Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp821989imm; Fri, 29 Jun 2018 07:00:54 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIk6VpmR9M6XLeOZCZDdu3pcZMar6fzwHMdd7sn9b6CXKO4GmIWQcikC2CgONkK36mzkvJo X-Received: by 2002:a17:902:3381:: with SMTP id b1-v6mr15286339plc.248.1530280854347; Fri, 29 Jun 2018 07:00:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530280854; cv=none; d=google.com; s=arc-20160816; b=YgFEaBnfjGo+E27xh/yIdOSC9KWqKv4O38ep+qBfkzq+lKnThg0hNpavExXdmkWKK5 SCpJMrqxIgQccG7JupK2oK0IEbZEeIe3yRTK2cN0fAZO0gQ0F0B1cviDY5upKf/84MYp mEFIBlvCCHb+TRsbgzoW0ICXb/5rXJbwI9FwJz6nMZ7gPWkT6aju//iGzc8gfQwObvFG wYailzHiO5ZHe3PuwhNebZmBTxcBvFSk7S0OubNGnTp/dXmKG5DvafggM7sY02YMOBDC 6fPSWCbcQSRkIoyWnXQnP8nfuY8kamlHPGoEJ2RHYD7yq5bDMv8BkVw63a1xM/QkyJYU loYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date :arc-authentication-results; bh=CkmFUKcj3XOaHceHlduz39Qw6WM7+kmH3Nl24dTAEM0=; b=UaM41ckIKwvlP0S/PWgRqzpZtZN5JXYrNTgMXz66DYbjgnQiDFyfchJ2uafylsKwN6 5BtgWNTOoBzCjeTZfnWtsPcK/Q8PTSW6WCTH1yDgpNPAX6BUvbomUIA8VQdtTf0RqW67 RN6zxWjxSC9+jLnMq2znVaUl4AZF4JEL9tVD4vM48lVyMH6iN4thLbcv6M4skZKYuxcg Bf9z4YchSFZetI+AXjaH48vETBsJW8Fd5Y8S/JsdYY4sDTQUtlKyNZwhrKWlQ8SCx18u Z+C5lNpiyWQBaDsK5+Ltn8FfzRQcS0ryuqc7F3nJ33QC/BCQuHRDCwv+35bp29JZ6nUG q5/w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v18-v6si9423560plo.285.2018.06.29.07.00.39; Fri, 29 Jun 2018 07:00:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S936101AbeF2Lev (ORCPT + 99 others); Fri, 29 Jun 2018 07:34:51 -0400 Received: from mx2.suse.de ([195.135.220.15]:60000 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S934003AbeF2Leu (ORCPT ); Fri, 29 Jun 2018 07:34:50 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id DA223AF51; Fri, 29 Jun 2018 11:34:48 +0000 (UTC) Date: Fri, 29 Jun 2018 13:34:47 +0200 From: Michal Hocko To: Yang Shi Cc: Peter Zijlstra , Nadav Amit , Matthew Wilcox , ldufour@linux.vnet.ibm.com, Andrew Morton , Ingo Molnar , acme@kernel.org, alexander.shishkin@linux.intel.com, jolsa@redhat.com, namhyung@kernel.org, "open list:MEMORY MANAGEMENT" , linux-kernel@vger.kernel.org Subject: Re: [RFC v2 PATCH 2/2] mm: mmap: zap pages with read mmap_sem for large mapping Message-ID: <20180629113447.GA5963@dhcp22.suse.cz> References: <158a4e4c-d290-77c4-a595-71332ede392b@linux.alibaba.com> <20180620071817.GJ13685@dhcp22.suse.cz> <263935d9-d07c-ab3e-9e42-89f73f57be1e@linux.alibaba.com> <20180626074344.GZ2458@hirez.programming.kicks-ass.net> <20180627072432.GC32348@dhcp22.suse.cz> <20180628115101.GE32348@dhcp22.suse.cz> <2ecdb667-f4de-673d-6a5f-ee50df505d0c@linux.alibaba.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <2ecdb667-f4de-673d-6a5f-ee50df505d0c@linux.alibaba.com> User-Agent: Mutt/1.10.0 (2018-05-17) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu 28-06-18 12:10:10, Yang Shi wrote: > > > On 6/28/18 4:51 AM, Michal Hocko wrote: > > On Wed 27-06-18 10:23:39, Yang Shi wrote: > > > > > > On 6/27/18 12:24 AM, Michal Hocko wrote: > > > > On Tue 26-06-18 18:03:34, Yang Shi wrote: > > > > > On 6/26/18 12:43 AM, Peter Zijlstra wrote: > > > > > > On Mon, Jun 25, 2018 at 05:06:23PM -0700, Yang Shi wrote: > > > > > > > By looking this deeper, we may not be able to cover all the unmapping range > > > > > > > for VM_DEAD, for example, if the start addr is in the middle of a vma. We > > > > > > > can't set VM_DEAD to that vma since that would trigger SIGSEGV for still > > > > > > > mapped area. > > > > > > > > > > > > > > splitting can't be done with read mmap_sem held, so maybe just set VM_DEAD > > > > > > > to non-overlapped vmas. Access to overlapped vmas (first and last) will > > > > > > > still have undefined behavior. > > > > > > Acquire mmap_sem for writing, split, mark VM_DEAD, drop mmap_sem. Acquire > > > > > > mmap_sem for reading, madv_free drop mmap_sem. Acquire mmap_sem for > > > > > > writing, free everything left, drop mmap_sem. > > > > > > > > > > > > ? > > > > > > > > > > > > Sure, you acquire the lock 3 times, but both write instances should be > > > > > > 'short', and I suppose you can do a demote between 1 and 2 if you care. > > > > > Thanks, Peter. Yes, by looking the code and trying two different approaches, > > > > > it looks this approach is the most straight-forward one. > > > > Yes, you just have to be careful about the max vma count limit. > > > Yes, we should just need copy what do_munmap does as below: > > > > > > if (end < vma->vm_end && mm->map_count >= sysctl_max_map_count) > > > ??? ??? ??? return -ENOMEM; > > > > > > If the mas map count limit has been reached, it will return failure before > > > zapping mappings. > > Yeah, but as soon as you drop the lock and retake it, somebody might > > have changed the adddress space and we might get inconsistency. > > > > So I am wondering whether we really need upgrade_read (to promote read > > to write lock) and do the > > down_write > > split & set up VM_DEAD > > downgrade_write > > unmap > > upgrade_read > > zap ptes > > up_write > > I'm supposed address space changing just can be done by mmap, mremap, > mprotect. If so, we may utilize the new VM_DEAD flag. If the VM_DEAD flag is > set for the vma, just return failure since it is being unmapped. I am sorry I do not follow. How does VM_DEAD flag helps for a completely unrelated vmas? Or maybe it would be better to post the code to see what you mean exactly. -- Michal Hocko SUSE Labs