From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753338Ab1LSVYF (ORCPT ); Mon, 19 Dec 2011 16:24:05 -0500 Received: from mx1.redhat.com ([209.132.183.28]:34670 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752287Ab1LSVYC (ORCPT ); Mon, 19 Dec 2011 16:24:02 -0500 Date: Mon, 19 Dec 2011 22:23:48 +0100 From: Andrea Arcangeli To: Dave Hansen Cc: KOSAKI Motohiro , Naoya Horiguchi , linux-mm@kvack.org, Andi Kleen , Wu Fengguang , KOSAKI Motohiro , KAMEZAWA Hiroyuki , linux-kernel@vger.kernel.org Subject: Re: [RFC][PATCH 2/3] pagemap: export KPF_THP Message-ID: <20111219212348.GP16411@redhat.com> References: <1324319919-31720-1-git-send-email-n-horiguchi@ah.jp.nec.com> <1324319919-31720-3-git-send-email-n-horiguchi@ah.jp.nec.com> <4EEF8F85.9010408@gmail.com> <4EEF9F3E.9000107@linux.vnet.ibm.com> <4EEFA278.7010200@gmail.com> <4EEFA51D.2050707@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4EEFA51D.2050707@linux.vnet.ibm.com> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Dec 19, 2011 at 12:57:01PM -0800, Dave Hansen wrote: > But, every single one of the pagemap flags is really just a snapshot > KPF_DIRTY, KPF_LOCKED, etc... The entire interface is inherently a racy > snapshot, and there's not a whole lot you can do about it. Having read the discussion, while I don't see a big need of the KPF_THP, I also see how it in certain corner cases it can be used to test memory failure injection and I agree with you on the above. Maybe it can also be used to check if at certain virtual offsets (pid/pagemap lookup followed by a kpageflags lookup) we always fail to find THP inside big vmas, maybe out of not aligned mprotect that may be optimized by aligning it. The other kernel internal bits may also be stale and go away quicker than the KPF_THP, so I don't see a problem in exposing it. We also provide THP related info in meminfo/smaps, if they were supposed to be invisible that wouldn't be allowed too. A bigger concern to me is that the new bitfield alters the protocol, but old code by adding one more bit (if sanely coded...) shouldn't break.