[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <775eb0cf-7189-a314-5dde-f720b56ec3b2@intel.com>
Date: Wed, 30 Oct 2019 10:58:49 -0700
From: Dave Hansen <dave.hansen@...el.com>
To: "Edgecombe, Rick P" <rick.p.edgecombe@...el.com>,
"peterz@...radead.org" <peterz@...radead.org>
Cc: "adobriyan@...il.com" <adobriyan@...il.com>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"rppt@...nel.org" <rppt@...nel.org>,
"rostedt@...dmis.org" <rostedt@...dmis.org>,
"jejb@...ux.ibm.com" <jejb@...ux.ibm.com>,
"tglx@...utronix.de" <tglx@...utronix.de>,
"linux-mm@...ck.org" <linux-mm@...ck.org>,
"dave.hansen@...ux.intel.com" <dave.hansen@...ux.intel.com>,
"linux-api@...r.kernel.org" <linux-api@...r.kernel.org>,
"x86@...nel.org" <x86@...nel.org>,
"akpm@...ux-foundation.org" <akpm@...ux-foundation.org>,
"hpa@...or.com" <hpa@...or.com>,
"mingo@...hat.com" <mingo@...hat.com>,
"luto@...nel.org" <luto@...nel.org>,
"kirill@...temov.name" <kirill@...temov.name>,
"bp@...en8.de" <bp@...en8.de>,
"rppt@...ux.ibm.com" <rppt@...ux.ibm.com>,
"arnd@...db.de" <arnd@...db.de>
Subject: Re: [PATCH RFC] mm: add MAP_EXCLUSIVE to create exclusive user
mappings
On 10/30/19 10:48 AM, Edgecombe, Rick P wrote:
> On Wed, 2019-10-30 at 11:04 +0100, Peter Zijlstra wrote:
>>> You mean shatter performance?
>>
>> Shatter (all) large pages.
>
> So it looks like this is already happening then to some degree. It's not just
> BPF either, any module_alloc() user is going to do something similar with the
> direct map alias of the page they got for the text.
>
> So there must be at least some usages where breaking the direct map down, for
> like a page to store a key or something, isn't totally horrible.
The systems that really need large pages are the large ones. They have
the same TLBs and data structures as really little systems, but orders
of magnitude more address space. Modules and BPF are a (hopefully) drop
in the bucket on small systems and they're really inconsequential on
really big systems.
Modules also require privilege.
Allowing random user apps to fracture the direct map for every page of
their memory or *lots* of pages of their memory is an entirely different
kind of problem from modules. It takes a "drop in the bucket"
fracturing and turns it into the common case.
Powered by blists - more mailing lists