linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: Martin Maletinsky <maletinsky@scs.ch>
Cc: Stephen Tweedie <sct@redhat.com>,
	kernelnewbies@nl.linux.org, linux-mm@kvack.org
Subject: Re: Meaning of the dirty bit
Date: Thu, 10 Oct 2002 14:11:17 +0200	[thread overview]
Message-ID: <3DA56E65.CAF96587@scs.ch> (raw)
In-Reply-To: <Pine.LNX.4.44.0210101209140.1510-100000@localhost.localdomain>

Hi Hugh,

Thanks a lot for your answer.

Hugh Dickins wrote:

> On Thu, 10 Oct 2002, Martin Maletinsky wrote:
> >
> > While studying the follow_page() function (the version of the function
> > that is in place since 2.4.4, i.e. with the write argument), I noticed,
> > that for an address that > should be written to (i.e. write != 0), the
> > function checks not only the writeable flag (with pte_write()), but also
> > the dirty flag (with pte_dirty()) of the page > containing this address.
> > From what I thought to understand from general paging theory, the dirty
> > flag of a page is set, when its content in physical memory differs from
> > its backing on the permanent storage system (file or swap space). Based
> > on this understanding I do not understand why it is necessary to check
> > the dirty flag, in order to ensure that a page is writable
> > - what am I missing here?
>
> Good question (and I don't see the answer in Dharmender's replies).
> I expect Stephen can give the definitive answer, but here's my guess.
>
> follow_page() was introduced for kiobufs, so despite its general name,
> it's doing what map_user_kiobuf() needed (or thought it needed).
>
> Originally (pre-2.4.4), as you've noticed, there was no write argument
> to follow_page, and map_user_kiobuf made one call to handle_mm_fault
> per page.  Experience with races under memory pressure will have shown
> that to be inadequate, it needed to loop until it could hold down the
> page, with the writable bit in the pte guaranteeing it good to write to.
>
> But why dirty too, you ask?  I think, because writing to page via kiobuf
> happens directly, not via pte, so the pte dirty bit would not be set
> that way; but if it's not set, then the modification to the page may
> be lost later.  Hence map_user_kiobuf used handle_mm_fault to set
> that dirty bit too, and used follow_page to check that it is set.
>
> Except that's racy too, and so mark_dirty_kiobuf() was added to
> SetPageDirty on the pages after kio done, before unmapping the kiobuf.
> mark_dirty_kiobuf appeared in the main kernel tree at the same time
> as the pte_dirty test in follow_page, but I'm guessing the pte_dirty
> test was an earlier failed attempt to solve the problems fixed by
> mark_dirty_kiobuf, which got left in place (and also helped a bit
> if kiobuf users weren't updated to call mark_dirty_kiobuf).
>
> Apologies in advance if my guesses are wild.

Although you call it a 'a wild guess', it sounds quite plausible to me. However, if the check of the dirty flag is basically there to ensure that handle_mm_fault() did its
job (to mark the pte dirty), wouldn't it make (more?) sense, to have a pte_mkdirty() call in follow_page() setting the dirty bit (possibly/probably once again)?

thanks again
best regards
Martin Maletinsky

--
Supercomputing System AG          email: maletinsky@scs.ch
Martin Maletinsky                 phone: +41 (0)1 445 16 05
Technoparkstrasse 1               fax:   +41 (0)1 445 16 10
CH-8005 Zurich
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/

  parent reply	other threads:[~2002-10-10 12:11 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2002-10-10  7:46 Martin Maletinsky
2002-10-10  8:49 ` Dharmender Rai
2002-10-10  8:57   ` Martin Maletinsky
2002-10-10  9:46     ` Dharmender Rai
2002-10-10 11:40 ` Hugh Dickins
2002-10-10 11:55   ` William Lee Irwin III
2002-10-10 13:40     ` Hugh Dickins
2002-10-10 12:11   ` Martin Maletinsky [this message]
2002-10-10 13:11   ` Dharmender Rai

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=3DA56E65.CAF96587@scs.ch \
    --to=maletinsky@scs.ch \
    --cc=kernelnewbies@nl.linux.org \
    --cc=linux-mm@kvack.org \
    --cc=sct@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox