[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20130715160802.9d0cdc0ee012b5e119317a98@linux-foundation.org>
Date: Mon, 15 Jul 2013 16:08:02 -0700
From: Andrew Morton <akpm@...ux-foundation.org>
To: David Gibson <david@...son.dropbear.id.au>
Cc: Davidlohr Bueso <davidlohr.bueso@...com>,
Hugh Dickins <hughd@...gle.com>,
Rik van Riel <riel@...hat.com>,
Michel Lespinasse <walken@...gle.com>,
Mel Gorman <mgorman@...e.de>,
Konstantin Khlebnikov <khlebnikov@...nvz.org>,
Michal Hocko <mhocko@...e.cz>,
"AneeshKumarK.V" <aneesh.kumar@...ux.vnet.ibm.com>,
KAMEZAWA Hiroyuki <kamezawa.hiroyu@...fujitsu.com>,
Hillf Danton <dhillf@...il.com>, linux-mm@...ck.org,
LKML <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] mm/hugetlb: per-vma instantiation mutexes
On Mon, 15 Jul 2013 17:24:32 +1000 David Gibson <david@...son.dropbear.id.au> wrote:
> I have previously proposed a correct method of improving scalability,
> although it doesn't eliminate the lock. That's to use a set of hashed
> mutexes.
Yep - hashing the mutexes is an obvious and nicely localized way of
improving this. It's a tweak, not a design change.
The changelog should describe the choice of the hash key with great
precision, please. It's important and is the first thing which
reviewers and readers will zoom in on.
Should the individual mutexes be cacheline aligned? Depends on the
acquisition frequency, I guess. Please let's work through that.
Let's not damage uniprocesor kernels too much. AFACIT the main offender
here is fault_mutex_hash(), which is the world's most obfuscated "return
0;".
> It wasn't merged before, but I don't recall the reasons
> why.
Me either.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists