Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp816177imm; Fri, 14 Sep 2018 06:49:39 -0700 (PDT) X-Google-Smtp-Source: ANB0VdY+f4XOyosPmDof/mlJGK+rrcc54YF4w0rgBgbDWKSiZI5BM971JTgMPv2KdO8ApJLjScPU X-Received: by 2002:a62:6003:: with SMTP id u3-v6mr12819967pfb.114.1536932979776; Fri, 14 Sep 2018 06:49:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536932979; cv=none; d=google.com; s=arc-20160816; b=G2/bkv9cfmcynVuDAsiWsrCSpMS7OiT9l9CCHQFCmeXkLZezKZ8Acu+rr/54qYiWdi wUYACBZfZW7VhVSgFAehbSR9+1H41vk2/IeGzJQrVVXwHbu/BP9udF46puiYG0Ln1GOK CIctxEUWvfIjj06yy5ekpo+US2k/tFLYp+eOHGm2lovbF1+1Y63QEUhj9nmRmDM+ZzQ7 QJi4YTuFP9xRa9LoMGcW8xD3JMD23cLLTEu3vCrAWSGP74qlpzYpok6U8nVnBv26hHlH 5DvfaOVe6aj2e1O0j6dd5UedzcbTWcm+EgsWsyl6E/kF1kkDHPQDbOXjn+hIK70nNKPW leYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=2fPT7ASkPgDq/kaFVH8o0xpR0cpsiqreX/ZDM46AdJE=; b=XPgiZ4dPZDAUj5zxf21lpvP5uD15lfRcCuCHhv9mbhcRA9euxgwVGduhrj5hbAKcVJ E9Z+/vgmQMSep+T+Yvq5CTvSTMAnSQlOsekXLUcIV8XZ2fc9OkB6UntiltIxgFCsqo4g Yu3yT01KoGhA+TAkmjtI78QYCcPzGIyLdKQh/CL+hG6rU1sBVKmqVGVwQhhW9r6ml2s3 o9p19tcNh6KeFfWJBL0X8xq/ixMAnNpn0/tcF7zvk8s0ggBuaXSdVzXeUGFDlKnjFvvs ID29Y+zfEl65M0Bp4w4fTAnM6uEVn1KEbPTKdih4Sv+pTRSHmRzT2G9XWvGYt+nWGEKs aRjA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o126-v6si7023350pfb.20.2018.09.14.06.49.24; Fri, 14 Sep 2018 06:49:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727982AbeINTDp (ORCPT + 99 others); Fri, 14 Sep 2018 15:03:45 -0400 Received: from mx2.suse.de ([195.135.220.15]:41528 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727013AbeINTDp (ORCPT ); Fri, 14 Sep 2018 15:03:45 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 21C72AE52; Fri, 14 Sep 2018 13:49:07 +0000 (UTC) Date: Fri, 14 Sep 2018 15:49:05 +0200 From: Michal Hocko To: Jann Horn Cc: Prakash Sangappa , Dave Hansen , Anshuman Khandual , Andrew Morton , kernel list , Linux-MM , Linux API , "Kirill A . Shutemov" , n-horiguchi@ah.jp.nec.com, Ulrich Drepper , David Rientjes , Horiguchi Naoya , steven.sistare@oracle.com Subject: Re: [RFC PATCH] Add /proc//numa_vamaps for numa node information Message-ID: <20180914134905.GA6081@dhcp22.suse.cz> References: <82d2b35c-272a-ad02-692f-2c109aacdfb6@oracle.com> <8569dabb-4930-aa20-6249-72457e2df51e@intel.com> <51145ccb-fc0d-0281-9757-fb8a5112ec24@oracle.com> <94ee0b6c-4663-0705-d4a8-c50342f6b483@oracle.com> <20180914062132.GI20287@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 14-09-18 14:49:10, Jann Horn wrote: > On Fri, Sep 14, 2018 at 8:21 AM Michal Hocko wrote: > > On Fri 14-09-18 03:33:28, Jann Horn wrote: > > > On Wed, Sep 12, 2018 at 10:43 PM prakash.sangappa > > > wrote: > > > > On 05/09/2018 04:31 PM, Dave Hansen wrote: > > > > > On 05/07/2018 06:16 PM, prakash.sangappa wrote: > > > > >> It will be /proc//numa_vamaps. Yes, the behavior will be > > > > >> different with respect to seeking. Output will still be text and > > > > >> the format will be same. > > > > >> > > > > >> I want to get feedback on this approach. > > > > > I think it would be really great if you can write down a list of the > > > > > things you actually want to accomplish. Dare I say: you need a > > > > > requirements list. > > > > > > > > > > The numa_vamaps approach continues down the path of an ever-growing list > > > > > of highly-specialized /proc/ files. I don't think that is > > > > > sustainable, even if it has been our trajectory for many years. > > > > > > > > > > Pagemap wasn't exactly a shining example of us getting new ABIs right, > > > > > but it sounds like something along those is what we need. > > > > > > > > Just sent out a V2 patch. This patch simplifies the file content. It > > > > only provides VA range to numa node id information. > > > > > > > > The requirement is basically observability for performance analysis. > > > > > > > > - Need to be able to determine VA range to numa node id information. > > > > Which also gives an idea of which range has memory allocated. > > > > > > > > - The proc file /proc//numa_vamaps is in text so it is easy to > > > > directly view. > > > > > > > > The V2 patch supports seeking to a particular process VA from where > > > > the application could read the VA to numa node id information. > > > > > > > > Also added the 'PTRACE_MODE_READ_REALCREDS' check when opening the > > > > file /proc file as was indicated by Michal Hacko > > > > > > procfs files should use PTRACE_MODE_*_FSCREDS, not PTRACE_MODE_*_REALCREDS. > > > > Out of my curiosity, what is the semantic difference? At least > > kernel_move_pages uses PTRACE_MODE_READ_REALCREDS. Is this a bug? > > No, that's fine. REALCREDS basically means "look at the caller's real > UID for the access check", while FSCREDS means "look at the caller's > filesystem UID". The ptrace access check has historically been using > the real UID, which is sorta weird, but normally works fine. Given > that this is documented, I didn't see any reason to change it for most > things that do ptrace access checks, even if the EUID would IMO be > more appropriate. But things that capture caller credentials at points > like open() really shouldn't look at the real UID; instead, they > should use the filesystem UID (which in practice is basically the same > as the EUID). > > So in short, it depends on the interface you're coming through: Direct > syscalls use REALCREDS, things that go through the VFS layer use > FSCREDS. Ahh, OK, I see. Thanks for the clarification! Then I agree that the proc interface should use FSCREDS. -- Michal Hocko SUSE Labs