diff options
author | Rik van Riel <riel@redhat.com> | 2010-08-09 20:18:41 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2010-08-09 23:44:55 -0400 |
commit | 76545066c8521f3e32c849744744842b4df25b79 (patch) | |
tree | 978b6b003f63e1e22618586b7d9c2dd8ef363614 /mm/ksm.c | |
parent | 012f18004da33ba672e3c60838cc4898126174d3 (diff) |
mm: extend KSM refcounts to the anon_vma root
KSM reference counts can cause an anon_vma to exist after the processe it
belongs to have already exited. Because the anon_vma lock now lives in
the root anon_vma, we need to ensure that the root anon_vma stays around
until after all the "child" anon_vmas have been freed.
The obvious way to do this is to have a "child" anon_vma take a reference
to the root in anon_vma_fork. When the anon_vma is freed at munmap or
process exit, we drop the refcount in anon_vma_unlink and possibly free
the root anon_vma.
The KSM anon_vma reference count function also needs to be modified to
deal with the possibility of freeing 2 levels of anon_vma. The easiest
way to do this is to break out the KSM magic and make it generic.
When compiling without CONFIG_KSM, this code is compiled out.
Signed-off-by: Rik van Riel <riel@redhat.com>
Tested-by: Larry Woodman <lwoodman@redhat.com>
Acked-by: Larry Woodman <lwoodman@redhat.com>
Reviewed-by: Minchan Kim <minchan.kim@gmail.com>
Cc: KAMEZAWA Hiroyuki <kamezawa.hiroyu@jp.fujitsu.com>
Acked-by: Mel Gorman <mel@csn.ul.ie>
Acked-by: Linus Torvalds <torvalds@linux-foundation.org>
Tested-by: Dave Young <hidave.darkstar@gmail.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'mm/ksm.c')
-rw-r--r-- | mm/ksm.c | 17 |
1 files changed, 6 insertions, 11 deletions
@@ -318,19 +318,14 @@ static void hold_anon_vma(struct rmap_item *rmap_item, | |||
318 | struct anon_vma *anon_vma) | 318 | struct anon_vma *anon_vma) |
319 | { | 319 | { |
320 | rmap_item->anon_vma = anon_vma; | 320 | rmap_item->anon_vma = anon_vma; |
321 | atomic_inc(&anon_vma->external_refcount); | 321 | get_anon_vma(anon_vma); |
322 | } | 322 | } |
323 | 323 | ||
324 | static void drop_anon_vma(struct rmap_item *rmap_item) | 324 | static void ksm_drop_anon_vma(struct rmap_item *rmap_item) |
325 | { | 325 | { |
326 | struct anon_vma *anon_vma = rmap_item->anon_vma; | 326 | struct anon_vma *anon_vma = rmap_item->anon_vma; |
327 | 327 | ||
328 | if (atomic_dec_and_lock(&anon_vma->external_refcount, &anon_vma->root->lock)) { | 328 | drop_anon_vma(anon_vma); |
329 | int empty = list_empty(&anon_vma->head); | ||
330 | anon_vma_unlock(anon_vma); | ||
331 | if (empty) | ||
332 | anon_vma_free(anon_vma); | ||
333 | } | ||
334 | } | 329 | } |
335 | 330 | ||
336 | /* | 331 | /* |
@@ -415,7 +410,7 @@ static void break_cow(struct rmap_item *rmap_item) | |||
415 | * It is not an accident that whenever we want to break COW | 410 | * It is not an accident that whenever we want to break COW |
416 | * to undo, we also need to drop a reference to the anon_vma. | 411 | * to undo, we also need to drop a reference to the anon_vma. |
417 | */ | 412 | */ |
418 | drop_anon_vma(rmap_item); | 413 | ksm_drop_anon_vma(rmap_item); |
419 | 414 | ||
420 | down_read(&mm->mmap_sem); | 415 | down_read(&mm->mmap_sem); |
421 | if (ksm_test_exit(mm)) | 416 | if (ksm_test_exit(mm)) |
@@ -470,7 +465,7 @@ static void remove_node_from_stable_tree(struct stable_node *stable_node) | |||
470 | ksm_pages_sharing--; | 465 | ksm_pages_sharing--; |
471 | else | 466 | else |
472 | ksm_pages_shared--; | 467 | ksm_pages_shared--; |
473 | drop_anon_vma(rmap_item); | 468 | ksm_drop_anon_vma(rmap_item); |
474 | rmap_item->address &= PAGE_MASK; | 469 | rmap_item->address &= PAGE_MASK; |
475 | cond_resched(); | 470 | cond_resched(); |
476 | } | 471 | } |
@@ -558,7 +553,7 @@ static void remove_rmap_item_from_tree(struct rmap_item *rmap_item) | |||
558 | else | 553 | else |
559 | ksm_pages_shared--; | 554 | ksm_pages_shared--; |
560 | 555 | ||
561 | drop_anon_vma(rmap_item); | 556 | ksm_drop_anon_vma(rmap_item); |
562 | rmap_item->address &= PAGE_MASK; | 557 | rmap_item->address &= PAGE_MASK; |
563 | 558 | ||
564 | } else if (rmap_item->address & UNSTABLE_FLAG) { | 559 | } else if (rmap_item->address & UNSTABLE_FLAG) { |