lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 8 Aug 2013 12:25:35 -0700
From:	Andy Lutomirski <luto@...capital.net>
To:	Jan Kara <jack@...e.cz>
Cc:	Dave Hansen <dave.hansen@...el.com>, linux-mm@...ck.org,
	linux-ext4@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [RFC 0/3] Add madvise(..., MADV_WILLWRITE)

On Thu, Aug 8, 2013 at 11:53 AM, Jan Kara <jack@...e.cz> wrote:
> On Thu 08-08-13 08:56:28, Andy Lutomirski wrote:
>> On Thu, Aug 8, 2013 at 3:18 AM, Jan Kara <jack@...e.cz> wrote:
>> > On Wed 07-08-13 11:00:52, Andy Lutomirski wrote:
>> >> On Wed, Aug 7, 2013 at 10:40 AM, Dave Hansen <dave.hansen@...el.com> wrote:
>> >> > On 08/07/2013 06:40 AM, Jan Kara wrote:
>> >> >>   One question before I look at the patches: Why don't you use fallocate()
>> >> >> in your application? The functionality you require seems to be pretty
>> >> >> similar to it - writing to an already allocated block is usually quick.
>> >> >
>> >> > One problem I've seen is that it still costs you a fault per-page to get
>> >> > the PTEs in to a state where you can write to the memory.  MADV_WILLNEED
>> >> > will do readahead to get the page cache filled, but it still leaves the
>> >> > pages unmapped.  Those faults get expensive when you're trying to do a
>> >> > couple hundred million of them all at once.
>> >>
>> >> I have grand plans to teach the kernel to use hardware dirty tracking
>> >> so that (some?) pages can be left clean and writable for long periods
>> >> of time.  This will be hard.
>> >   Right that will be tough... Although with your application you could
>> > require such pages to be mlocked and then I could imagine we would get away
>> > at least from problems with dirty page accounting.
>>
>> True.  The nasty part will be all the code that assumes that the acts
>> of un-write-protecting and dirtying are the same thing, for example
>> __block_write_begin, which is why I don't really believe in my
>> willwrite patches...
>>
>> >
>> >> Even so, the second write fault to a page tends to take only a few
>> >> microseconds, while the first one often blocks in fs code.
>> >   So you wrote blocks are already preallocated with fallocate(). If you
>> > also preload pages in memory with MADV_WILLNEED is there still big
>> > difference between the first and subsequent write fault?
>>
>> I haven't measured it yet, because I suspect that my patches are
>> rather buggy in their current form.
>   I think you're mistaking MADV_WILLNEED with your MADV_WILLWRITE.
> MADV_WILLNEED will just trigger readahead for the range - thus you should
> have all pages with their block mappings set up in memory. Now the first
> writeable fault will still have to do some work, namely converting
> unwritten extents in extent tree to written ones. So there is going to be
> some difference between the first and subsequent writeable faults. But I'd
> like to see whether the difference is really worth the effort with new
> MADV_... call.
>

Whoops -- I read your email too quickly.  I haven't tried
MADV_WILLNEED, but I think I tried reading each page to fault them in.
 Is there any reason to expect MADV_WILLNEED to do any better?  I'll
try to do some new tests to see how well this all works.

(I imagine that freshly fallocated files are somehow different when
read, since there aren't zeros on the disk backing them until they get
written.)

--Andy

>                                                                 Honza
> --
> Jan Kara <jack@...e.cz>
> SUSE Labs, CR



-- 
Andy Lutomirski
AMA Capital Management, LLC
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists