From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 24056CD4F52 for ; Mon, 18 May 2026 09:47:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:In-Reply-To: Content-Transfer-Encoding:Content-Type:MIME-Version:References:Message-ID: Subject:Cc:To:From:Date:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=ET333FRP9aSoxb7NhOmP9XopJpnV8U7OLN71bw9AvnU=; b=UjtWr2mikCY7fg6OZGIuYjf79w a9z6i22i7z3b2L2pnnyrG6YHp3FgZpWYJ2jOhFPqzB90vnA8lVuou0jIShzjHyPuyq2RwBKaZBe3O aGHD90TC+nealAjwRAa63+VQhBU1DzaJKvtwlv+61Jug1QpcRMULyRwLqasg319jA1P4To8lL90Uy tGXtLCfgWLbErHedPIo91iJWB2G6koFgp46rfxCgQN2KVeyEWclUpm26Nu4lLxbanSwR1ajgX/r4M d0RnQsnFYgEgnlODFMufbro8ac0K5xxi8XgbOwiARxqfSwxFqMfcudJ1LJI8Vz4wbbBQ0n9K/hloo UfyrRmlA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.99.1 #2 (Red Hat Linux)) id 1wOuZA-0000000F5Ej-1WrG; Mon, 18 May 2026 09:47:16 +0000 Received: from sea.source.kernel.org ([2600:3c0a:e001:78e:0:1991:8:25]) by bombadil.infradead.org with esmtps (Exim 4.99.1 #2 (Red Hat Linux)) id 1wOuZ7-0000000F5D6-0zTs; Mon, 18 May 2026 09:47:14 +0000 Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by sea.source.kernel.org (Postfix) with ESMTP id 00EBB44018; Mon, 18 May 2026 09:47:09 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 68AFAC2BCB7; Mon, 18 May 2026 09:47:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1779097628; bh=TG4jY49etADdd0W92AOWeHiLbA5nZOb/ARZcjnb31oU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=vQJ0arCrP/xBPlP5xYCcSSm/fS+QQUbWLyhqiDIrU88DmvTAFFSm30+Xht992Kwkr skPTdxS4IrMJ+p5tztV/luY0iNJBbYXUE/c8+gstKuaH8hi9y+Mgq2xBBpJ3ADVJs7 ZCI2TQ1MeRf+U2+0uF/4b9BlIJuAH+0Z2Wi/G40INZkrBzkH/PD0+ypSZP4/Fk+Kxe Xp/7tp+4rG7efDwwY87OsxwuUVOB9eHt9qUSqLvldLdv2/QVprIE0DCJVhFMfpWFP/ hXJ3evSbQlYMMWAjGszf1ccS6LkTIDY+CHhyS99vXL1+9ZkBTzfrKsyfLU8JAER3+q xVpAdvt8jECkg== Date: Mon, 18 May 2026 10:46:59 +0100 From: Lorenzo Stoakes To: Barry Song Cc: Matthew Wilcox , surenb@google.com, akpm@linux-foundation.org, linux-mm@kvack.org, david@kernel.org, liam@infradead.org, vbabka@kernel.org, rppt@kernel.org, mhocko@suse.com, jack@suse.cz, pfalcato@suse.de, wanglian@kylinos.cn, chentao@kylinos.cn, lianux.mm@gmail.com, kunwu.chan@gmail.com, liyangouwen1@oppo.com, chrisl@kernel.org, kasong@tencent.com, shikemeng@huaweicloud.com, nphamcs@gmail.com, bhe@redhat.com, youngjun.park@lge.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, loongarch@lists.linux.dev, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, Nanzhe Zhao Subject: Re: [PATCH v2 0/5] mm: reduce mmap_lock contention and improve page fault performance Message-ID: References: <20260430040427.4672-1-baohua@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.9.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20260518_024713_315765_D6D8482A X-CRM114-Status: GOOD ( 47.94 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Sun, May 17, 2026 at 04:45:15PM +0800, Barry Song wrote: > On Sat, May 2, 2026 at 1:58 AM Matthew Wilcox wrote: > > > > On Sat, May 02, 2026 at 01:44:34AM +0800, Barry Song wrote: > > > On Fri, May 1, 2026 at 10:57 PM Matthew Wilcox wrote: > > > > > > > > On Fri, May 01, 2026 at 06:49:58AM +0800, Barry Song wrote: > > > > > 1. There is no deterministic latency for I/O completion. It depends on > > > > > both the hardware and the software stack (bio/request queues and the > > > > > block scheduler). Sometimes the latency is short; at other times it can > > > > > be quite long. In such cases, a high-priority thread performing operations > > > > > such as mprotect, unmap, prctl_set_vma, or madvise may be forced to wait > > > > > for an unpredictable amount of time. > > > > > > > > But does that actually happen? I find it hard to believe that thread A > > > > unmaps a VMA while thread B is in the middle of taking a page fault in > > > > that same VMA. mprotect() and madvise() are more likely to happen, but > > > > it still seems really unlikely to me. > > > > > > It