From: Peter Xu <peterx@redhat.com>
To: Muhammad Usama Anjum <usama.anjum@collabora.com>
Cc: "David Hildenbrand" <david@redhat.com>,
"Andrew Morton" <akpm@linux-foundation.org>,
"Michał Mirosław" <emmir@google.com>,
"Andrei Vagin" <avagin@gmail.com>,
"Danylo Mocherniuk" <mdanylo@google.com>,
"Paul Gofman" <pgofman@codeweavers.com>,
"Cyrill Gorcunov" <gorcunov@gmail.com>,
"Alexander Viro" <viro@zeniv.linux.org.uk>,
"Shuah Khan" <shuah@kernel.org>,
"Christian Brauner" <brauner@kernel.org>,
"Yang Shi" <shy828301@gmail.com>,
"Vlastimil Babka" <vbabka@suse.cz>,
"Liam R . Howlett" <Liam.Howlett@oracle.com>,
"Yun Zhou" <yun.zhou@windriver.com>,
"Suren Baghdasaryan" <surenb@google.com>,
"Alex Sierra" <alex.sierra@amd.com>,
"Matthew Wilcox" <willy@infradead.org>,
"Pasha Tatashin" <pasha.tatashin@soleen.com>,
"Mike Rapoport" <rppt@kernel.org>,
"Nadav Amit" <namit@vmware.com>,
"Axel Rasmussen" <axelrasmussen@google.com>,
"Gustavo A . R . Silva" <gustavoars@kernel.org>,
"Dan Williams" <dan.j.williams@intel.com>,
linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org,
linux-mm@kvack.org, linux-kselftest@vger.kernel.org,
"Greg KH" <gregkh@linuxfoundation.org>,
kernel@collabora.com
Subject: Re: [PATCH v8 1/4] userfaultfd: Add UFFD WP Async support
Date: Mon, 30 Jan 2023 16:27:12 -0500 [thread overview]
Message-ID: <Y9g2MAwycCJ3N2tf@x1n> (raw)
In-Reply-To: <d8c30ea7-05a1-d53b-1391-472ff5b2a7fd@collabora.com>
On Mon, Jan 30, 2023 at 01:38:16PM +0500, Muhammad Usama Anjum wrote:
> On 1/27/23 8:32 PM, Peter Xu wrote:
> > On Fri, Jan 27, 2023 at 11:47:14AM +0500, Muhammad Usama Anjum wrote:
> >>>> diff --git a/mm/memory.c b/mm/memory.c
> >>>> index 4000e9f017e0..8c03b133d483 100644
> >>>> --- a/mm/memory.c
> >>>> +++ b/mm/memory.c
> >>>> @@ -3351,6 +3351,18 @@ static vm_fault_t do_wp_page(struct vm_fault *vmf)
> >>>>
> >>>> if (likely(!unshare)) {
> >>>> if (userfaultfd_pte_wp(vma, *vmf->pte)) {
> >>>> + if (userfaultfd_wp_async(vma)) {
> >>>> + /*
> >>>> + * Nothing needed (cache flush, TLB invalidations,
> >>>> + * etc.) because we're only removing the uffd-wp bit,
> >>>> + * which is completely invisible to the user. This
> >>>> + * falls through to possible CoW.
> >>>
> >>> Here it says it falls through to CoW, but..
> >>>
> >>>> + */
> >>>> + pte_unmap_unlock(vmf->pte, vmf->ptl);
> >>>> + set_pte_at(vma->vm_mm, vmf->address, vmf->pte,
> >>>> + pte_clear_uffd_wp(*vmf->pte));
> >>>> + return 0;
> >>>
> >>> ... it's not doing so. The original lines should do:
> >>>
> >>> https://lore.kernel.org/all/Y8qq0dKIJBshua+X@x1n/
> >
> > [1]
> >
> >>>
> >>> Side note: you cannot modify pgtable after releasing the pgtable lock.
> >>> It's racy.
> >> If I don't unlock and return after removing the UFFD_WP flag in case of
> >> async wp, the target just gets stuck. Maybe the pte lock is not unlocked in
> >> some path.
> >>
> >> If I unlock and don't return, the crash happens.
> >>
> >> So I'd put unlock and return from here. Please comment on the below patch
> >> and what do you think should be done. I've missed something.
