ARCH_PTEP_SET_WRPROTECT > static inline void ptep_set_wrprotect(struct mm_struct *mm, > unsigned long addr, pte_t *ptep) > { > - contpte_try_unfold(mm, addr, ptep, __ptep_get(ptep)); > - __ptep_set_wrprotect(mm, addr, ptep); > + wrprotect_ptes(mm, addr, ptep, 1); > } > > #define __HAVE_ARCH_PTEP_SET_ACCESS_FLAGS > @@ -1306,6 +1346,7 @@ static inline int ptep_set_access_flags(struct vm_area_struct *vma, > #define ptep_clear_flush_young __ptep_clear_flush_young > #define __HAVE_ARCH_PTEP_SET_WRPROTECT > #define ptep_set_wrprotect __ptep_set_wrprotect > +#define wrprotect_ptes __wrprotect_ptes > #define __HAVE_ARCH_PTEP_SET_ACCESS_FLAGS > #define ptep_set_access_flags __ptep_set_access_flags > > diff --git a/arch/arm64/mm/contpte.c b/arch/arm64/mm/contpte.c > index bfb50e6b44c7..c85e64baf03b 100644 > --- a/arch/arm64/mm/contpte.c > +++ b/arch/arm64/mm/contpte.c > @@ -23,6 +23,23 @@ static inline pte_t *contpte_align_down(pte_t *ptep) > return (pte_t *)(ALIGN_DOWN((unsigned long)ptep >> 3, CONT_PTES) << 3); > } > > +static void contpte_try_unfold_partial(struct mm_struct *mm, unsigned long addr, > + pte_t *ptep, unsigned int nr) > +{ > + /* > + * Unfold any partially covered contpte block at the beginning and end > + * of the range. > + */ > + > + if (ptep != contpte_align_down(ptep) || nr < CONT_PTES) > + contpte_try_unfold(mm, addr, ptep, __ptep_get(ptep)); > + > + if (ptep + nr != contpte_align_down(ptep + nr)) > + contpte_try_unfold(mm, addr + PAGE_SIZE * (nr - 1), > + ptep + nr - 1, > + __ptep_get(ptep + nr - 1)); Nit: we should use braces for this 'if' block since it covers multiple lines (even though the function call is a single statement). It *might* be worth using temporaries for the last ptep and addr, e.g. if (ptep + nr != contpte_align_down(ptep + nr)) { unsigned long last_addr = addr + PAGE_SIZE * (nr - 1); pte_t *last_ptep = ptep + nr - 1; contpte_try_unfold(mm, last_addr, last_ptep, __ptep_get(last_ptep)); } .. but I'm happy without the temporaries so long as we have braces. > +} > + > static void contpte_convert(struct mm_struct *mm, unsigned long addr, > pte_t *ptep, pte_t pte) > { > @@ -236,6 +253,24 @@ int contpte_ptep_clear_flush_young(struct vm_area_struct *vma, > } > EXPORT_SYMBOL(contpte_ptep_clear_flush_young); > > +void contpte_wrprotect_ptes(struct mm_struct *mm, unsigned long addr, > + pte_t *ptep, unsigned int nr) > +{ > + /* > + * If wrprotecting an entire contig range, we can avoid unfolding. Just > + * set wrprotect and wait for the later mmu_gather flush to invalidate > + * the tlb. Until the flush, the page may or may not be wrprotected. > + * After the flush, it is guarranteed wrprotected. If its a partial Typo: s/guarranteed/guaranteed/ Typo: s/its/it's/ (or s/its/it is/) Other than the above this looks good to me. Mark. > + * range though, we must unfold, because we can't have a case where > + * CONT_PTE is set but wrprotect applies to a subset of the PTEs; this > + * would cause it to continue to be unpredictable after the flush. > + */ > + > + contpte_try_unfold_partial(mm, addr, ptep, nr); > + __wrprotect_ptes(mm, addr, ptep, nr); > +} > +EXPORT_SYMBOL(contpte_wrprotect_ptes); > + > int contpte_ptep_set_access_flags(struct vm_area_struct *vma, > unsigned long addr, pte_t *ptep, > pte_t entry, int dirty) > -- > 2.25.1 >