On Mon, Dec 19, 2011 at 12:57:01PM -0800, Dave Hansen wrote: > But, every single one of the pagemap flags is really just a snapshot > KPF_DIRTY, KPF_LOCKED, etc... The entire interface is inherently a racy > snapshot, and there's not a whole lot you can do about it. Having read the discussion, while I don't see a big need of the KPF_THP, I also see how it in certain corner cases it can be used to test memory failure injection and I agree with you on the above. Maybe it can also be used to check if at certain virtual offsets (pid/pagemap lookup followed by a kpageflags lookup) we always fail to find THP inside big vmas, maybe out of not aligned mprotect that may be optimized by aligning it. The other kernel internal bits may also be stale and go away quicker than the KPF_THP, so I don't see a problem in exposing it. We also provide THP related info in meminfo/smaps, if they were supposed to be invisible that wouldn't be allowed too. A bigger concern to me is that the new bitfield alters the protocol, but old code by adding one more bit (if sanely coded...) shouldn't break. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Fight unfair telecom internet charges in Canada: sign http://stopthemeter.ca/ Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>