From patchwork Wed Jan 20 20:23:37 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Suren Baghdasaryan X-Patchwork-Id: 12033627 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.6 required=3.0 tests=BAYES_00, DKIM_ADSP_CUSTOM_MED,DKIM_INVALID,DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B349CC433E0 for ; Wed, 20 Jan 2021 20:24:04 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 1C301233FC for ; Wed, 20 Jan 2021 20:24:03 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 1C301233FC Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=google.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 223596B0005; Wed, 20 Jan 2021 15:24:03 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 1D6686B0006; Wed, 20 Jan 2021 15:24:03 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 04D676B0007; Wed, 20 Jan 2021 15:24:03 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0082.hostedemail.com [216.40.44.82]) by kanga.kvack.org (Postfix) with ESMTP id E34846B0005 for ; Wed, 20 Jan 2021 15:24:02 -0500 (EST) Received: from smtpin29.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id 9A62D365A for ; Wed, 20 Jan 2021 20:24:02 +0000 (UTC) X-FDA: 77727279924.29.cake88_56075ef2755d Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin29.hostedemail.com (Postfix) with ESMTP id 79818180868D1 for ; Wed, 20 Jan 2021 20:24:02 +0000 (UTC) X-HE-Tag: cake88_56075ef2755d X-Filterd-Recvd-Size: 14238 Received: from mail-yb1-f202.google.com (mail-yb1-f202.google.com [209.85.219.202]) by imf34.hostedemail.com (Postfix) with ESMTP for ; Wed, 20 Jan 2021 20:24:01 +0000 (UTC) Received: by mail-yb1-f202.google.com with SMTP id b131so31816078ybc.3 for ; Wed, 20 Jan 2021 12:24:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:date:message-id:mime-version:subject:from:to:cc; bh=aXMIL5qsalVtc+s+kBFolu7vThL+LyG1arvRPXSP7r0=; b=ioUDFuwefqa9RVnEymE/YPxgB/WIkiuDcEqqGn02yX7EnnX2/QelUlthpRYq1CXQbu LSp4OZJFsH/tYQAXQi38QxIohN2LDXwNBM1RRFssDuRskT2YfhcZy/vlPbWfMNEsarE1 Jp6RVSbN+tiiFS3fueneYQoOk+RchbXyMlm0cyY9Mjk3wT24BuGP073dOaISx8/+QoT4 GtEmalX94PPnfftf0+GbraKEP9WHdvVxMmxFSK/xJYeXxUoGykHwGzR+y8Pfc6CmBymM teQ+1DGbmn0aWS26wZmX/WyKK95QjFahlQMV39F9s4tl5qpNwhupBCjqv+HDa2iV3zxa PPzQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:message-id:mime-version:subject:from :to:cc; bh=aXMIL5qsalVtc+s+kBFolu7vThL+LyG1arvRPXSP7r0=; b=ahaMKH6lB5rgAGA3wQIRQ43wnT6MOHycLX2oxF9QRVzxQR39lds0gtX7QKI4nBkIEX Un+FDcbRWq4REQxfCkCh3MVTU67LOEbGLDemn2rPNdW0QgdwJEl2Ykdod20uVca2P+XO xleym+D4LEViokaTlP+SJ5KSeVdhrejCQwatKKUteOTe7/CHfeyDDpF/b0G53t2gZyVB 47GWmrpvKUG2Yh/tBA4LjP5GQHlwZDpAY8br6mT97ww+Zx+T3yRPKh7TGmiyMWtHMVoG yUNI80K2oZfCe/t9XRtts+4bshhK0iUniVYLRNb93RWBxBr8ucyKdzd/hAOSBWr8F3xS 81zg== X-Gm-Message-State: AOAM533FPrfwf1P2uWd6MsZz8S07zuOTCSkmBTSf72O1ikDBGzsul/21 ztN9k3ozAmR/C1BmeCi7aGxmATv8P5g= X-Google-Smtp-Source: ABdhPJyEZ0oi4rNCubYOlOujp4VAKYBunoFZKIwkq6C78pmuAXpjocHhun54CgedRBYmMIk3NG2UOovXhjE= X-Received: from surenb1.mtv.corp.google.com ([2620:15c:211:200:f693:9fff:fef4:2055]) (user=surenb job=sendgmr) by 2002:a25:2349:: with SMTP id j70mr16364263ybj.362.1611174240945; Wed, 20 Jan 2021 12:24:00 -0800 (PST) Date: Wed, 20 Jan 2021 12:23:37 -0800 Message-Id: <20210120202337.1481402-1-surenb@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.30.0.284.gd98b1dd5eaa7-goog Subject: [PATCH 1/1] process_madvise.2: Add process_madvise man page From: Suren Baghdasaryan To: linux-man@vger.kernel.org Cc: akpm@linux-foundation.org, jannh@google.com, keescook@chromium.org, jeffv@google.com, minchan@kernel.org, mhocko@suse.com, shakeelb@google.com, rientjes@google.com, edgararriaga@google.com, timmurray@google.com, linux-mm@kvack.org, selinux@vger.kernel.org, linux-security-module@vger.kernel.org, linux-api@vger.kernel.org, linux-kernel@vger.kernel.org, kernel-team@android.com, surenb@google.com X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Initial version of process_madvise(2) manual page. Initial text was extracted from [1], amended after fix [2] and more details added using man pages of madvise(2) and process_vm_read(2) as examples. It also includes the changes to required permission proposed in [3]. [1] https://lore.kernel.org/patchwork/patch/1297933/ [2] https://lkml.org/lkml/2020/12/8/1282 [3] https://patchwork.kernel.org/project/selinux/patch/20210111170622.2613577-1-surenb@google.com/#23888311 Signed-off-by: Suren Baghdasaryan Signed-off-by: Minchan Kim --- Adding the plane text version for ease of review: NAME process_madvise - give advice about use of memory to a process SYNOPSIS #include ssize_t process_madvise(int pidfd, const struct iovec *iovec, unsigned long vlen, int advice, unsigned int flags); DESCRIPTION The process_madvise() system