Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2566178ybl; Mon, 20 Jan 2020 05:25:21 -0800 (PST) X-Google-Smtp-Source: APXvYqwDKm9Y2aDkirb/Uh3fK5thMO5AakJMHAZ5PYNrG5mBL3Oj9kUV5p6C62nO3cMJMsWY9xhB X-Received: by 2002:aca:1713:: with SMTP id j19mr12576971oii.160.1579526721708; Mon, 20 Jan 2020 05:25:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579526721; cv=none; d=google.com; s=arc-20160816; b=bmBR6PccHuYzdX3nC/+/z++mOoCMjAcS7cSEU5yM55hm3H6LXU2PJ7+x0vKKDU8ANn T0XESuUVilJh3HBphp9C35rJw6bB2jM2Zp5wVSYjXmguHnB1fS7OxXvoU97B6LF2pqsd IOvyNpgvrt5ctJZilBoc6vT25MbflpzhDmjy7hsn2xyx4gVQYB+8kqi/AZNIviPRvc3k lJi5eQSR5mo6xtMqtxqrsymKVcdXIdZHtSuyW+dR9m4jx04l8qMh75w4Syq+FibwXkHl +6yL6JqERgPcXjx/V1azqZxXCQK8i0XkmE4VRebP6cdXQ7BXmlOqSEfiugYAdu50Sjcv +Ouw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=xHYwI1c4dvmZ1Pb+9NFFerZpg3qzCoeSJtlv6Fl2OEo=; b=BwsDQmsczKhvcfAKAp5dfj+Phod4y/mpmnhZVELzPuhpKshHxGDb/xPBKINUoNh49L O5CU5DpphLwokKTdkmOh+ypJVYP3D5KHEZR+obwZr4R0ibwjXDOWq9bsewCJTj07brUU 7GYGpB2U3XUc5TlEW1oSViDgKG0SUqw0nTW2zGQE2RPRqmOSdKAPP9Qv/bI6npPE5ISS oziKNBmJPVGZ5YktKKD92UONSvGHn4CAocbIvlKdngMQwISHmH5Ap94i1NyBzAaktten Aa4j0b8QTN4BRlQmz+JihAkxG65vOWphSMIpQy2RK4Tj/LlJpa/HU4R7CpvzLseGm9bf dSWQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g16si20300106otj.79.2020.01.20.05.25.09; Mon, 20 Jan 2020 05:25:21 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726876AbgATNYJ (ORCPT + 99 others); Mon, 20 Jan 2020 08:24:09 -0500 Received: from mail-wr1-f65.google.com ([209.85.221.65]:44599 "EHLO mail-wr1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726619AbgATNYJ (ORCPT ); Mon, 20 Jan 2020 08:24:09 -0500 Received: by mail-wr1-f65.google.com with SMTP id q10so29550697wrm.11; Mon, 20 Jan 2020 05:24:08 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=xHYwI1c4dvmZ1Pb+9NFFerZpg3qzCoeSJtlv6Fl2OEo=; b=O2ca8CtOzmKaw5SrNmEFoRwuyCNxT4YCbywXq8pVAHQmzn4Suh2TxcRf5w+qMsV9+4 AtSR/BbRkBMfHSTpngIp4fI58cQYapM5iyP+2wtA60o+HKlf/Wt5dj/0l1XprI9DvFzJ 9qOcnx9oUQ/2hOiXoq9Nt+vlifj4vSdj9KbC+URv4apzoShKyXnqK3FoK4mYmkKe/0uQ b1PE8+sBE4yR/qKAhPgjA0/J+6JTzAJs3t9ftgEJutBsJwCzI0fNfo0GZgkq8AwHnWSD 2LZbgWN/imipbqbDyny9iiZYHo0azjHTrjryVWIvqFW329zNg8QDsQpYdvgteGGzCrDY VpLg== X-Gm-Message-State: APjAAAXjI6NA86h18pVnF0FQO237EeQyrea81n1QJFMZnaLysY6SWCme +7LIt5/xuQYnTjKXT9953Mc/M6QW X-Received: by 2002:adf:ef4e:: with SMTP id c14mr18209651wrp.142.1579526647518; Mon, 20 Jan 2020 05:24:07 -0800 (PST) Received: from localhost (prg-ext-pat.suse.com. [213.151.95.130]) by smtp.gmail.com with ESMTPSA id n67sm23630987wmf.46.2020.01.20.05.24.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 20 Jan 2020 05:24:06 -0800 (PST) Date: Mon, 20 Jan 2020 14:24:05 +0100 From: Michal Hocko To: "Kirill A. Shutemov" Cc: Kirill Tkhai , Minchan Kim , Andrew Morton , LKML , linux-mm , linux-api@vger.kernel.org, oleksandr@redhat.com, Suren Baghdasaryan , Tim Murray , Daniel Colascione , Sandeep Patil , Sonny Rao , Brian Geffon , Johannes Weiner , Shakeel Butt , John Dias , christian.brauner@ubuntu.com, sjpark@amazon.de Subject: Re: [PATCH v2 2/5] mm: introduce external memory hinting API Message-ID: <20200120132405.GF18451@dhcp22.suse.cz> References: <20200116235953.163318-1-minchan@kernel.org> <20200116235953.163318-3-minchan@kernel.org> <20200117115225.GV19428@dhcp22.suse.cz> <20200120112722.GY18451@dhcp22.suse.cz> <20200120123935.onlls7enjtzenbvt@box> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200120123935.onlls7enjtzenbvt@box> User-Agent: Mutt/1.12.2 (2019-09-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 20-01-20 15:39:35, Kirill A. Shutemov wrote: > On Mon, Jan 20, 2020 at 12:27:22PM +0100, Michal Hocko wrote: > > On Mon 20-01-20 13:24:35, Kirill Tkhai wrote: [...] > > > Even two threads on common memory need a synchronization > > > to manage mappings in a sane way. Managing memory from two processes > > > is the same in principle, and the only difference is that another level > > > of synchronization is required. > > > > Well, not really. The operation might simply attempt to perform an > > operation on a specific memory area and get a failure if it doesn't > > reference the same object anymore. What I think we need is some form of > > a handle to operate on. In the past we have discussed several > > directions. I was proposing /proc/self/map_anon/ (analogous to > > map_files) where you could inspect anonymous memory and get a file > > handle for it. madvise would then operate on the fd and then there > > shouldn't be a real problem to revalidate that the object is still > > valid. But there was no general enthusiasm about that approach. There > > are likely some land mines on the way. > > Converting anon memory to file-backed is bad idea and going to backfire. I didn't mean to convert. I meant to expose that information via proc the same way we do for file backed mappings. That shouldn't really require to re-design the way how anonymous vma work IMO. But I haven't tried that so there might be many gotchas there. There are obvious things to think about though. Such fd cannot be sent to other processes (SCM stuff), mmap of the file would have to be disallowed and many others I am not aware of. I am not even pushing this direction because I am not convinced about how viable it is myself. But it would sound like a nice extension of the existing mechanism we have and a file based madvise sounds attractive to me as well because we already have that. -- Michal Hocko SUSE Labs