[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <fb4e4e90-6694-da90-7a72-c7bc9e9c356a@intel.com>
Date: Thu, 30 Apr 2020 10:30:46 -0700
From: Dave Hansen <dave.hansen@...el.com>
To: Claudio Imbrenda <imbrenda@...ux.ibm.com>
Cc: Christian Borntraeger <borntraeger@...ibm.com>,
akpm@...ux-foundation.org, jack@...e.cz, kirill@...temov.name,
david@...hat.com, aarcange@...hat.com, linux-mm@...ck.org,
frankja@...ux.ibm.com, sfr@...b.auug.org.au, jhubbard@...dia.com,
linux-kernel@...r.kernel.org, linux-s390@...r.kernel.org,
peterz@...radead.org, sean.j.christopherson@...el.com,
Ulrich.Weigand@...ibm.com
Subject: Re: [PATCH v1 1/1] fs/splice: add missing callback for inaccessible
pages
On 4/30/20 10:19 AM, Claudio Imbrenda wrote:
> On Wed, 29 Apr 2020 16:52:46 -0700
> Dave Hansen <dave.hansen@...el.com> wrote:
>
>> On 4/29/20 3:53 PM, Claudio Imbrenda wrote:
>>>> Actually, that's the problem. You've gone through all these
>>>> careful checks and made the page inaccessible. *After* that
>>>> process, how do you keep the page from being hit by an I/O device
>>>> before it's made accessible again? My patch just assumes that
>>>> *all* pages have gone through that process and passed those
>>>> checks.
>>> I don't understand what you are saying here.
>>>
>>> we start with all pages accessible, we mark pages as inaccessible
>>> when they are imported in the secure guest (we use the PG_arch_1
>>> bit in struct page). we then try to catch all I/O on inaccessible
>>> pages and make them accessible so that I/O devices are happy.
>>
>> The catching mechanism is incomplete, that's all I'm saying.
>
> well, sendto in the end does a copy_from_user or a get_user_pages_fast,
> both are covered (once we fix the make_accessible to work on FOLL_GET
> too).
Agreed. This is inching forward, increasing the coverage of the hooks.
My confidence in the hooks being complete at this point is pretty low.
>> Without looking too hard, and not even having the hardware, I've found
>> two paths where the "catching" was incomplete:
>>
>> 1. sendfile(), which you've patched
>> 2. sendto(), which you haven't patched
>>
>>> either your quick and dirty patch was too dirty (e.g. not accounting
>>> for possible races between make_accessible/make_inaccessible), or
>>> some of the functions in the trace you provided should do
>>> pin_user_page instead of get_user_page (or both)
>>
>> I looked in the traces for any races. For sendto(), at least, the
>> make_accessible() never happened before the process exited. That's
>> entirely consistent with the theory that it entirely missed being
>> caught. I can't find any evidence that there were races.
>>
>> Go ahead and try it. You have the patch! I mean, I found a bug in
>> about 10 minutes in one tiny little VM.
>
> I tried your patch, but I could not reproduce the problem. I have a
> Debian 10 x86_64 with the latest kernel from master and your patch on
> top. is there anything I'm missing? which virtual devices are you using?
> any particular .config options?
I'm using an emulated e1000 which seems to be the device that notices
problems most readily. A snippet of the qemu command-line is:
qemu-system-x86_64 -enable-kvm -drive id=disk,file=/path,if=none -device
ahci,id=ahci -device ide-drive,drive=disk,bus=ahci.0 -net
nic,model=e1000 -net user,net=192.168.76.0/24,dhcpstart=192.168.76.44
I'm also using "-cpu host,-pcid" if that makes a difference. It's just
a plain Skylake client system: "Intel(R) Core(TM) i5-6300U CPU @ 2.40GHz".
> are you using transparent hugepages by any chance? the
> infrastructure for inaccessible pages is meant only for small pages,
> since on s390x only small pages can ever be used for secure
> guests and therefore become inaccessible.
Yes, THP is probably enabled and in play. But, I did dump out
PageAnon() in some of my traces and it was never set, which rules out THP.
The fact that this infrastructure is not designed to play nicely with
large pages doesn't bode well for its use on a second architecture.
Powered by blists - more mailing lists