Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp382146imu; Tue, 20 Nov 2018 00:26:39 -0800 (PST) X-Google-Smtp-Source: AFSGD/W3yK5S7CdzhPwTia0wqiM9u5VY1urrQsHaxs1gUznZMuK/9qiBwmxf3F9pUZyXTm9pbyze X-Received: by 2002:a17:902:5ac2:: with SMTP id g2mr1202826plm.313.1542702399519; Tue, 20 Nov 2018 00:26:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542702399; cv=none; d=google.com; s=arc-20160816; b=0vZxH154k2PgW9r/iFZ9ZSGsF78giZUeJpxmjMHbSsZXWPETnwaDC2kOgse44Jafvb eNVnsHlIwfShxMUNVI3uBAnC/UUl77rDlztIMNj2qZeObh4dAMhAdiQ8eDVSa9r44h5L bKgpIRV2eR/i2c1J7P9l/K5nYU/4g6VAW/BRramDl63oDVj1ebXPtDpea/IY5WLYW1x2 Vdrt2gmU2HWCHT+NFy6OMforl4mun5m6j5gXJv7dNc8H6Ebo0Hm8Jck0SuK37TLEeR4Y bO/MM/krDYVr4rzTlKA82EZ3ELw9Z29Li53ozm9fWV2Yysc7lJ3BLiSG17UWWjgIHLTc i4RQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=LMJaiAJASbEMkmmmFOXQmHghEqIUdN+Q5djl5ZIeZRk=; b=wm93AaCQJsz5gUH3nVuLoVDZSGQu85D1/8XHddFAjTpqvTJdBV6cX/IOtEWYnLKKNV 6C6PObYwVzmy1xQsUvrR7tzsWVd5J/WS1lYVvWh9SxrmFngQbSz/867ykJs+FInkQsS3 qx5aInY6eY3D7Lnzu2PyK15LVIjXJ1ejRyRU2oFY/WoU16Yr9mkoHyJz9Y0DN56PyZTe D4WdhOGz9hSc/cykTsbbSMElG6ANahnoI6RVouJMNZCVRrGy1ethrnENBPSWvLWy70/Z ga1h2Jhyh0UuXwTQRtvebLA7MWU2ed7p8BDAGEAilpR+UCeHBhbM5HwA+VU4WAwMbkFi rwIQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e63si40502697pgc.239.2018.11.20.00.26.25; Tue, 20 Nov 2018 00:26:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725940AbeKTSPq (ORCPT + 99 others); Tue, 20 Nov 2018 13:15:46 -0500 Received: from mx2.suse.de ([195.135.220.15]:46892 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725770AbeKTSPq (ORCPT ); Tue, 20 Nov 2018 13:15:46 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id D5618B08A; Tue, 20 Nov 2018 07:48:00 +0000 (UTC) Date: Tue, 20 Nov 2018 08:48:00 +0100 From: Michal Hocko To: David Rientjes Cc: Andrew Morton , Vlastimil Babka , Alexey Dobriyan , "Kirill A. Shutemov" , linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-api@vger.kernel.org Subject: Re: [RFC PATCH] mm, proc: report PR_SET_THP_DISABLE in proc Message-ID: <20181120074759.GB22247@dhcp22.suse.cz> References: <20181016104855.GQ18839@dhcp22.suse.cz> <20181017070531.GC18839@dhcp22.suse.cz> <20181018070031.GW18839@dhcp22.suse.cz> <20181114132306.GX23419@dhcp22.suse.cz> <20181115090242.GH23831@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 19-11-18 14:05:34, David Rientjes wrote: > On Thu, 15 Nov 2018, Michal Hocko wrote: > > > > The userspace had a single way to determine if thp had been disabled for a > > > specific vma and that was broken with your commit. We have since fixed > > > it. Modifying our software stack to start looking for some field > > > somewhere else will not help anybody else that this has affected or will > > > affect. I'm interested in not breaking userspace, not trying a wait and > > > see approach to see if anybody else complains once we start looking for > > > some other field. The risk outweighs the reward, it already broke us, and > > > I'd prefer not to even open the possibility of breaking anybody else. > > > > I very much agree on "do not break userspace" part but this is kind of > > gray area. VMA flags are a deep internal implementation detail and > > nobody should really depend on it for anything important. The original > > motivation for introducing it was CRIU where it is kind of > > understandable. I would argue they should find a different way but it is > > just too late for them. > > > > For this particular case there was no other bug report except for yours > > and if it is possible to fix it on your end then I would really love to > > make the a sensible user interface to query the status. If we are going > > to change the semantic of the exported flag again then we risk yet > > another breakage. > > > > Therefore I am asking whether changing your particular usecase to a new > > interface is possible because that would allow to have a longerm > > sensible user interface rather than another kludge which still doesn't > > cover all the usecases (e.g. there is no way to reliably query the > > madvise status after your patch). > > > > Providing another interface is great, I have no objection other than > emitting another line for every vma on the system for smaps is probably > overkill for something as rare as PR_SET_THP_DISABLE. Let me think about a full patch and see how it looks like. > > That said, I think the current handling of the "nh" flag being emitted in > smaps is logical and ensures no further userspace breakage. I have already expressed a concern that there is no way to query for MADV_NOHUGEPAGE if we overload the flag. So this is not a riskfree option. > If that is to > be removed, I consider it an unnecessary risk. That would raised in code > review. -- Michal Hocko SUSE Labs