From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id AEDFFC433EF for ; Tue, 31 May 2022 13:05:46 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 24F246B0072; Tue, 31 May 2022 09:05:46 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 2219A6B0073; Tue, 31 May 2022 09:05:46 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 0E89F6B0074; Tue, 31 May 2022 09:05:46 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id F06AD6B0072 for ; Tue, 31 May 2022 09:05:45 -0400 (EDT) Received: from smtpin03.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay11.hostedemail.com (Postfix) with ESMTP id C203A80365 for ; Tue, 31 May 2022 13:05:45 +0000 (UTC) X-FDA: 79526060250.03.6F28406 Received: from casper.infradead.org (casper.infradead.org [90.155.50.34]) by imf23.hostedemail.com (Postfix) with ESMTP id 8B3EB14005E for ; Tue, 31 May 2022 13:05:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=2LaeE6TXNYbEbm2V2tXhLHBQx057Dlx91hkU5xAWauU=; b=NafnL0NLUqNnb1avAu6c+9ng/1 5oEC8BhrwdbQXoTtFrOmL2MLVaHyLtwHfmXTkELVG++FlFc9sSPWOS6nFx+laQZUh0TgANJJtw66h JkhC9DcvgMpuUWe1bAwWV4H6VNDmSqGdiZz4ql25ZaTcVuTWHWUwH3MswFN0D67GWhZ2O0p8pECC/ apRZsAt+ksza8domwjXUD0pLNPvJUaGxtPj0IxLHWzK7jg2MMCxI4mTH8HqmIToXEya+OHZ+jCZuE x1do3ZJd/8GgUeTGrGe/bqnjjdA1aHRata6VB1rQWA6OWWwLg2VnmL8yOSzAgb0+umvGrPh/kHu6/ p/UuxSNQ==; Received: from willy by casper.infradead.org with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1nw1Yl-005OL0-Eb; Tue, 31 May 2022 13:05:19 +0000 Date: Tue, 31 May 2022 14:05:19 +0100 From: Matthew Wilcox To: Miaohe Lin Cc: akpm@linux-foundation.org, naoya.horiguchi@nec.com, peterx@redhat.com, apopple@nvidia.com, ying.huang@intel.com, osalvador@suse.de, mike.kravetz@oracle.com, songmuchun@bytedance.com, hch@lst.de, dhowells@redhat.com, cl@linux.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v4 1/4] mm: reduce the rcu lock duration Message-ID: References: <20220530113016.16663-1-linmiaohe@huawei.com> <20220530113016.16663-2-linmiaohe@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspamd-Server: rspam06 X-Rspamd-Queue-Id: 8B3EB14005E X-Stat-Signature: qbjckaw95p4h74s8swiaw3kk5876jmih X-Rspam-User: Authentication-Results: imf23.hostedemail.com; dkim=pass header.d=infradead.org header.s=casper.20170209 header.b=NafnL0NL; spf=none (imf23.hostedemail.com: domain of willy@infradead.org has no SPF policy when checking 90.155.50.34) smtp.mailfrom=willy@infradead.org; dmarc=none X-HE-Tag: 1654002320-541683 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Tue, May 31, 2022 at 01:58:31PM +0100, Matthew Wilcox wrote: > On Mon, May 30, 2022 at 07:30:13PM +0800, Miaohe Lin wrote: > > Commit 3268c63eded4 ("mm: fix move/migrate_pages() race on task struct") > > extends the period of the rcu_read_lock until after the permissions checks > > are done to prevent the task pointed to from changing from under us. But > > the task_struct refcount is also taken at that time, the reference to task > > is guaranteed to be stable. So it's unnecessary to extend the period of > > the rcu_read_lock. Release the rcu lock after task refcount is successfully > > grabbed to reduce the rcu holding time. > > But why bother? You know the RCU read lock isn't a "real" lock, right? Looking over this code some more, I think this may harm performance. ptrace_may_access() itself takes the rcu_read_lock(). So we currently have: rcu_read_lock() rcu_read_lock(); rcu_read_unlock(); rcu_read_unlock(); In at least one RCU configuration, rcu_read_lock() maps to preempt_disable(). Nested preempt_disable() just bump a counter, while that counter reaching zero incurs some actual work. So nested rcu_read_lock() can be better than sequential lock/unlock/lock/unlock. This needs far better justification.