doesn’t have to involve unmapping or applying mprotect to > > > the entire VMA—just a portion of it is sufficient. > > > > Yes, but that still fails to answer "does this actually happen". How much > > performance is all this complexity in the page fault handler buying us? > > If you don't answer this question, I'm just going to go in and rip it > > all out. > > > > Hi Matthew (and Lorenzo, Jan, and anyone else who may be > waiting for answers), > > As promised during LSF/MM/BPF, we conducted thorough > testing on Android phones to determine whether performing > I/O in `filemap_fault()` can block `vma_start_write()`. > I wanted to give a quick update on this question. > > Nanzhe at Xiaomi created tracing scripts and ran various > applications on Android devices with I/O performed under > the VMA lock in `filemap_fault()`. We found that: > > 1. There are very few cases where unmap() is blocked by > page faults. I assume this is due to buggy user code > or poor synchronization between reads and unmap(). > So I assume it is not a problem. > > 2. We observed many cases where `vma_start_write()` > is blocked by page-fault I/O in some applications. > The blocking occurs in the `dup_mmap()` path during > fork(). > > With Suren's commit fb49c455323ff ("fork: lock VMAs of > the parent process when forking"), we now always hold > `vma_write_lock()` for each VMA. Note that the > `mmap_lock` write lock is also held, which could lead to > chained waiting if page-fault I/O is performed without > releasing the VMA lock. Hm but did you observe this 'chained waiting'? And what were the latencies? > > My gut feeling is that Suren's commit may be overshooting, > so my rough idea is that we might want to do something like > the following (we haven't tested it yet and it might be > wrong): Yeah I'm really not sure about that. Prior to the VMA locks, the mmap write lock would have guaranteed no concurrent page faults, which is really what fb49c455323ff is about. So Suren's patch was essentially restoring the _existing_ forking behaviour, and now you're saying 'let's change the forking behaviour that's been like that for forever'. I think you would _really_ have to be sure that's safe. And forking is a very dangerous time in terms of complexity and sensitivity and 'weird stuff' happening so I'd tread _very_ carefully here. > > diff --git a/mm/mmap.c b/mm/mmap.c > index 2311ae7c2ff4..5ddaf297f31a 100644 > --- a/mm/mmap.c > +++ b/mm/mmap.c > @@ -1762,7 +1762,13 @@ __latent_entropy int dup_mmap(struct mm_struct > *mm, struct mm_struct *oldmm) > for_each_vma(vmi, mpnt) { > struct file *file; > > - retval = vma_start_write_killable(mpnt); > + /* > + * For anonymous or writable private VMAs, prevent > + * concurrent CoW faults. > + */ To nit pick I think the comment's confusing but also tells you you don't need to specific anon check - writable private is sufficient. And it's not really just CoW that's the issue, it's anon_vma population _at all_ as well as CoW. > + if (!mpnt->vm_file || (!(mpnt->vm_flags & VM_SHARED) && > + (mpnt->vm_flags & VM_WRITE))) > + retval = vma_start_write_killable(mpnt); I think this has to be VM_MAYWRITE, because somebody could otherwise mprotect() it R/W. I also don't understand why !mpnt->vm_file for a read-only anon mapping (more likely PROT_NONE) is here, just do the second check? (Also please use the new interface, so !vma_test(mpnt, VMA_SHARED_BIT) && vma_test(mpnt, VMA_MAYWRITE_BIT)) > if (retval < 0) > goto loop_out; > if (mpnt->vm_flags & VM_DONTCOPY) { > > Based on the above, we may want to re-check whether fork() > can be blocked by page faults. At the same time, if Suren, > you, or anyone else has any comments, please feel free to > share them. > > Best Regards > Barry Technical commentary above is sort of 'just cos' :) because I really question doing this honestly. I'd also like to get Suren's input, however. Thanks, Lorenzo