From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753345AbdFPNP6 (ORCPT ); Fri, 16 Jun 2017 09:15:58 -0400 Received: from mx1.redhat.com ([209.132.183.28]:49530 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752967AbdFPNP4 (ORCPT ); Fri, 16 Jun 2017 09:15:56 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 7407165D0D Authentication-Results: ext-mx09.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx09.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=aarcange@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com 7407165D0D Date: Fri, 16 Jun 2017 15:15:54 +0200 From: Andrea Arcangeli To: Prakash Sangappa Cc: Christoph Hellwig , Dave Hansen , linux-kernel@vger.kernel.org, linux-mm@kvack.org, Mike Rapoport , Mike Kravetz Subject: Re: [PATCH RFC] hugetlbfs 'noautofill' mount option Message-ID: <20170616131554.GD11676@redhat.com> References: <326e38dd-b4a8-e0ca-6ff7-af60e8045c74@oracle.com> <7ff6fb32-7d16-af4f-d9d5-698ab7e9e14b@intel.com> <03127895-3c5a-5182-82de-3baa3116749e@oracle.com> <22557bf3-14bb-de02-7b1b-a79873c583f1@intel.com> <7677d20e-5d53-1fb7-5dac-425edda70b7b@oracle.com> <48a544c4-61b3-acaf-0386-649f073602b6@intel.com> <476ea1b6-36d1-bc86-fa99-b727e3c2650d@oracle.com> <20170509085825.GB32555@infradead.org> <1031e0d4-cdbb-db8b-dae7-7c733921e20e@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1031e0d4-cdbb-db8b-dae7-7c733921e20e@oracle.com> User-Agent: Mutt/1.8.3 (2017-05-23) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.38]); Fri, 16 Jun 2017 13:15:56 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello Prakash, On Tue, May 09, 2017 at 01:59:34PM -0700, Prakash Sangappa wrote: > > > On 5/9/17 1:58 AM, Christoph Hellwig wrote: > > On Mon, May 08, 2017 at 03:12:42PM -0700, prakash.sangappa wrote: > >> Regarding #3 as a general feature, do we want to > >> consider this and the complexity associated with the > >> implementation? > > We have to. Given that no one has exclusive access to hugetlbfs > > a mount option is fundamentally the wrong interface. > > > A hugetlbfs filesystem may need to be mounted for exclusive use by > an application. Note, recently the 'min_size' mount option was added > to hugetlbfs, which would reserve minimum number of huge pages > for that filesystem for use by an application. If the filesystem with > min size specified, is not setup for exclusive use by an application, > then the purpose of reserving huge pages is defeated. The > min_size option was for use by applications like the database. > > Also, I am investigating enabling hugetlbfs mounts within user > namespace's mount namespace. That would allow an application > to mount a hugetlbfs filesystem inside a namespace exclusively for > its use, running as a non root user. For this it seems like the 'min_size' > should be subject to some user limits. Anyways, mounting inside > user namespaces is a different discussion. > > So, if a filesystem has to be setup for exclusive use by an application, > then different mount options can be used for that filesystem. Before userfaultfd I used a madvise that triggered SIGBUS. Aside from performance that is much lower than userfaultfd because of the return to userland, SIGBUS handling and new enter kernel to communicate through a pipe with a memory manager, it couldn't work reliably because you're not going to get exact information on the virtual address that triggered the fault if the SIGBUS triggers in some random in a copy-user of some random syscall, depending on the syscall some random error will be returned. So it couldn't work transparently to the app as far as syscalls and get_user_pages drivers were concerned. With your solution if you pass a corrupted pointer to a random read() syscall you're going to get a error, but supposedly you already handle any syscall error and stop the app. This is a special case because you don't care about performance and you don't care about not returning random EFAULT errors from syscalls like read(). This mount option seems non intrusive enough and hugetlbfs is quite special already, so I'm not particularly concerned by the fact it's one more special tweak. If it would be enough to convert the SIGBUS into a (killable) process hang, you could still use uffd and there would be no need to send the uffd to a manager. You'd find the corrupting buggy process stuck in handle_userfault(). As an alternative to the mount option we could consider adding UFFD_FEATURE_SIGBUS that tells the handle_userfault() to simply return VM_FAULT_SIGBUS in presence of a pagefault event. You'd still get weird EFAULT or erratic retvals from syscalls so it would only be usable in for your robustness feature. Then you could use UFFDIO_COPY too to fill the memory atomically which runs faster than a page fault (fallocate punch hole still required to zap it). Adding a single if (ctx->feature & UFFD_FEATURE_SIGBUS) goto out, branch for this corner case to handle_userfault() isn't great and the hugetlbfs mount option is absolutely zero cost to the handle_userfault which is primarily why I'm not against it.. although it's not going to be measurable so it would be ok also to add such feature. Thanks, Andrea