From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 04C18C4708D for ; Wed, 7 Dec 2022 23:06:00 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 7E86D8E0003; Wed, 7 Dec 2022 18:05:59 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 798838E0001; Wed, 7 Dec 2022 18:05:59 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 639888E0003; Wed, 7 Dec 2022 18:05:59 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 55CB68E0001 for ; Wed, 7 Dec 2022 18:05:59 -0500 (EST) Received: from smtpin08.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id 29F66160EF6 for ; Wed, 7 Dec 2022 23:05:59 +0000 (UTC) X-FDA: 80217044838.08.05E380B Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2079.outbound.protection.outlook.com [40.107.93.79]) by imf18.hostedemail.com (Postfix) with ESMTP id 4B0021C0015 for ; Wed, 7 Dec 2022 23:05:56 +0000 (UTC) Authentication-Results: imf18.hostedemail.com; dkim=pass header.d=Nvidia.com header.s=selector2 header.b=CM7VTZOX; spf=pass (imf18.hostedemail.com: domain of jhubbard@nvidia.com designates 40.107.93.79 as permitted sender) smtp.mailfrom=jhubbard@nvidia.com; arc=pass ("microsoft.com:s=arcselector9901:i=1"); dmarc=pass (policy=reject) header.from=nvidia.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1670454356; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=kxhJ1518yT3EYUkBXE9HaS0Fz/xtcvai8tQw1CsZCQQ=; b=4wLfMCHLN017EGeyzyHY3gT6HrsYP4Z4bmoKjJo8/ClgXCV7TVnsS8wFIgbpnffRlLZGZJ 9cDEfNgkO9kKRyx98276aZgZ1/DySMDuG1NcjY2j+hJDYBD3Yg3AG6Hi2ng+MWHPDHwDUB aPggkwlFEzU6i+MtU8mSbjlz/juV79o= ARC-Authentication-Results: i=2; imf18.hostedemail.com; dkim=pass header.d=Nvidia.com header.s=selector2 header.b=CM7VTZOX; spf=pass (imf18.hostedemail.com: domain of jhubbard@nvidia.com designates 40.107.93.79 as permitted sender) smtp.mailfrom=jhubbard@nvidia.com; arc=pass ("microsoft.com:s=arcselector9901:i=1"); dmarc=pass (policy=reject) header.from=nvidia.com ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1670454356; a=rsa-sha256; cv=pass; b=YOqy0miXmqnrIzDlmPladm5on6VgJcghpmV+0QqXVM98IvdnnL5zRRemVdLq6lE2fAM1sq BEvT4ihnPRXfGIG6jVWbsMppwroIhYqoEOl98Xm6RFkvl6a9J3ubNgB68CkuGdQgRgMbOk TujkxARcr4psotTOalH4rTnFRepkCv0= ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LE5dvndp/NhyzeZ4HcVACPAjJ+ODLOz1f0CiLGHvaoxBBGNAlWNA/s4FoGIhAFBhvOI1u/L2bboCnrMVdG2bZjdjq2Cb+gOHwiiVhA5zRI31HCws2bTDMCeWT51xkIPewpR/LYK6Zieg96+91sFc7WrQjvsMDCzdnToSDEdLN9MhjJpUGGJjmY/LYN8ZMWm2qbiXN/FHL3BxTns937h39nw3iI+pGWfEUKrT9jI1VItRZCjzjE08s3UvexOp9e6YTlNxpr1s7IZz+tiB3FtGfGhLXEQVNcm/yArdlRvgReRcBG+bYDm5XdOCPCWgkAntFm9ymxOoBJqvz8CGHoYpig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=kxhJ1518yT3EYUkBXE9HaS0Fz/xtcvai8tQw1CsZCQQ=; b=jObLg5wXMz+NsbUVdNQYGl8lzkVPbkRgmdbjlDjWpDrnNYNuqLRmEjZfPVXqPRq2XVBWczf22Q2hL1gr4eT3nKzm/AWvT9mmzTlvORzUeD2VWJJMvjCDHcgpJUsa9umBAbaYKyUy3B4E2pqPye6DgWoG3w0omX/OSfbsMjBJCi/ijeWu3tNiEmVb70Rc/t4RPwpmW/FZ8f3ReWB9bYXeY4w6cr+R/ORZdFiskqmxTEgfYMMCG6SQ6GYG/UmDa6F7Vz23+QFsXulM3qcwG6qCDEEdldA5CGpx6nxfWVbqOsihrYJSRfFFNAevJ4dpWTiTkpneIY/yyIaLSjnTctbeBw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=redhat.