From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wm0-f44.google.com (mail-wm0-f44.google.com [74.125.82.44]) by kanga.kvack.org (Postfix) with ESMTP id 6DF446B0253 for ; Thu, 19 Nov 2015 03:22:11 -0500 (EST) Received: by wmec201 with SMTP id c201so13104354wme.0 for ; Thu, 19 Nov 2015 00:22:10 -0800 (PST) Received: from e06smtp12.uk.ibm.com (e06smtp12.uk.ibm.com. [195.75.94.108]) by mx.google.com with ESMTPS id j21si10593825wmj.77.2015.11.19.00.22.09 for (version=TLS1 cipher=AES128-SHA bits=128/128); Thu, 19 Nov 2015 00:22:10 -0800 (PST) Received: from localhost by e06smtp12.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 19 Nov 2015 08:22:09 -0000 Received: from b06cxnps4076.portsmouth.uk.ibm.com (d06relay13.portsmouth.uk.ibm.com [9.149.109.198]) by d06dlp03.portsmouth.uk.ibm.com (Postfix) with ESMTP id D94B81B0804B for ; Thu, 19 Nov 2015 08:22:27 +0000 (GMT) Received: from d06av08.portsmouth.uk.ibm.com (d06av08.portsmouth.uk.ibm.com [9.149.37.249]) by b06cxnps4076.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id tAJ8M7eo7995654 for ; Thu, 19 Nov 2015 08:22:07 GMT Received: from d06av08.portsmouth.uk.ibm.com (localhost [127.0.0.1]) by d06av08.portsmouth.uk.ibm.com (8.14.4/8.14.4/NCO v10.0 AVout) with ESMTP id tAJ8M7w4023316 for ; Thu, 19 Nov 2015 01:22:07 -0700 Subject: Re: [PATCH] mm: Loosen MADV_NOHUGEPAGE to enable Qemu postcopy on s390 References: <1447341516-18076-1-git-send-email-jjherne@linux.vnet.ibm.com> <564C7DCA.8010400@suse.cz> From: Christian Borntraeger Message-ID: <564D86AE.1010305@de.ibm.com> Date: Thu, 19 Nov 2015 09:22:06 +0100 MIME-Version: 1.0 In-Reply-To: <564C7DCA.8010400@suse.cz> Content-Type: text/plain; charset=iso-8859-2 Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org List-ID: To: Vlastimil Babka , "Jason J. Herne" , linux-s390@vger.kernel.org Cc: linux-mm@kvack.org, akpm@linux-foundation.org, aarcange@redhat.com, linux-api@vger.kernel.org, linux-man@vger.kernel.org, qemu-devel , "Dr. David Alan Gilbert" , Juan Quintela On 11/18/2015 02:31 PM, Vlastimil Babka wrote: > [CC += linux-api@vger.kernel.org] > > Since this is a kernel-user-space API change, please CC linux-api@. The kernel > source file Documentation/SubmitChecklist notes that all Linux kernel patches > that change userspace interfaces should be CCed to linux-api@vger.kernel.org, so > that the various parties who are interested in API changes are informed. For > further information, see https://www.kernel.org/doc/man-pages/linux-api-ml.html > > On 11/12/2015 04:18 PM, Jason J. Herne wrote: >> MADV_NOHUGEPAGE processing is too restrictive. kvm already disables >> hugepage but hugepage_madvise() takes the error path when we ask to turn >> on the MADV_NOHUGEPAGE bit and the bit is already on. This causes Qemu's >> new postcopy migration feature to fail on s390 because its first action is >> to madvise the guest address space as NOHUGEPAGE. This patch modifies the >> code so that the operation succeeds without error now. >> >> Signed-off-by: Jason J. Herne >> Reviewed-by: Andrea Arcangeli > > Looks like the manpage should be fine, as it wasn't very specific wrt these > madvise flags. The only thing that potentially applies is: > > "EINVAL advice is not a valid." > > which itself looks like it needs fixing. Valid what, value? As in completely > unknown flags, or flags not valid for the given vma? > > Anyway, I agree that it doesn't make sense to fail madvise when the given flag > is already set. On the other hand, I don't think the userspace app should fail > just because of madvise failing? It should in general be an advice that the > kernel is also strictly speaking free to ignore as it shouldn't affect > correctnes, just performance. Yeah, there are exceptions today like > MADV_DONTNEED, but that shouldn't apply to hugepages? > So I think Qemu needs fixing too. yes, I agree. David, Juan. I think The postcopy code should not fail if the madvise. Can you fix that? Also what happens if the kernel is build > without CONFIG_TRANSPARENT_HUGEPAGE? Then madvise also returns EINVAL, Does it? To me it looks more like we would trigger a kernel bug. mm/madvise.c: case MADV_HUGEPAGE: case MADV_NOHUGEPAGE: error = hugepage_madvise(vma, &new_flags, behavior); <----- if (error) goto out; break; } include/linux/huge_mm.h: static inline int hugepage_madvise(struct vm_area_struct *vma, unsigned long *vm_flags, int advice) { BUG(); return 0; } If we just remove the BUG() statement the code would actually be correct in simply ignoring an MADVISE it cannot handle. If you agree, I can spin a patch. > how does Qemu handle that? The normal qemu startup ignores the return value of the madvise. Only the recent post migration changes want to disable huge pages for userfaultd. And this code checks the return value. And yes, we should change that in QEMU. > >> --- >> mm/huge_memory.c | 4 ++-- >> 1 file changed, 2 insertions(+), 2 deletions(-) >> >> diff --git a/mm/huge_memory.c b/mm/huge_memory.c >> index c29ddeb..62fe06b 100644 >> --- a/mm/huge_memory.c >> +++ b/mm/huge_memory.c >> @@ -2009,7 +2009,7 @@ int hugepage_madvise(struct vm_area_struct *vma, >> /* >> * Be somewhat over-protective like KSM for now! >> */ >> - if (*vm_flags & (VM_HUGEPAGE | VM_NO_THP)) >> + if (*vm_flags & VM_NO_THP) >> return -EINVAL; >> *vm_flags &= ~VM_NOHUGEPAGE; >> *vm_flags |= VM_HUGEPAGE; >> @@ -2025,7 +2025,7 @@ int hugepage_madvise(struct vm_area_struct *vma, >> /* >> * Be somewhat over-protective like KSM for now! >> */ >> - if (*vm_flags & (VM_NOHUGEPAGE | VM_NO_THP)) >> + if (*vm_flags & VM_NO_THP) >> return -EINVAL; >> *vm_flags &= ~VM_HUGEPAGE; >> *vm_flags |= VM_NOHUGEPAGE; >> > -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org