[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.64.0906081902520.9518@sister.anvils>
Date: Mon, 8 Jun 2009 19:32:07 +0100 (BST)
From: Hugh Dickins <hugh.dickins@...cali.co.uk>
To: Izik Eidus <ieidus@...hat.com>
cc: aarcange@...hat.com, akpm@...ux-foundation.org,
nickpiggin@...oo.com.au, chrisw@...hat.com, riel@...hat.com,
linux-kernel@...r.kernel.org, linux-mm@...ck.org
Subject: Re: [PATCH 0/4] RFC - ksm api change into madvise
On Mon, 8 Jun 2009, Izik Eidus wrote:
> Hugh Dickins wrote:
> >
> > You seem to have no callback in fork: doesn't that mean that KSM
> > pages get into mms of which mm/ksm.c has no knowledge?
> What you mean by this?, should the vma flags be copyed into the child and
> therefore ksm will scan the vma?
That part should be happening automatically now
(you'd have to add code to avoid copying VM_ flags).
> (only thing i have to check is: maybe the process itself wont go into the
> mmlist, and therefore ksm wont know about it)
But that part needs something to make it happen. In the case of
swap, it's done over in copy_one_pte; the important thing is to
do it where the locking is such that it cannot get missed,
I can't say where is the right place yet.
>
> > You had
> > no callback in mremap move: doesn't that mean that KSM pages could
> > be moved into areas which mm/ksm.c never tracked? Though that's
> > probably no issue now we move over to vmas: they should now travel
> > with their VM flag. You have no callback in unmap: doesn't that
> > mean that KSM never knows when its pages have gone away?
> >
>
> Yes, Adding all this callbacks would make ksm much more happy, Again, i didnt
> want to scare anyone...
Izik, you're too kindly ;)
>
> > (Closing the /dev/ksm fd used to clean up some of this, in the
> > end; but the lifetime of the fd can be so different from that of
> > the mapped area, I've felt very unsafe with that technique - a good
> > technique when you're trying to sneak in special handling for your
> > special driver, but not a good technique once you go to mainline.)
> >
> > I haven't worked out the full consequences of these lost pages:
> > perhaps it's no worse than that you could never properly enforce
> > your ksm_thread_max_kernel_pages quota.
> >
>
> You mean the shared pages outside the stable tree comment?
I don't understand or even parse that question: which probably
means, no. I mean that if the merged pages end up in areas
outside of where your trees expect them, then you've got pages
counted which cannot be found to have gone. Whether you can get
too many resident pages that way, or just more counted than are
really there, I don't know: I've not worked through the accounting
yet, and would really really prefer it to be exact, instead of
pages getting lost outside the trees and raising these questions.
But you may tell me that I simply haven't understood it yet.
> > And a question on your page_wrprotect() addition to mm/rmap.c: though
> > it may contain some important checks (I'm thinking of the get_user_pages
> > protection), isn't it essentially redundant, and should be removed from
> > the patchset? If we have a private page which is mapped into more than
> > the one address space by which we arrive at it, then, quite independent
> > of KSM, it needs to be write-protected already to prevent mods in one
> > address space leaking into another - doesn't it? So I see no need for
> > the rmap'ped write-protection there, just make the checks and write
> > protect the pte you have in ksm.c. Or am I missing something?
> >
>
> Ok, so we have here 2 cases for ksm:
> 1:
> When the page is anonymous and is mapped readonly beteween serveal
> processes:
> for this you say we shouldnt walk over the rmap and try to
> writeprotect what is already writeprtected...
Yes.
>
> 2:
> When the page is anonymous and is mapped write by just one process:
> for this you say it is better to handle it directly from inside ksm
> beacuse we already know
> the virtual address mapping of this page?
Yes.
>
> so about this: you are right about the fact that we might dont have to
> walk over the rmap of the page for pages with mapcount 1
> but isnt it cleaner to deal it inside rmap.c?
If you needed to writeprotect pages with mapcount 2, 3, ... then
indeed you'd want to do it in rmap.c, and you wouldn't want to
specialcase mapcount 1. But I'm saying you don't need to do the
writeprotection with mapcount 2, 3, ...; therefore better just
to do it (again, no need to special case mapcount 1) in ksm.c.
Cutting out a body of code: that's as clean as clean can be.
> another thing, get_user_pages() protection is needed even in
> that case, beacuse get_user_pages_fast is lockless, so odirect
> can run under our legs after we write protecting the page.
That I don't dispute, I made a point of saying that "it may contain
some important checks (I'm thinking of the get_user_pages protection)",
meaning that you'd want to transfer any such checks to ksm.c.
(In my own preferred patchset structure, I'd actually like that
O_DIRECT get_user_pages consideration added as a separate patch
over the base: one needs to focus in a very different way to get
those issues, it's better to hold them up for separate inspection.
The patch before would be buggy, yes, but not in such a way that
anyone bisecting for an unrelated bug would get inconvenienced.)
>
> anyway, nothing critical, i dont mind to move page_write_protect_one()
> into ksm.c, i still think get_user_pages protection is needed.
Yes, something like that.
Hugh
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists