From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-lb0-f174.google.com (mail-lb0-f174.google.com [209.85.217.174]) by kanga.kvack.org (Postfix) with ESMTP id 6D9ED90002E for ; Wed, 11 Mar 2015 09:26:53 -0400 (EDT) Received: by lbvp9 with SMTP id p9so8779635lbv.10 for ; Wed, 11 Mar 2015 06:26:52 -0700 (PDT) Received: from mail-lb0-x232.google.com (mail-lb0-x232.google.com. [2a00:1450:4010:c04::232]) by mx.google.com with ESMTPS id xx4si2345918lbb.92.2015.03.11.06.26.50 for (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 11 Mar 2015 06:26:51 -0700 (PDT) Received: by lbvp9 with SMTP id p9so8787928lbv.8 for ; Wed, 11 Mar 2015 06:26:50 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: <1426077631.2055.20.camel@stgolabs.net> References: <1424979417.10344.14.camel@stgolabs.net> <20150226205145.GH3041@moon> <20150227173650.GA18823@redhat.com> <1425062086.13329.10.camel@stgolabs.net> <1426077631.2055.20.camel@stgolabs.net> Date: Wed, 11 Mar 2015 16:26:50 +0300 Message-ID: Subject: Re: [PATCH] mm: replace mmap_sem for mm->exe_file serialization From: Konstantin Khlebnikov Content-Type: text/plain; charset=UTF-8 Sender: owner-linux-mm@kvack.org List-ID: To: Davidlohr Bueso Cc: Oleg Nesterov , Cyrill Gorcunov , Davidlohr Bueso , Andrew Morton , Alexander Viro , "linux-mm@kvack.org" , Linux Kernel Mailing List On Wed, Mar 11, 2015 at 3:40 PM, Davidlohr Bueso wrote: > On Wed, 2015-03-11 at 15:21 +0300, Konstantin Khlebnikov wrote: >> On Fri, Feb 27, 2015 at 9:34 PM, Davidlohr Bueso wrote: >> > On Fri, 2015-02-27 at 18:36 +0100, Oleg Nesterov wrote: >> >> On 02/26, Cyrill Gorcunov wrote: >> >> > >> >> > On Thu, Feb 26, 2015 at 11:36:57AM -0800, Davidlohr Bueso wrote: >> >> > > We currently use the mmap_sem to serialize the mm exe_file. >> >> > > This is atrocious and a clear example of the misuses this >> >> > > lock has all over the place, making any significant changes >> >> > > to the address space locking that much more complex and tedious. >> >> > > This also has to do of how we used to check for the vma's vm_file >> >> > > being VM_EXECUTABLE (much of which was replaced by 2dd8ad81e31). >> >> > > >> >> > > This patch, therefore, removes the mmap_sem dependency and >> >> > > introduces a specific lock for the exe_file (rwlock_t, as it is >> >> > > read mostly and protects a trivial critical region). As mentioned, >> >> > > the motivation is to cleanup mmap_sem (as opposed to exe_file >> >> > > performance). >> >> >> >> Well, I didn't see the patch, can't really comment. >> >> >> >> But I have to admit that this looks as atrocious and a clear example of >> >> "lets add yet another random lock which we will regret about later" ;) >> >> >> >> rwlock_t in mm_struct just to serialize access to exe_file? >> > >> > I don't see why this is a random lock nor how would we regret this >> > later. I regret having to do these kind of patches because people were >> > lazy and just relied on mmap_sem without thinking beyond their use case. >> >> That's history: exe_file had direct relation to mm->mmap_sem, >> that was file from first executable vma. After my patch it's less >> related to vmas. > > Indeed. Yet I'm not changing the exe_file address space semantics at > all. > >> >> > As mentioned I'm also planning on creating an own sort of >> > exe_file_struct, which would be an isolated entity (still in the mm >> > though), with its own locking and prctl bits, that would tidy mm_struct >> > a bit. RCU was something else I considered, but it doesn't suite well in >> > all paths and we would still need a spinlock when updating the file >> > anyway. >> >> Please don't. What's wrong with mmap_sem? >> >> Do you want optimize reading mm->exe_file? > > No, I want to get rid of certain things being done under mmap_sem, > that's all. This is not performance motivated, it's to allow future work > on lock breaking. I've just yesterday explained this at lsfmm (and not > only related to exe_file). In any case I've clean up this patch and > added more on top to create a friendlier interface, I'll send that out a > bit later. > >> Then you should use rcu for that: struct file is rcu-protected thing. >> See fget(), you could do something like that. > > As mentioned, not all exe paths are RCU friendly ;) We'd at least need > srcu, but that's neither here nor there. A rwlock is suficient to get > the job done and we really need not care much about optimizing this > particular file further. I mean you could make mm->exe_file rcu protected pointer and use everywhere get_mm_exe_file() which grabs file refcount under rcu and returns pointer. > > Thanks, > Davidlohr > -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org