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kxhJ1518yT3EYUkBXE9HaS0Fz/xtcvai8tQw1CsZCQQ=; b=CM7VTZOXp9yCWvphnjnc2Q8sow5EScmZnPc/fOqmbNJklVQP47WNdWkBvDAP/jdcgbZAgtYg+WSR5JZIhk1ePkuCfXyOPeJglTlGM0z1xihHwKofL5qmw/YsgAyex01YT5yrrc55qWh9WMj6OpWfvIPPM9Kk5Dhc9r6rRdtSrx2w+V4I8n+ezeJc8fJ2JqEX0e4aWplAr6JoFypnjSZ5T3qdo+QNbiVDR/9YHCEpWtxe8NRS4+P/5CxubXxsYanQfPNVZlVSkObqQthOr2Dy6A4fP1IhAXKCQC8odKOdO1EfPesP6J7oEq+F9X+sKxYMP/31wp6lOx5DaiVaih289w== Received: from DM6PR03CA0093.namprd03.prod.outlook.com (2603:10b6:5:333::26) by PH7PR12MB6667.namprd12.prod.outlook.com (2603:10b6:510:1a9::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5880.14; Wed, 7 Dec 2022 23:05:53 +0000 Received: from DM6NAM11FT081.eop-nam11.prod.protection.outlook.com (2603:10b6:5:333:cafe::5e) by DM6PR03CA0093.outlook.office365.com (2603:10b6:5:333::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5880.14 via Frontend Transport; Wed, 7 Dec 2022 23:05:53 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.161) by DM6NAM11FT081.mail.protection.outlook.com (10.13.172.136) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5901.16 via Frontend Transport; Wed, 7 Dec 2022 23:05:53 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.36; Wed, 7 Dec 2022 15:05:44 -0800 Received: from [10.110.48.28] (10.126.231.37) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.36; Wed, 7 Dec 2022 15:05:43 -0800 Message-ID: <86bff55b-d048-1500-cddc-2d53702d7a3b@nvidia.com> Date: Wed, 7 Dec 2022 15:05:42 -0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.5.1 Subject: Re: [PATCH v2 04/10] mm/hugetlb: Move swap entry handling into vma lock when faulted Content-Language: en-US To: Peter Xu CC: , , Muchun Song , Andrea Arcangeli , "James Houghton" , Jann Horn , Rik van Riel , Miaohe Lin , Andrew Morton , Mike Kravetz , "David Hildenbrand" , Nadav Amit References: <20221207203034.650899-1-peterx@redhat.com> <20221207203034.650899-5-peterx@redhat.com> <326789a5-85ba-f13c-389e-fd21d673e3ae@nvidia.com> From: John Hubbard In-Reply-To: Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.126.231.37] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM6NAM11FT081:EE_|PH7PR12MB6667:EE_ X-MS-Office365-Filtering-Correlation-Id: 96dfa5cc-e15e-40c7-e3ed-08dad8a7972c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.117.161;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail.nvidia.com;PTR:dc6edge2.nvidia.com;CAT:NONE;SFS:(13230022)(4636009)(376002)(346002)(396003)(136003)(39860400002)(451199015)(36840700001)(46966006)(40470700004)(31696002)(82740400003)(426003)(36860700001)(47076005)(7636003)(7416002)(86362001)(40460700003)(83380400001)(356005)(2906002)(186003)(40480700001)(336012)(5660300002)(8936002)(16526019)(53546011)(26005)(8676002)(2616005)(70586007)(6916009)(316002)(54906003)(478600001)(16576012)(82310400005)(70206006)(4326008)(41300700001)(31686004)(36756003)(43740500002);DIR:OUT;SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Dec 2022 23:05:53.2223 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 96dfa5cc-e15e-40c7-e3ed-08dad8a7972c X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a;Ip=[216.228.117.161];Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT081.