Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759006AbaDBUNo (ORCPT ); Wed, 2 Apr 2014 16:13:44 -0400 Received: from mail-pa0-f42.google.com ([209.85.220.42]:60712 "EHLO mail-pa0-f42.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758984AbaDBUNi (ORCPT ); Wed, 2 Apr 2014 16:13:38 -0400 Message-ID: <533C6F6E.4080601@linaro.org> Date: Wed, 02 Apr 2014 13:13:34 -0700 From: John Stultz User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0 MIME-Version: 1.0 To: Johannes Weiner CC: Dave Hansen , "H. Peter Anvin" , LKML , Andrew Morton , Android Kernel Team , Robert Love , Mel Gorman , Hugh Dickins , Rik van Riel , Dmitry Adamushko , Neil Brown , Andrea Arcangeli , Mike Hommey , Taras Glek , Jan Kara , KOSAKI Motohiro , Michel Lespinasse , Minchan Kim , "linux-mm@kvack.org" Subject: Re: [PATCH 0/5] Volatile Ranges (v12) & LSF-MM discussion fodder References: <1395436655-21670-1-git-send-email-john.stultz@linaro.org> <20140401212102.GM4407@cmpxchg.org> <533B313E.5000403@zytor.com> <533B4555.3000608@sr71.net> <533B8E3C.3090606@linaro.org> <20140402163638.GQ14688@cmpxchg.org> <20140402175852.GS14688@cmpxchg.org> <20140402194708.GV14688@cmpxchg.org> In-Reply-To: <20140402194708.GV14688@cmpxchg.org> X-Enigmail-Version: 1.6 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/02/2014 12:47 PM, Johannes Weiner wrote: > On Wed, Apr 02, 2014 at 12:01:00PM -0700, John Stultz wrote: >> On Wed, Apr 2, 2014 at 10:58 AM, Johannes Weiner wrote: >>> On Wed, Apr 02, 2014 at 10:40:16AM -0700, John Stultz wrote: >>>> That point beside, I think the other problem with the page-cleaning >>>> volatility approach is that there are other awkward side effects. For >>>> example: Say an application marks a range as volatile. One page in the >>>> range is then purged. The application, due to a bug or otherwise, >>>> reads the volatile range. This causes the page to be zero-filled in, >>>> and the application silently uses the corrupted data (which isn't >>>> great). More problematic though, is that by faulting the page in, >>>> they've in effect lost the purge state for that page. When the >>>> application then goes to mark the range as non-volatile, all pages are >>>> present, so we'd return that no pages were purged. From an >>>> application perspective this is pretty ugly. >>>> >>>> Johannes: Any thoughts on this potential issue with your proposal? Am >>>> I missing something else? >>> No, this is accurate. However, I don't really see how this is >>> different than any other use-after-free bug. If you access malloc >>> memory after free(), you might receive a SIGSEGV, you might see random >>> data, you might corrupt somebody else's data. This certainly isn't >>> nice, but it's not exactly new behavior, is it? >> The part that troubles me is that I see the purged state as kernel >> data being corrupted by userland in this case. The kernel will tell >> userspace that no pages were purged, even though they were. Only >> because userspace made an errant read of a page, and got garbage data >> back. > That sounds overly dramatic to me. First of all, this data still > reflects accurately the actions of userspace in this situation. And > secondly, the kernel does not rely on this data to be meaningful from > a userspace perspective to function correctly. Maybe you're right, but I feel this is the sort of thing application developers would be surprised and annoyed by. > It's really nothing but a use-after-free bug that has consequences for > no-one but the faulty application. The thing that IS new is that even > a read is enough to corrupt your data in this case. > > MADV_REVIVE could return 0 if all pages in the specified range were > present, -Esomething if otherwise. That would be semantically sound > even if userspace messes up. So its semantically more of just a combined mincore+dirty operation.. and nothing more? What are other folks thinking about this? Although I don't particularly like it, I probably could go along with Johannes' approach, forgoing SIGBUS for zero-fill and adapting the semantics that are in my mind a bit stranger. This would allow for ashmem-like style behavior w/ the additional write-clears-volatile-state and read-clears-purged-state constraints (which I don't think would be problematic for Android, but am not totally sure). But I do worry that these semantics are easier for kernel-mm-developers to grasp, but are much much harder for application developers to understand. Additionally unless we could really leave access-after-volatile as a total undefined behavior, this would lock us into O(page) behavior and would remove the possibility of O(log(ranges)) behavior Minchan and I were able to get (admittedly with more complicated code - but something I was hoping we'd be able to get back to after the base semantics and interface behavior was understood and merged). I since applications will have bugs and will access after volatile, we won't be able to get away with that sort of behavioral flexibility. thanks -john -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/