On Tue, Jun 04, 2013 at 06:37:25AM -0400, Rik van Riel wrote: > On 06/03/2013 03:50 PM, Daniel Forrest wrote: > > On Tue, Aug 21, 2012 at 11:29:54PM -0400, Rik van Riel wrote: > >> On 08/21/2012 11:20 PM, Michel Lespinasse wrote: > >>> On Mon, Aug 20, 2012 at 02:39:26AM -0700, Michel Lespinasse wrote: > >>>> Instead of adding an atomic count for page references, we could limit > >>>> the anon_vma stacking depth. In fork, we would only clone anon_vmas > >>>> that have a low enough generation count. I think that's not great > >>>> (adds a special case for the deep-fork-without-exec behavior), but > >>>> still better than the atomic page reference counter. > >>> > >>> Here is an attached patch to demonstrate the idea. > >>> > >>> anon_vma_clone() is modified to return the length of the existing same_vma > >>> anon vma chain, and we create a new anon_vma in the child only on the first > >>> fork (this could be tweaked to allow up to a set number of forks, but > >>> I think the first fork would cover all the common forking server cases). > >> > >> I suspect we need 2 or 3. > >> > >> Some forking servers first fork off one child, and have > >> the original parent exit, in order to "background the server". > >> That first child then becomes the parent to the real child > >> processes that do the work. > >> > >> It is conceivable that we might need an extra level for > >> processes that do something special with privilege dropping, > >> namespace changing, etc... > >> > >> Even setting the threshold to 5 should be totally harmless, > >> since the problem does not kick in until we have really > >> long chains, like in Dan's bug report. > > > > I have been running with Michel's patch (with the threshold set to 5) > > for quite a few months now and can confirm that it does indeed solve > > my problem. I am not a kernel developer, so I would appreciate if one > > of you could push this into the kernel tree. > > > > NOTE: I have attached Michel's patch with "(length > 1)" modified to > > "(length > 5)" and added a "Tested-by:". > > Thank you for testing this. > > I believe this code should go into the Linux kernel, > since it closes up what could be a denial of service > attack (albeit a local one) with the anonvma code. Agreed. The only thing I don't like about this patch is the hardcoding of number 5: could we make it a variable to tweak with sysfs/sysctl so if some weird workload arises we have a tuning tweak? It'd cost one cacheline during fork, so it doesn't look excessive overhead. Thanks, Andrea -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>