[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Y5IACIN6b5UaYq42@x1n>
Date: Thu, 8 Dec 2022 10:17:28 -0500
From: Peter Xu <peterx@...hat.com>
To: David Hildenbrand <david@...hat.com>
Cc: linux-kernel@...r.kernel.org, linux-mm@...ck.org,
Ives van Hoorne <ives@...esandbox.io>,
stable@...r.kernel.org, Andrew Morton <akpm@...ux-foundation.org>,
Hugh Dickins <hugh@...itas.com>,
Alistair Popple <apopple@...dia.com>,
Mike Rapoport <rppt@...ux.vnet.ibm.com>,
Nadav Amit <nadav.amit@...il.com>,
Andrea Arcangeli <aarcange@...hat.com>
Subject: Re: [PATCH RFC] mm/userfaultfd: enable writenotify while
userfaultfd-wp is enabled for a VMA
On Wed, Dec 07, 2022 at 09:10:41PM +0100, David Hildenbrand wrote:
> Now, my 2 cents on the whole topic regarding "supported", "not supported"
> etc:
>
> (1) If something is not supported we should bail out or at least warn
> the user. I'm pretty sure there are other uffd-wp dummy users like
> me. Skimming over the man userfaultfd page nothing in particular
> regarding PROT_WRITE, mprotect(), ... maybe I looked at the wrong
> page.
> (2) If something is easy to support, support it instead of having all
> these surprises for users and having to document them and warn the
> user. Makes all these discussions regarding what's supported, what's
> a valid use case, etc ... much easier.
> (3) Inconsistency confuses users. If something used to work for anon,
> in an ideal world, we make shmem behave in a similar, non-surprising
> way.
> (4) There are much smarter people like me with much more advanced
> magical hats. I'm pretty sure they will come up with use cases that
> I am not even able to anticipate right now.
> (5) Users will make any imaginable mistake possible and point at the
> doc, that nothing speaks against it and that the system didn't bail
> out.
>
> Again, just my 2 cents. Maybe the dos and don'ts of userfaultfd-wp are
> properly documented already and we just don't bail out.
I just don't know how to properly document it with all the information. If
things missing we can always work on top, but again I hope we don't go too
far from what will become useful.
Note that I never said mprotect is not supported... AFAIR there is a use
case where one can (with non-cooperative mode) use uffd-wp to track a
process who does mprotect. For anon uffd-wp it should work already, now
this also reminded me maybe yes with the vm_page_prot patch for shmem from
you it'll also work with shmem and it's still good to have that. In that
case IIUC we'll just notify uffd-wp first then with SIGBUS.
Said that, it's still unclear how these things are used altogether in an
intended way. Let me give some examples.
- What if uffd-wp is registered with SIGBUS mode? How it'll work with
mprotect(RO) too which also use SIGBUS?
- What if uffd-wp tracks a process that also use uffd-wp? Now nest cannot
work, but do we need to document it explicitly, or should we just
implemented nesting of uffd-wp?
- Even if uffd-wp seems to work well with mprotect(RO), what about all the
rest modes combined? Uffd has missing and minor mode, mprotect can do
more than RO. One thing we used to discuss but a slight different case:
what happens if one registers with uffd missing and also mprotect(NONE)?
When the page accessed IIUC we will notify SIGBUS first instead of uffd
because IIRC we'll check vma flags earlier. Is this the behavior we
wanted? What's the expected behavior? This will also be a different
order we notify comparing to the case of "uffd-wp with mprotect(RO)"
because in that case we notify uffd-wp before SIGBUS. Should we revert
the order there just to align with everything?
Sorry to dump these examples. What I wanted to say is to me there're just
so many things to consider and that's just a start. I am not sure whether
it'll be even worth it to decide which should be the right order and make
everything very much defined, even if I still think 99% of the people will
not even care, when someone cares as a start from 1% then 0.99% of them
will find that they can actually do it cleaner with other approaches with
the same kernel facilities.
What about the last 0.01%? They're the driven force to enhance the kernel,
that's always my understanding. They'll either start to ask: "hey I have a
use case that want to use uffd with mprotect() in this way, and that cannot
be done by existing infras. Would it make sense to allow it to happen?".
Or they come with patches. That's how things evolve to me.
These may be seen as excuses of not having proper documentation, personally
sometimes it's not easy for me to draw the line myself on which should be
properly documented and which may not be needed. What I worry is over
engineer and we spend time on things that may not as important or more
priority than something else.
Going back - the solo request I was asking to not use a mprotect example is
mprotect is really not the one that the majority should use for using
uffd-wp. It's not easy to help people understand the problem at all.
That's all for that.
Thanks,
--
Peter Xu
Powered by blists - more mailing lists