From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-lf0-f69.google.com (mail-lf0-f69.google.com [209.85.215.69]) by kanga.kvack.org (Postfix) with ESMTP id A85496B0253 for ; Tue, 31 Jan 2017 08:10:36 -0500 (EST) Received: by mail-lf0-f69.google.com with SMTP id o12so143856773lfg.7 for ; Tue, 31 Jan 2017 05:10:36 -0800 (PST) Received: from mail-lf0-x243.google.com (mail-lf0-x243.google.com. [2a00:1450:4010:c07::243]) by mx.google.com with ESMTPS id i15si10246548lfh.270.2017.01.31.05.10.34 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 31 Jan 2017 05:10:35 -0800 (PST) Received: by mail-lf0-x243.google.com with SMTP id x1so33984792lff.0 for ; Tue, 31 Jan 2017 05:10:34 -0800 (PST) MIME-Version: 1.0 In-Reply-To: <20170131001025.GD7942@bbox> References: <20170119024421.GA9367@bbox> <0a184bbf-0612-5f71-df68-c37500fa1eda@samsung.com> <20170119062158.GB9367@bbox> <20170123052244.GC11763@bbox> <20170123053056.GB2327@jagdpanzerIV.localdomain> <20170123054034.GA12327@bbox> <7488422b-98d1-1198-70d5-47c1e2bac721@samsung.com> <20170125052614.GB18289@bbox> <20170131001025.GD7942@bbox> From: Dan Streetman Date: Tue, 31 Jan 2017 08:09:53 -0500 Message-ID: Subject: Re: [PATCH v7 11/12] zsmalloc: page migration support Content-Type: text/plain; charset=UTF-8 Sender: owner-linux-mm@kvack.org List-ID: To: Minchan Kim Cc: Chulmin Kim , Sergey Senozhatsky , Andrew Morton , Linux-MM , Sergey Senozhatsky On Mon, Jan 30, 2017 at 7:10 PM, Minchan Kim wrote: > Hi Dan, > > On Thu, Jan 26, 2017 at 12:04:03PM -0500, Dan Streetman wrote: >> On Wed, Jan 25, 2017 at 12:26 AM, Minchan Kim wrote: >> > On Tue, Jan 24, 2017 at 11:06:51PM -0500, Chulmin Kim wrote: >> >> On 01/23/2017 12:40 AM, Minchan Kim wrote: >> >> >On Mon, Jan 23, 2017 at 02:30:56PM +0900, Sergey Senozhatsky wrote: >> >> >>On (01/23/17 14:22), Minchan Kim wrote: >> >> >>[..] >> >> >>>>Anyway, I will let you know the situation when it gets more clear. >> >> >>> >> >> >>>Yeb, Thanks. >> >> >>> >> >> >>>Perhaps, did you tried flush page before the writing? >> >> >>>I think arm64 have no d-cache alising problem but worth to try it. >> >> >>>Who knows :) >> >> >> >> >> >>I thought that flush_dcache_page() is only for cases when we write >> >> >>to page (store that makes pages dirty), isn't it? >> >> > >> >> >I think we need both because to see recent stores done by the user. >> >> >I'm not sure it should be done by block device driver rather than >> >> >page cache. Anyway, brd added it so worth to try it, I thought. :) >> >> > >> >> >> >> Thanks for the suggestion! >> >> It might be helpful >> >> though proving it is not easy as the problem appears rarely. >> >> >> >> Have you thought about >> >> zram swap or zswap dealing with self modifying code pages (ex. JIT)? >> >> (arm64 may have i-cache aliasing problem) >> > >> > It can happen, I think, although I don't know how arm64 handles it. >> > >> >> >> >> If it is problematic, >> >> especiallly zswap (without flush_dcache_page in zswap_frontswap_load()) may >> >> provide the corrupted data >> >> and even swap out (compressing) may see the corrupted data sooner or later, >> >> i guess. >> > >> > try_to_unmap_one calls flush_cache_page which I hope to handle swap-out side >> > but for swap-in, I think zswap need flushing logic because it's first >> > touch of the user buffer so it's his resposibility. >> >> Hmm, I don't think zswap needs to, because all the cache aliases were >> flushed when the page was written out. After that, any access to the >> page will cause a fault, and the fault will cause the page to be read >> back in (via zswap). I don't see how the page could be cached at any >> time between the swap write-out and swap read-in, so there should be >> no need to flush any caches when it's read back in; am I missing >> something? > > Documentation/cachetlb.txt says > > void flush_dcache_page(struct page *page) > > Any time the kernel writes to a page cache page, _OR_ > the kernel is about to read from a page cache page and > user space shared/writable mappings of this page potentially > exist, this routine is called. > > For swap-in side, I don't see any logic to prevent the aliasing > problem. Let's consider other examples like cow_user_page-> > copy_user_highpage. For architectures which can make aliasing, > it has arch specific functions which has flushing function. COW works with a page that has a physical backing. swap-in does not. COW pages can be accessed normally; swapped out pages cannot. > > IOW, if a kernel makes store operation to the page which will > be mapped to user space address, kernel should call flush function. > Otherwise, user space will miss recent update from kernel side. as I said before, when it's swapped out caches are flushed, and the page mapping invalidated, so it will cause a fault on any access, and thus cause swap to re-load the page from disk (or zswap). So how would a cache of the page be created after swap-out, but before swap-in? It's not possible for user space to have any caches to the page, unless (as I said) I'm missing something? > > Thanks. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org