From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Date: Thu, 13 Dec 2018 11:02:03 -0500 From: Jerome Glisse To: Christopher Lameter Cc: Dave Chinner , Jan Kara , John Hubbard , Matthew Wilcox , Dan Williams , John Hubbard , Andrew Morton , Linux MM , tom@talpey.com, Al Viro , benve@cisco.com, Christoph Hellwig , "Dalessandro, Dennis" , Doug Ledford , Jason Gunthorpe , Michal Hocko , mike.marciniszyn@intel.com, rcampbell@nvidia.com, Linux Kernel Mailing List , linux-fsdevel Subject: Re: [PATCH 1/2] mm: introduce put_user_page*(), placeholder versions Message-ID: <20181213160203.GD3186@redhat.com> References: <20181207191620.GD3293@redhat.com> <3c4d46c0-aced-f96f-1bf3-725d02f11b60@nvidia.com> <20181208022445.GA7024@redhat.com> <20181210102846.GC29289@quack2.suse.cz> <20181212150319.GA3432@redhat.com> <20181212214641.GB29416@dastard> <20181212215931.GG5037@redhat.com> <20181213005119.GD29416@dastard> <20181213020229.GN5037@redhat.com> <01000167a8483bd2-16ae0d3e-d217-4993-a80a-25d221c677e4-000000@email.amazonses.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <01000167a8483bd2-16ae0d3e-d217-4993-a80a-25d221c677e4-000000@email.amazonses.com> Sender: owner-linux-mm@kvack.org List-ID: On Thu, Dec 13, 2018 at 03:56:05PM +0000, Christopher Lameter wrote: > On Wed, 12 Dec 2018, Jerome Glisse wrote: > > > On Thu, Dec 13, 2018 at 11:51:19AM +1100, Dave Chinner wrote: > > > > > > [O1] Avoid write back from a page still being written by either a > > > > > > device or some direct I/O or any other existing user of GUP. > > > > > > IOWs, you need to mark pages being written to by a GUP as > > > PageWriteback, so all attempts to write the page will block on > > > wait_on_page_writeback() before trying to write the dirty page. > > > > No you don't and you can't for the simple reasons is that the GUP > > of some device driver can last days, weeks, months, years ... so > > it is not something you want to do. Here is what happens today: > > I think it would be better to use the established way to block access that > Dave suggests. Maybe deal with the issue of threads being blocked for > a long time instead? Introduce a way to abort these attempts in a > controlled fashion that also allows easy debugging of these conflicts? GUP does not have the information on how long the GUP will last, the GUP caller might not know either. What is worse is that the GUP user provide API today to userspace to do this and thus any attempt to block this from happening can be interpreted (from some point of view) as a regression ie worked in linux X.Y does not work in linux X.Y+1. I am not against doing that, in fact i advocated at last LSF that any user of GUP that does not abide to mmu notifier should be denied GUP (direct IO, kvm and couple other like that being the exception because they are case we can properly fix). Anyone that abide to mmu notifier will drop the page reference on any event like truncate, split, mremap, munmap, write back ... so anyone with mmu notifier is fine. Cheers, J�r�me