call is used to give advice or directions to the kernel about the address ranges from external process as well as local process. It provides the advice to address ranges of process described by iovec and vlen. The goal of such advice is to improve system or application performance. The pidfd selects the process referred to by the PID file descriptor specified in pidfd. (see pidofd_open(2) for further information). The pointer iovec points to an array of iovec structures, defined in as: struct iovec { void *iov_base; /* Starting address */ size_t iov_len; /* Number of bytes to transfer */ }; The iovec describes address ranges beginning at iov_base address and with the size of iov_len bytes. The vlen represents the number of elements in iovec. The advice can be one of the values listed below. Linux-specific advice values The following Linux-specific advice values have no counterparts in the POSIX-specified posix_madvise(3), and may or may not have counterparts in the madvise() interface available on other implementations. MADV_COLD (since Linux 5.4.1) Deactivate a given range of pages by moving them from active to inactive LRU list. This is done to accelerate the reclaim of these pages. The advice might be ignored for some pages in the range when it is not applicable. MADV_PAGEOUT (since Linux 5.4.1) Reclaim a given range of pages. This is done to free up memory occupied by these pages. If a page is anonymous it will be swapped out. If a page is file-backed and dirty it will be written back into the backing storage. The advice might be ignored for some pages in the range when it is not applicable. The flags argument is reserved for future use; currently, this argument must be specified as 0. The value specified in the vlen argument must be less than or equal to IOV_MAX (defined in or accessible via the call sysconf(_SC_IOV_MAX)). The vlen and iovec arguments are checked before applying any hints. If the vlen is too big, or iovec is invalid, an error will be returned immediately. Hint might be applied to a part of iovec if one of its elements points to an invalid memory region in the remote process. No further elements will be processed beyond that point. Permission to provide a hint to external process is governed by a ptrace access mode PTRACE_MODE_READ_REALCREDS check; see ptrace(2) and CAP_SYS_ADMIN capability that caller should have in order to affect performance of an external process. RETURN VALUE On success, process_madvise() returns the number of bytes advised. This return value may be less than the total number of requested bytes, if an error occurred. The caller should check return value to determine whether a partial advice occurred. ERRORS EFAULT The memory described by iovec is outside the accessible address space of the process pid. EINVAL flags is not 0. EINVAL The sum of the iov_len values of iovec overflows a ssize_t value. EINVAL vlen is too large. ENOMEM Could not allocate memory for internal copies of the iovec structures. EPERM The caller does not have permission to access the address space of the process pidfd. ESRCH No process with ID pidfd exists. VERSIONS Since Linux 5.10, support for this system call is optional, depending on the setting of the CONFIG_ADVISE_SYSCALLS configuration option. SEE ALSO madvise(2), pidofd_open(2), process_vm_readv(2), process_vm_write(2) man2/process_madvise.2 | 208 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 208 insertions(+) create mode 100644 man2/process_madvise.2 diff --git a/man2/process_madvise.2 b/man2/process_madvise.2 new file mode 100644 index 000000000..9bb5cb5ed --- /dev/null +++ b/man2/process_madvise.2 @@ -0,0 +1,208 @@ +.\" Copyright (C) 2021 Suren Baghdasaryan +.\" and Copyright (C) 2021 Minchan Kim +.\" +.\" %%%LICENSE_START(VERBATIM) +.\" Permission is granted to make and distribute verbatim copies of this +.\" manual provided the copyright notice and this permission notice are +.\" preserved on all copies. +.\" +.\" Permission is granted to copy and distribute modified versions of this +.\" manual under the conditions for verbatim copying, provided that the +.\" entire resulting derived work is distributed under the terms of a +.\" permission notice identical to this one. +.\" +.\" Since the Linux kernel and libraries are constantly changing, this +.\" manual page may be incorrect or out-of-date. The author(s) assume no +.\" responsibility for errors or omissions, or for damages resulting from +.\" the use of the information contained herein. The author(s) may not +.\" have taken the same level of care in the production of this manual, +.\" which is licensed free of charge, as they might when working +.\" professionally. +.