From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.8 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8817AC433E0 for ; Thu, 21 May 2020 00:54:50 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 48AD020758 for ; Thu, 21 May 2020 00:54:50 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="dpHKgFJ9" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 48AD020758 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linux-foundation.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id C454C80008; Wed, 20 May 2020 20:54:49 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id BF60480007; Wed, 20 May 2020 20:54:49 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B09FC80008; Wed, 20 May 2020 20:54:49 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0244.hostedemail.com [216.40.44.244]) by kanga.kvack.org (Postfix) with ESMTP id 9848080007 for ; Wed, 20 May 2020 20:54:49 -0400 (EDT) Received: from smtpin15.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay01.hostedemail.com (Postfix) with ESMTP id 53A48180AD81D for ; Thu, 21 May 2020 00:54:49 +0000 (UTC) X-FDA: 76838906298.15.jewel69_4725f2e423e43 X-HE-Tag: jewel69_4725f2e423e43 X-Filterd-Recvd-Size: 3894 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf32.hostedemail.com (Postfix) with ESMTP for ; Thu, 21 May 2020 00:54:48 +0000 (UTC) Received: from localhost.localdomain (c-73-231-172-41.hsd1.ca.comcast.net [73.231.172.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 56C0E20756; Thu, 21 May 2020 00:54:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590022488; bh=nUC6IS5B+HO4x1xRb90GxHXMHv01xodZ56chdUvxpR4=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=dpHKgFJ9WM3DHwB8NU0iO7BVqjA8bVDD3gzbTkCQSA7m1X3gZUioDgTvR4I2hAVCw qVNIo3rEDD9eMNWYQrhXT60ZDlDUUJVidIvr8MDzhgcuss+dmx1b1dCC29i+xBAAhM BaEuTTJYbLoLx6aYIYOwGE3VJz6Wm2BQHABSju10= Date: Wed, 20 May 2020 17:54:46 -0700 From: Andrew Morton To: maobibo Cc: Thomas Bogendoerfer , Jiaxun Yang , Huacai Chen , Paul Burton , Dmitry Korotin , Philippe =?ISO-8859-1?Q?Mathieu-Daud=E9?= , Stafford Horne , Steven Price , Anshuman Khandual , linux-mips@vger.kernel.org, linux-kernel@vger.kernel.org, Mike Rapoport , Sergei Shtylyov , "Maciej W. Rozycki" , linux-mm@kvack.org, David Hildenbrand Subject: Re: [PATCH v4 2/4] mm/memory.c: Update local TLB if PTE entry exists Message-Id: <20200520175446.11068e9e81da493a8e120601@linux-foundation.org> In-Reply-To: References: <1589882610-7291-1-git-send-email-maobibo@loongson.cn> <1589882610-7291-2-git-send-email-maobibo@loongson.cn> <20200519182619.2c5e76d3f6b25d71702abbe0@linux-foundation.org> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Wed, 20 May 2020 14:39:13 +0800 maobibo wrote: > > I'm still worried about the impact on other architectures. The > > additional update_mmu_cache() calls won't occur only when multiple > > threads are racing against the same page, I think? For example, > > insert_pfn() will do this when making a read-only page a writable one. > How about defining ptep_set_access_flags function like this on mips system? > which is the same on riscv platform. > > static inline int ptep_set_access_flags(struct vm_area_struct *vma, > unsigned long address, pte_t *ptep, > pte_t entry, int dirty) > { > if (!pte_same(*ptep, entry)) > set_pte_at(vma->vm_mm, address, ptep, entry); > /* > * update_mmu_cache will unconditionally execute, handling both > * the case that the PTE changed and the spurious fault case. > */ > return true; > } > hm, it seems a bit abusive - ptep_set_access_flags() is supposed to return true if the pte changed, and that isn't the case here. I suppose we could run update_mmu_cache() directly from ptep_set_access_flags() if we're about to return false, but that doesn't seem a lot nicer? > > Would you have time to add some instrumentation into update_mmu_cache() > > (maybe a tracepoint) and see what effect this change has upon the > > frequency at which update_mmu_cache() is called for a selection of > > workloads? And add this info to the changelog to set minds at ease? > > OK, I will add some instrumentation data in the changelog. Well, if this testing shows no effect as you expect, perhaps we can leave the code as-is.