From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id D304CC6FD1D for ; Wed, 15 Mar 2023 16:05:38 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 209436B0071; Wed, 15 Mar 2023 12:05:38 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 1B9846B0072; Wed, 15 Mar 2023 12:05:38 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 081E66B0075; Wed, 15 Mar 2023 12:05:38 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id EDAA86B0071 for ; Wed, 15 Mar 2023 12:05:37 -0400 (EDT) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id 9C2C4A027D for ; Wed, 15 Mar 2023 16:05:37 +0000 (UTC) X-FDA: 80571607914.07.7D32D70 Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) by imf15.hostedemail.com (Postfix) with ESMTP id 62B70A0004 for ; Wed, 15 Mar 2023 16:05:34 +0000 (UTC) Authentication-Results: imf15.hostedemail.com; dkim=pass header.d=devkernel.io header.s=fm3 header.b=TPdaquaX; dkim=pass header.d=messagingengine.com header.s=fm2 header.b=n+TmOaDU; spf=pass (imf15.hostedemail.com: domain of shr@devkernel.io designates 66.111.4.28 as permitted sender) smtp.mailfrom=shr@devkernel.io; dmarc=none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1678896334; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=buAS022EMPBJulMjE8ii65afZRjcdOiGwqDLGmLBepM=; b=CwlhqterCYQiPH0QeP3SlYIEutSCBO8cHmE4eOgQuw6YN5r4NvJOQGqPFgC7CixxRUxUGs dblrOdIAKYNK6a14wmHSDi2SxEZ8g8xhVjkHpNOhl8VeDh+fGxt8MRMzzsqWTZxCkbb6q+ ULbgy4RQ2OEBkx7BNk1BtCMAIT2hVSs= ARC-Authentication-Results: i=1; imf15.hostedemail.com; dkim=pass header.d=devkernel.io header.s=fm3 header.b=TPdaquaX; dkim=pass header.d=messagingengine.com header.s=fm2 header.b=n+TmOaDU; spf=pass (imf15.hostedemail.com: domain of shr@devkernel.io designates 66.111.4.28 as permitted sender) smtp.mailfrom=shr@devkernel.io; dmarc=none ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1678896334; a=rsa-sha256; cv=none; b=0B3rvNKHJUo/6h8gRUpyg0DdI5d5TnrIilN+VjJNc9rf2CD8fhGN83MKhUCsBjSfpOGuVp 5Yv5y0qrF1cX6wLkFiIkeHyVL4T05rAZLgqIkNFEPbdfnk78Un7Zjz73aq6UoX817CrIO6 wVUO1ctpzVxawPj3bj0Jhxw+83ZmGcM= Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.nyi.internal (Postfix) with ESMTP id D61635C054B; Wed, 15 Mar 2023 12:05:33 -0400 (EDT) Received: from mailfrontend2 ([10.202.2.163]) by compute3.internal (MEProxy); Wed, 15 Mar 2023 12:05:33 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=devkernel.io; h= cc:cc:content-type:content-type:date:date:from:from:in-reply-to :in-reply-to:message-id:mime-version:references:reply-to:sender :subject:subject:to:to; s=fm3; t=1678896333; x=1678982733; bh=bu AS022EMPBJulMjE8ii65afZRjcdOiGwqDLGmLBepM=; b=TPdaquaXbFUmgX2SKh l3KyLGQ+Jy7YFvWLALDZ+rZRKDObHYSDvAIL6M7VSYbH/WSM1Oy3hezGN0tklQl6 EjPeFhCmTLkS+DUy+ZGcquLY3kQXElY3TE5gQfLX5vSU+tBHbXXgVwtukDHnN4Xk ykz9yZmms8mdlaEhihjAuclqIKgyes3CeHwQrKEIj4va9d2YDRoUO+QfwSYXopxn p9rdwYpfGVxGtIB0PY8oLiLdSLQ/iKhAuEXceZOjIIYY8g5Kgh+QS8482Whk2iFV 5+/Kb3Hk8S25gsd5Z1M6gXca58+CE2hz9HCDzrJe6YYuukjFchDDCY8N7NxqN7Ni RoxA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-type:content-type:date:date :feedback-id:feedback-id:from:from:in-reply-to:in-reply-to :message-id:mime-version:references:reply-to:sender:subject :subject:to:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm2; t=1678896333; x=1678982733; bh=buAS022EMPBJu lMjE8ii65afZRjcdOiGwqDLGmLBepM=; b=n+TmOaDUKuJL9yxVA53+6MFjoH4gH 21apynJ/JQ5XeLjr7GmSrL8d5DzeHnTeU7zTSzh+w1umUmsC2VjUWXF349P3MibE z+/Kb9f1cgAq8vJYVlUSAZGWKo/1G+xnGU+c4jPQHnDJZ+eoBS4QzONMwmupYIsC 5YZos8qJoB/0HErLY+wJCERF40Q64R3ztWO00Rp3Q76Qi8vYjPqUAX7vnbNJLudK z1MGNF8crcAry1e7F9h28m/rMH++fKNJ9EfVYoPLgnYwqt9lO2JWEpF6G/DxRCj6 CouBYv4P7KCKmn792Y/IwkRf9xeqUfyzEqJO7eCQtFBAE8UlKCXwQJkRQ== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvhedrvddvkedgkeefucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpehffgfhvfevufffjgfkgggtsehttd ertddtredtnecuhfhrohhmpefuthgvfhgrnhcutfhovghstghhuceoshhhrhesuggvvhhk vghrnhgvlhdrihhoqeenucggtffrrghtthgvrhhnpeevlefggffhheduiedtheejveehtd fhtedvhfeludetvdegieekgeeggfdugeeutdenucevlhhushhtvghrufhiiigvpedtnecu rfgrrhgrmhepmhgrihhlfhhrohhmpehshhhrseguvghvkhgvrhhnvghlrdhioh X-ME-Proxy: Feedback-ID: i84614614:Fastmail Received: by mail.messagingengine.com (Postfix) with ESMTPA; Wed, 15 Mar 2023 12:05:32 -0400 (EDT) References: <20230314204557.3863923-1-shr@devkernel.io> User-agent: mu4e 1.6.11; emacs 28.2.50 From: Stefan Roesch To: Bagas Sanjaya Cc: kernel-team@fb.com, linux-mm@kvack.org, riel@surriel.com, mhocko@suse.com, david@redhat.com, linux-doc@vger.kernel.org, akpm@linux-foundation.org, hannes@cmpxchg.org Subject: Re: [PATCH v1] docs/mm: extend ksm doc Date: Wed, 15 Mar 2023 08:59:25 -0700 In-reply-to: Message-ID: MIME-Version: 1.0 Content-Type: text/plain X-Stat-Signature: 4bqqs7x1hndefaernzhn1smwckwzzxni X-Rspam-User: X-Rspamd-Queue-Id: 62B70A0004 X-Rspamd-Server: rspam06 X-HE-Tag: 1678896334-11018 X-HE-Meta: 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 I78hfn+d 7dZWB8MmiSJzPenqKGQZrMljVClX6QEykIx8f6BdVj/BuEZnyLfpb9QUl5t7naxVs23h2DeKj4qYNtv5SnA7GLX9P7xZOU8w4VyN3sJ1AohB7omZVilMNKl5onQdyZadqm3nbnaNBDs7/0FRRuapQPa7bLnCvM7puBECV X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Bagas Sanjaya writes: > [[PGP Signed Part:Undecided]] > On Tue, Mar 14, 2023 at 01:45:57PM -0700, Stefan Roesch wrote: >> +to cancel that advice and restore unshared pages: whereupon KSM >> +unmerges whatever is merged for that process. Note: this unmerging call >> +may suddenly require more memory than is available - possibly failing >> +with EAGAIN, but more probably arousing the Out-Of-Memory killer. > This follows the wording in the previous paragraph, do you also want to change the previous paragraph? > "... to disable KSM and let it unmerges ... . Note that this unmerging > call may exhaust memory and triggers OOM killer." > >> +However, if the system is dedicated to running multiple jobs within the >> +same security domain, there is a usecase where multiple instances of the >> +same job are running inside a safe shared security domain and using the >> +same sensitive data. > > "... it is possible for multiple instances ... and share the same > sensitive data." > Something like this? >> +However, if the system is dedicated to running multiple jobs within the >> +same security domain, there is a usecase where multiple instances of the >> +same job are running inside a safe shared security domain and share the >> +same sensitive data. > The is possible I think is less clear. Thanks.