Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750927AbXBSLYv (ORCPT ); Mon, 19 Feb 2007 06:24:51 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1750928AbXBSLYv (ORCPT ); Mon, 19 Feb 2007 06:24:51 -0500 Received: from smtp.osdl.org ([65.172.181.24]:51343 "EHLO smtp.osdl.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750922AbXBSLYt (ORCPT ); Mon, 19 Feb 2007 06:24:49 -0500 Date: Mon, 19 Feb 2007 03:01:41 -0800 From: Andrew Morton To: balbir@in.ibm.com Cc: vatsa@in.ibm.com, ckrm-tech@lists.sourceforge.net, xemul@sw.ru, linux-kernel@vger.kernel.org, linux-mm@kvack.org, menage@google.com, svaidy@linux.vnet.ibm.com, devel@openvz.org Subject: Re: [ckrm-tech] [RFC][PATCH][2/4] Add RSS accounting and control Message-Id: <20070219030141.42c65bc0.akpm@linux-foundation.org> In-Reply-To: <45D97DF8.5080000@in.ibm.com> References: <20070219065019.3626.33947.sendpatchset@balbir-laptop> <20070219065034.3626.2658.sendpatchset@balbir-laptop> <20070219005828.3b774d8f.akpm@linux-foundation.org> <45D97DF8.5080000@in.ibm.com> X-Mailer: Sylpheed version 2.2.7 (GTK+ 2.8.17; x86_64-unknown-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2674 Lines: 86 On Mon, 19 Feb 2007 16:07:44 +0530 Balbir Singh wrote: > >> +void memctlr_mm_free(struct mm_struct *mm) > >> +{ > >> + kfree(mm->counter); > >> +} > >> + > >> +static inline void memctlr_mm_assign_container_direct(struct mm_struct *mm, > >> + struct container *cont) > >> +{ > >> + write_lock(&mm->container_lock); > >> + mm->container = cont; > >> + write_unlock(&mm->container_lock); > >> +} > > > > More weird locking here. > > > > The container field of the mm_struct is protected by a read write spin lock. That doesn't mean anything to me. What would go wrong if the above locking was simply removed? And how does the locking prevent that fault? > >> +void memctlr_mm_assign_container(struct mm_struct *mm, struct task_struct *p) > >> +{ > >> + struct container *cont = task_container(p, &memctlr_subsys); > >> + struct memctlr *mem = memctlr_from_cont(cont); > >> + > >> + BUG_ON(!mem); > >> + write_lock(&mm->container_lock); > >> + mm->container = cont; > >> + write_unlock(&mm->container_lock); > >> +} > > > > And here. > > Ditto. ditto ;) > > > >> +/* > >> + * Update the rss usage counters for the mm_struct and the container it belongs > >> + * to. We do not fail rss for pages shared during fork (see copy_one_pte()). > >> + */ > >> +int memctlr_update_rss(struct mm_struct *mm, int count, bool check) > >> +{ > >> + int ret = 1; > >> + struct container *cont; > >> + long usage, limit; > >> + struct memctlr *mem; > >> + > >> + read_lock(&mm->container_lock); > >> + cont = mm->container; > >> + read_unlock(&mm->container_lock); > >> + > >> + if (!cont) > >> + goto done; > > > > And here. I mean, if there was a reason for taking the lock around that > > read, then testing `cont' outside the lock just invalidated that reason. > > > > We took a consistent snapshot of cont. It cannot change outside the lock, > we check the value outside. I am sure I missed something. If it cannot change outside the lock then we don't need to take the lock! > > MEMCTLR_DONT_CHECK_LIMIT exists for the following reasons > > 1. Pages are shared during fork, fork() is not failed at that point > since the pages are shared anyway, we allow the RSS limit to be > exceeded. > 2. When ZERO_PAGE is added, we don't check for limits (zeromap_pte_range). > 3. On reducing RSS (passing -1 as the value) OK, that might make a nice comment somewhere (if it's not already there). - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/