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR12MB6667 X-Rspam-User: X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 4B0021C0015 X-Stat-Signature: 1ggc8trjp5bo369grupis8wyroof88sp X-HE-Tag: 1670454356-931926 X-HE-Meta: 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 V9bylXz5 W918iH0F69rgsxpeVR/kwS4+aMzINJGGrvyXrQ+f8FfWQyBE= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 12/7/22 14:43, Peter Xu wrote: > Note that here migration_entry_wait_huge() will release it. > > Sorry it's definitely not as straightforward, but this is also something I > didn't come up with a better solution, because we need the vma lock to > protect the spinlock, which is used in deep code path of the migration > code. > > That's also why I added a rich comment above, and there's "The vma lock > will be released there" which is just for that. > Yes, OK, Reviewed-by: John Hubbard ...and here is some fancy documentation polishing (incremental on top of this specific patch) if you would like to fold it in, optional but it makes me happier: diff --git a/mm/hugetlb.c b/mm/hugetlb.c index 49f73677a418..e3bbd4869f68 100644 --- a/mm/hugetlb.c +++ b/mm/hugetlb.c @@ -5809,6 +5809,10 @@ u32 hugetlb_fault_mutex_hash(struct address_space *mapping, pgoff_t idx) } #endif +/* + * There are a few special cases in which this function returns while still + * holding locks. Those are noted inline. + */ vm_fault_t hugetlb_fault(struct mm_struct *mm, struct vm_area_struct *vma, unsigned long address, unsigned int flags) { @@ -5851,8 +5855,8 @@ vm_fault_t hugetlb_fault(struct mm_struct *mm, struct vm_area_struct *vma, /* PTE markers should be handled the same way as none pte */ if (huge_pte_none_mostly(entry)) /* - * hugetlb_no_page will drop vma lock and hugetlb fault - * mutex internally, which make us return immediately. + * hugetlb_no_page() will release both the vma lock and the + * hugetlb fault mutex, so just return directly from that: */ return hugetlb_no_page(mm, vma, mapping, idx, address, ptep, entry, flags); @@ -5869,10 +5873,11 @@ vm_fault_t hugetlb_fault(struct mm_struct *mm, struct vm_area_struct *vma, if (!pte_present(entry)) { if (unlikely(is_hugetlb_entry_migration(entry))) { /* - * Release fault lock first because the vma lock is - * needed to guard the huge_pte_lockptr() later in - * migration_entry_wait_huge(). The vma lock will - * be released there. + * Release the hugetlb fault lock now, but retain the + * vma lock, because it is needed to guard the + * huge_pte_lockptr() later in + * migration_entry_wait_huge(). The vma lock will be + * released there. */ mutex_unlock(&hugetlb_fault_mutex_table[hash]); migration_entry_wait_huge(vma, ptep); diff --git a/mm/migrate.c b/mm/migrate.c index d14f1f3ab073..a31df628b938 100644 --- a/mm/migrate.c +++ b/mm/migrate.c @@ -333,16 +333,18 @@ void migration_entry_wait(struct mm_struct *mm, pmd_t *pmd, } #ifdef CONFIG_HUGETLB_PAGE + +/* + * The vma read lock must be held upon entry. Holding that lock prevents either + * the pte or the ptl from being freed. + * + * This function will release the vma lock before returning. + */ void __migration_entry_wait_huge(struct vm_area_struct *vma, pte_t *ptep, spinlock_t *ptl) { pte_t pte; - /* - * The vma read lock must be taken, which will be released before - * the function returns. It makes sure the pgtable page (along - * with its spin lock) not be freed in parallel. - */ hugetlb_vma_assert_locked(vma); spin_lock(ptl); thanks, -- John Hubbard NVIDIA