\" +.\" Formatted or processed versions of this manual, if unaccompanied by +.\" the source, must acknowledge the copyright and authors of this work. +.\" %%%LICENSE_END +.\" +.\" Commit ecb8ac8b1f146915aa6b96449b66dd48984caacc +.\" +.TH PROCESS_MADVISE 2 2021-01-12 "Linux" "Linux Programmer's Manual" +.SH NAME +process_madvise \- give advice about use of memory to a process +.SH SYNOPSIS +.nf +.B #include +.PP +.BI "ssize_t process_madvise(int " pidfd , +.BI " const struct iovec *" iovec , +.BI " unsigned long " vlen , +.BI " int " advice , +.BI " unsigned int " flags ");" +.fi +.SH DESCRIPTION +The +.BR process_madvise() +system call is used to give advice or directions +to the kernel about the address ranges from external process as well as +local process. It provides the advice to address ranges of process +described by +.I iovec +and +.I vlen\. +The goal of such advice is to improve system or application performance. +.PP +The +.I pidfd +selects the process referred to by the PID file descriptor +specified in pidfd. (see +.BR pidofd_open(2) +for further information). +.PP +The pointer +.I iovec +points to an array of iovec structures, defined in +.IR +as: +.PP +.in +4n +.EX +struct iovec { + void *iov_base; /* Starting address */ + size_t iov_len; /* Number of bytes to transfer */ +}; +.EE +.in +.PP +The +.I iovec +describes address ranges beginning at +.I iov_base +address and with the size of +.I iov_len +bytes. +.PP +The +.I vlen +represents the number of elements in +.I iovec\. +.PP +The +.I advice +can be one of the values listed below. +.\" +.\" ====================================================================== +.\" +.SS Linux-specific advice values +The following Linux-specific +.I advice +values have no counterparts in the POSIX-specified +.BR posix_madvise (3), +and may or may not have counterparts in the +.BR madvise () +interface available on other implementations. +.TP +.BR MADV_COLD " (since Linux 5.4.1)" +.\" commit 9c276cc65a58faf98be8e56962745ec99ab87636 +Deactivate a given range of pages by moving them from active to inactive +LRU list. This is done to accelerate the reclaim of these pages. The advice +might be ignored for some pages in the range when it is not applicable. +.TP +.BR MADV_PAGEOUT " (since Linux 5.4.1)" +.\" commit 1a4e58cce84ee88129d5d49c064bd2852b481357 +Reclaim a given range of pages. This is done to free up memory occupied by +these pages. If a page is anonymous it will be swapped out. If a page is +file-backed and dirty it will be written back into the backing storage. +The advice might be ignored for some pages in the range when it is not +applicable. +.PP +The +.I flags +argument is reserved for future use; currently, this argument must be +specified as 0. +.PP +The value specified in the +.I vlen +argument must be less than or equal to +.BR IOV_MAX +(defined in +.I +or accessible via the call +.IR sysconf(_SC_IOV_MAX) ). +.PP +The +.I vlen +and +.I iovec +arguments are checked before applying any hints. +If the +.I vlen +is too big, or +.I iovec +is invalid, an error will be returned immediately. +.PP +Hint might be applied to a part of +.I iovec +if one of its elements points to an invalid memory +region in the remote process. No further elements will be +processed beyond that point. +.PP +Permission to provide a hint to external process is governed by a +ptrace access mode +.B PTRACE_MODE_READ_REALCREDS +check; see +.BR ptrace (2) +and +.B CAP_SYS_ADMIN +capability that caller should have in order to affect performance +of an external process. +.SH RETURN VALUE +On success, process_madvise() returns the number of bytes advised. +This return value may be less than the total number of requested +bytes, if an error occurred. The caller should check return value +to determine whether a partial advice occurred. +.SH ERRORS +.TP +.B EFAULT +The memory described by +.I iovec +is outside the accessible address space of the process pid. +.TP +.B EINVAL +.I flags +is not 0. +.TP +.B EINVAL +The sum of the +.I iov_len +values of +.I iovec +overflows a ssize_t value. +.TP +.B EINVAL +.I vlen +is too large. +.TP +.B ENOMEM +Could not allocate memory for internal copies of the +.I iovec +structures. +.TP +.B EPERM +The caller does not have permission to access the address space of the process +.I pidfd. +.TP +.B ESRCH +No process with ID +.I pidfd +exists. +.SH VERSIONS +Since Linux 5.10, +.\" commit ecb8ac8b1f146915aa6b96449b66dd48984caacc +support for this system call is optional, +depending on the setting of the +.B CONFIG_ADVISE_SYSCALLS +configuration option. +.SH SEE ALSO +.BR madvise (2), +.BR pidofd_open(2), +.BR process_vm_readv (2), +.BR process_vm_write (2)