> >
> > Have you tried to just use exactly what I suggested in [1]? I'll paste
> > again:
> >
> > ---8<---
> > diff --git a/mm/memory.c b/mm/memory.c
> > index 4000e9f017e0..09aab434654c 100644
> > --- a/mm/memory.c
> > +++ b/mm/memory.c
> > @@ -3351,8 +3351,20 @@ static vm_fault_t do_wp_page(struct vm_fault *vmf)
> >
> > if (likely(!unshare)) {
> > if (userfaultfd_pte_wp(vma, *vmf->pte)) {
> > - pte_unmap_unlock(vmf->pte, vmf->ptl);
> > - return handle_userfault(vmf, VM_UFFD_WP);
> > + if (userfaultfd_uffd_wp_async(vma)) {
> > + /*
> > + * Nothing needed (cache flush, TLB
> > + * invalidations, etc.) because we're only
> > + * removing the uffd-wp bit, which is
> > + * completely invisible to the user.
> > + * This falls through to possible CoW.
> > + */
> > + set_pte_at(vma->vm_mm, vmf->address, vmf->pte,
> > + pte_clear_uffd_wp(*vmf->pte));
> > + } else {
> > + pte_unmap_unlock(vmf->pte, vmf->ptl);
> > + return handle_userfault(vmf, VM_UFFD_WP);
> > + }
> > }
> > ---8<---
> >
> > Note that there's no "return", neither the unlock. The lock is used in the
> > follow up write fault resolution and it's released later.
> I've tried out the exact patch above. This doesn't work. The pages keep
> their WP flag even after being resolved in do_wp_page() while is written on
> the page.
>
> So I'd added pte_unmap_unlock() and return 0 from here. This makes the
> patch to work. Maybe you can try this on your end to see what I'm seeing here?
Oh maybe it's because it didn't update orig_pte. If you want, you can try
again with doing so by changing:
set_pte_at(vma->vm_mm, vmf->address, vmf->pte,
pte_clear_uffd_wp(*vmf->pte));
into:
pte_t pte = pte_clear_uffd_wp(*vmf->pte);
set_pte_at(vma->vm_mm, vmf->address, vmf->pte, pte);
/* Update this to be prepared for following up CoW handling */
vmf->orig_pte = pte;
>
> >
> > Meanwhile please fully digest how pgtable lock is used in this path before
> > moving forward on any of such changes.
> >
> >>
> >>>
> >>>> + }
> >>>> pte_unmap_unlock(vmf->pte, vmf->ptl);
> >>>> return handle_userfault(vmf, VM_UFFD_WP);
> >>>> }
> >>>> @@ -4812,8 +4824,21 @@ static inline vm_fault_t wp_huge_pmd(struct vm_fault *vmf)
> >>>>
> >>>> if (vma_is_anonymous(vmf->vma)) {
> >>>> if (likely(!unshare) &&
> >>>> - userfaultfd_huge_pmd_wp(vmf->vma, vmf->orig_pmd))
> >>>> - return handle_userfault(vmf, VM_UFFD_WP);
> >>>> + userfaultfd_huge_pmd_wp(vmf->vma, vmf->orig_pmd)) {
> >>>> + if (userfaultfd_wp_async(vmf->vma)) {
> >>>> + /*
> >>>> + * Nothing needed (cache flush, TLB invalidations,
> >>>> + * etc.) because we're only removing the uffd-wp bit,
> >>>> + * which is completely invisible to the user. This
> >>>> + * falls through to possible CoW.
> >>>> + */
> >>>> + set_pmd_at(vmf->vma->vm_mm, vmf->address, vmf->pmd,
> >>>> + pmd_clear_uffd_wp(*vmf->pmd));
> >>>
> >>> This is for THP, not hugetlb.
> >>>
> >>> Clearing uffd-wp bit here for the whole pmd is wrong to me, because we
> >>> track writes in small page sizes only. We should just split.
> >> By detecting if the fault is async wp, just splitting the PMD doesn't work.
> >> The below given snippit is working right now. But definately, the fault of
> >> the whole PMD is being resolved which if we can bypass by correctly
> >> splitting would be highly desirable. Can you please take a look on UFFD
> >> side and suggest the changes? It would be much appreciated. I'm attaching
> >> WIP v9 patches for you to apply on next(next-20230105) and pagemap_ioctl
> >> selftest can be ran to test things after making changes.
> >
> > Can you elaborate why thp split didn't work? Or if you want, I can look
> > into this and provide the patch to enable uffd async mode.
> Sorry, I was doing the wrong way. Splitting the page does work. What do you
> think about the following:
>
> --- a/mm/memory.c
> +++ b/mm/memory.c
> @@ -3351,6 +3351,17 @@ static vm_fault_t do_wp_page(struct vm_fault *vmf)
>
> if (likely(!unshare)) {
> if (userfaultfd_pte_wp(vma, *vmf->pte)) {
> + if (userfaultfd_wp_async(vma)) {
> + /*
> + * Nothing needed (cache flush, TLB invalidations,
> + * etc.) because we're only removing the uffd-wp bit,
> + * which is completely invisible to the user.
