From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2A3FEC43460 for ; Tue, 18 May 2021 11:08:34 +0000 (UTC) Received: from ml01.01.org (ml01.01.org [198.145.21.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id D89B16124C for ; Tue, 18 May 2021 11:08:33 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org D89B16124C Authentication-Results: mail.kernel.org; dmarc=fail (p=quarantine dis=none) header.from=suse.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-nvdimm-bounces@lists.01.org Received: from ml01.vlan13.01.org (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id B32C0100F2253; Tue, 18 May 2021 04:08:33 -0700 (PDT) Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=195.135.220.15; helo=mx2.suse.de; envelope-from=mhocko@suse.com; receiver= Received: from mx2.suse.de (mx2.suse.de [195.135.220.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 8E0FE100F224B for ; Tue, 18 May 2021 04:08:30 -0700 (PDT) X-Virus-Scanned: by amavisd-new at test-mx.suse.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1621336109; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=4YrC8sXmTYcRXRqQEW1PHcV/1KnSvWM0S1bOpAI2CJA=; b=IeXTGF9s14zk1xMYwqe63UzwmexLD0t5w2/lmVlgBw7GL+9Q9WNp2iapvjbdnvXH0892B0 1vztSfmB1vN+rsIDTC2mrkkDvcaU/PrlXK+za1yXSEDxf3T+eBJpwkZkg54uwDGDEWVXGh cLuYNls00SwLIDJ2DsL6MtGb3g25t6M= Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id B0DBDB00E; Tue, 18 May 2021 11:08:28 +0000 (UTC) Date: Tue, 18 May 2021 13:08:27 +0200 From: Michal Hocko To: David Hildenbrand Subject: Re: [PATCH v19 5/8] mm: introduce memfd_secret system call to create "secret" memory areas Message-ID: References: <20210513184734.29317-1-rppt@kernel.org> <20210513184734.29317-6-rppt@kernel.org> <8e114f09-60e4-2343-1c42-1beaf540c150@redhat.com> <00644dd8-edac-d3fd-a080-0a175fa9bf13@redhat.com> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <00644dd8-edac-d3fd-a080-0a175fa9bf13@redhat.com> Message-ID-Hash: 5X7SHTIYRWDS7M6RNYUVVZYGNT5PATWV X-Message-ID-Hash: 5X7SHTIYRWDS7M6RNYUVVZYGNT5PATWV X-MailFrom: mhocko@suse.com X-Mailman-Rule-Hits: nonmember-moderation X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation CC: Mike Rapoport , Andrew Morton , Alexander Viro , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Catalin Marinas , Christopher Lameter , Dave Hansen , Elena Reshetova , "H. Peter Anvin" , Hagen Paul Pfeifer , Ingo Molnar , James Bottomley , Kees Cook , "Kirill A. Shutemov" , Matthew Wilcox , Matthew Garrett , Mark Rutland , Mike Rapoport , Michael Kerrisk , Palmer Dabbelt , Palmer Dabbelt , Paul Walmsley , Peter Zijlstra , "Rafael J. Wysocki" , Rick Edgecombe , Roman Gushchin , Shakeel Butt , Shuah Khan , Thomas Gleixner , Tycho Andersen , Will Deacon , Yury Norov , linux-api@vger.kernel.org, linux-arch@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-nvdimm@lists.01.org, linux-riscv@lists.infradead.org, x86@kernel.org X-Mailman-Version: 3.1.1 Precedence: list List-Id: "Linux-nvdimm developer list." Archived-At: List-Archive: List-Help: List-Post: List-Subscribe: List-Unsubscribe: Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit On Tue 18-05-21 12:35:36, David Hildenbrand wrote: > On 18.05.21 12:31, Michal Hocko wrote: > > On Tue 18-05-21 12:06:42, David Hildenbrand wrote: > > > On 18.05.21 11:59, Michal Hocko wrote: > > > > On Sun 16-05-21 10:29:24, Mike Rapoport wrote: > > > > > On Fri, May 14, 2021 at 11:25:43AM +0200, David Hildenbrand wrote: > > > > [...] > > > > > > > + if (!page) > > > > > > > + return VM_FAULT_OOM; > > > > > > > + > > > > > > > + err = set_direct_map_invalid_noflush(page, 1); > > > > > > > + if (err) { > > > > > > > + put_page(page); > > > > > > > + return vmf_error(err); > > > > > > > > > > > > Would we want to translate that to a proper VM_FAULT_..., which would most > > > > > > probably be VM_FAULT_OOM when we fail to allocate a pagetable? > > > > > > > > > > That's what vmf_error does, it translates -ESOMETHING to VM_FAULT_XYZ. > > > > > > > > I haven't read through the rest but this has just caught my attention. > > > > Is it really reasonable to trigger the oom killer when you cannot > > > > invalidate the direct mapping. From a quick look at the code it is quite > > > > unlikely to se ENOMEM from that path (it allocates small pages) but this > > > > can become quite sublte over time. Shouldn't this simply SIGBUS if it > > > > cannot manipulate the direct mapping regardless of the underlying reason > > > > for that? > > > > > > > > > > OTOH, it means our kernel zones are depleted, so we'd better reclaim somehow > > > ... > > > > Killing a userspace seems to be just a bad way around that. > > > > Although I have to say openly that I am not a great fan of VM_FAULT_OOM > > in general. It is usually a a wrong way to tell the handle the failure > > because it happens outside of the allocation context so you lose all the > > details (e.g. allocation constrains, numa policy etc.). Also whenever > > there is ENOMEM then the allocation itself has already made sure that > > all the reclaim attempts have been already depleted. Just consider an > > allocation with GFP_NOWAIT/NO_RETRY or similar to fail and propagate > > ENOMEM up the call stack. Turning that into the OOM killer sounds like a > > bad idea to me. But that is a more general topic. I have tried to bring > > this up in the past but there was not much of an interest to fix it as > > it was not a pressing problem... > > > > I'm certainly interested; it would mean that we actually want to try > recovering from VM_FAULT_OOM in various cases, and as you state, we might > have to supply more information to make that work reliably. Or maybe we want to get rid of VM_FAULT_OOM altogether... But this is really tangent to this discussion. The only relation is that this would be another place to check when somebody wants to go that direction. > Having that said, I guess what we have here is just the same as when our > process fails to allocate a generic page table in __handle_mm_fault(), when > we fail p4d_alloc() and friends ... >From a quick look it is really similar in a sense that it effectively never happens and if it does then it certainly does the wrong thing. The point I was trying to make is that there is likely no need to go that way. Fundamentally, not being able to handle direct map for the page fault sounds like what SIGBUS should be used for. From my POV it is similar to ENOSPC when FS cannot allocate metadata on the storage. -- Michal Hocko SUSE Labs _______________________________________________ Linux-nvdimm mailing list -- linux-nvdimm@lists.01.org To unsubscribe send an email to linux-nvdimm-leave@lists.01.org