> + */
> + set_pte_at(vma->vm_mm, vmf->address, vmf->pte,
> + pte_clear_uffd_wp(*vmf->pte));
> + pte_unmap_unlock(vmf->pte, vmf->ptl);
> + return 0;
Please give it a shot with above to see whether we can avoid the "return 0"
here.
> + }
> pte_unmap_unlock(vmf->pte, vmf->ptl);
> return handle_userfault(vmf, VM_UFFD_WP);
> }
> @@ -4812,8 +4823,13 @@ static inline vm_fault_t wp_huge_pmd(struct vm_fault
> *vmf)
>
> if (vma_is_anonymous(vmf->vma)) {
> if (likely(!unshare) &&
> - userfaultfd_huge_pmd_wp(vmf->vma, vmf->orig_pmd))
> + userfaultfd_huge_pmd_wp(vmf->vma, vmf->orig_pmd)) {
> + if (userfaultfd_wp_async(vmf->vma)) {
> + __split_huge_pmd(vmf->vma, vmf->pmd, vmf->address, false, NULL);
> + return 0;
Same here, I hope it'll work for you if you just goto __split_huge_pmd()
right below and return with VM_FAULT_FALLBACK. It avoids one more round of
fault just like the pte case above.
> + }
> return handle_userfault(vmf, VM_UFFD_WP);
> + }
> return do_huge_pmd_wp_page(vmf);
> }
--
Peter Xu
next prev parent reply other threads:[~2023-01-30 21:27 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-01-24 8:43 [PATCH v8 0/4] Implement IOCTL to get and/or the clear info about PTEs Muhammad Usama Anjum
2023-01-24 8:43 ` [PATCH v8 1/4] userfaultfd: Add UFFD WP Async support Muhammad Usama Anjum
2023-01-24 10:43 ` kernel test robot
2023-01-24 11:04 ` kernel test robot
2023-01-24 11:15 ` kernel test robot
2023-01-26 23:05 ` Peter Xu
2023-01-27 6:47 ` Muhammad Usama Anjum
2023-01-27 15:32 ` Peter Xu
2023-01-30 8:38 ` Muhammad Usama Anjum
2023-01-30 21:27 ` Peter Xu [this message]
2023-01-31 8:40 ` Muhammad Usama Anjum
2023-01-24 8:43 ` [PATCH v8 2/4] userfaultfd: split mwriteprotect_range() Muhammad Usama Anjum
2023-01-24 10:23 ` kernel test robot
2023-01-27 17:05 ` Peter Xu
2023-01-30 9:10 ` Muhammad Usama Anjum
2023-01-24 8:43 ` [PATCH v8 3/4] fs/proc/task_mmu: Implement IOCTL to get and/or the clear info about PTEs Muhammad Usama Anjum
2023-01-24 10:02 ` kernel test robot
2023-01-27 17:36 ` Peter Xu
2023-01-30 11:12 ` Muhammad Usama Anjum
2023-01-30 21:34 ` Peter Xu
2023-01-24 8:43 ` [PATCH v8 4/4] selftests: vm: add pagemap ioctl tests Muhammad Usama Anjum
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Y9g2MAwycCJ3N2tf@x1n \
--to=peterx@redhat.com \
--cc=Liam.Howlett@oracle.com \
--cc=akpm@linux-foundation.org \
--cc=alex.sierra@amd.com \
--cc=avagin@gmail.com \
--cc=axelrasmussen@google.com \
--cc=brauner@kernel.org \
--cc=dan.j.williams@intel.com \
--cc=david@redhat.com \
--cc=emmir@google.com \
--cc=gorcunov@gmail.com \
--cc=gregkh@linuxfoundation.org \
--cc=gustavoars@kernel.org \
--cc=kernel@collabora.com \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-kselftest@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=mdanylo@google.com \
--cc=namit@vmware.com \
--cc=pasha.tatashin@soleen.com \
--cc=pgofman@codeweavers.com \
--cc=rppt@kernel.org \
--cc=shuah@kernel.org \
--cc=shy828301@gmail.com \
--cc=surenb@google.com \
--cc=usama.anjum@collabora.com \
--cc=vbabka@suse.cz \
--cc=viro@zeniv.linux.org.uk \
--cc=willy@infradead.org \
--cc=yun.zhou@windriver.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).