Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp29799531rwd; Wed, 5 Jul 2023 18:14:38 -0700 (PDT) X-Google-Smtp-Source: APBJJlGJqNw3gQmtpD13FEoXK6+zG1GntdPny4TCu+4cs5xgMDBPnEvi0cRuM3Zzl7M1uUZ4IQpy X-Received: by 2002:a05:6808:238a:b0:3a3:61fc:f913 with SMTP id bp10-20020a056808238a00b003a361fcf913mr653804oib.0.1688606078296; Wed, 05 Jul 2023 18:14:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1688606078; cv=none; d=google.com; s=arc-20160816; b=F8/uMSjhZkIwyAkdGBWckDK4PArH9/zbv/fyeKHiZrZbR5pBE1CQVi8nf4k/SX/+LJ 1nI6D3d+zGV1pfhrlxF2fvq265u2Y2Xb8Yre2xA3JJ9bcu/SB431KK8AT6Ib7e0BQppN iWjSXedZtAZmGOscsknN+T+QSUMM5s0t60RpEw1oiPq25Ij5Ly+UX5eBGNloCK+ARWz2 VfL1DrDNNdwGvME9T+jcxE1Ql729woeahJ3CpYTbbP5Kb/9i/XMVTIY9uMG0njQWlS60 2dV2+Rg/791g9mXSRpJid4WnCNGIsezvYXDdTpUS+eZFJm4YA3MrJjpF2yZeHULU1Rxd gDYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=cj9rmCeL+AZ6QHmSoAJxaorXqhnFAOK3Nz1VnC7AEt0=; fh=wpa8DnQv7vwnoGalbJ0rhqSFf09n2Vbh1g09lqV436Q=; b=WAcupFgPihbeFdEtXBewddVM+oU5gGZFnNs4/dLLn3WaIzjIVL9e3LGph5ggCtuR3W 0Cfg5QnjLJwkpvq0YIXeOBaThIs2n5yXKoaKllARYpFdLEE8mcdvjkpcDXilkG6Zlgra 3VEITZCufNIf4bsxylvypUh27FB3Tfw2/4lo9qvtLx4quS9mSpQWWgAkuuIkHbVk1Ecf wfXX0qeqkc6YrXiEhh9VPvjSzxOyPDazo+3+BW4UHtH7qqE0R1wW4eWOi6Yg7SFUPlAG vSL0mrcL1pEb0AmJSDkGD99EUOTtqlltJ0elUAFHj/vYRxP6rsEUhgXucVQ3mQz7t2/S dpPw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=ZHoiWE6i; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j13-20020a056a00234d00b006827c671c1asi375142pfj.226.2023.07.05.18.14.25; Wed, 05 Jul 2023 18:14:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=ZHoiWE6i; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232698AbjGFAop (ORCPT + 99 others); Wed, 5 Jul 2023 20:44:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34574 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231218AbjGFAoo (ORCPT ); Wed, 5 Jul 2023 20:44:44 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 87EAB19A9; Wed, 5 Jul 2023 17:44:43 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 2101E617D8; Thu, 6 Jul 2023 00:44:43 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id EAC35C433C7; Thu, 6 Jul 2023 00:44:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1688604282; bh=aEC6PCPk3DBXeBBrvw5oME0/w9hJPSVa0CwOwDzK5eA=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=ZHoiWE6ijdvrCAMom8HCoWZK5cb2gf0Tfw/24RivBzOPbokC20IXa0XpVfmEjlESo v1S4ZyPbcfhogeLVhTwMpVtIQxmEJRAzCVhwtL8qsIG17d9MqyIVNVzoc6D6HIxjeL EKQw1TOIKypxdrpKc9vqsOhVRC6DXGsMZBo0Hba0= Date: Wed, 5 Jul 2023 17:44:40 -0700 From: Andrew Morton To: Suren Baghdasaryan Cc: Peter Xu , David Hildenbrand , jirislaby@kernel.org, jacobly.alt@gmail.com, holger@applied-asynchrony.com, hdegoede@redhat.com, michel@lespinasse.org, jglisse@google.com, mhocko@suse.com, vbabka@suse.cz, hannes@cmpxchg.org, mgorman@techsingularity.net, dave@stgolabs.net, willy@infradead.org, liam.howlett@oracle.com, peterz@infradead.org, ldufour@linux.ibm.com, paulmck@kernel.org, mingo@redhat.com, will@kernel.org, luto@kernel.org, songliubraving@fb.com, dhowells@redhat.com, hughd@google.com, bigeasy@linutronix.de, kent.overstreet@linux.dev, punit.agrawal@bytedance.com, lstoakes@gmail.com, peterjung1337@gmail.com, rientjes@google.com, chriscli@google.com, axelrasmussen@google.com, joelaf@google.com, minchan@google.com, rppt@kernel.org, jannh@google.com, shakeelb@google.com, tatashin@google.com, edumazet@google.com, gthelen@google.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: Re: [PATCH v3 2/2] mm: disable CONFIG_PER_VMA_LOCK until its fixed Message-Id: <20230705174440.9adb53f2e362056867135b84@linux-foundation.org> In-Reply-To: References: <20230705171213.2843068-1-surenb@google.com> <20230705171213.2843068-3-surenb@google.com> <3cdaa7d4-1293-3806-05ce-6b7fc4382458@redhat.com> <20230705172424.e505f5013bfdf44543d9c6be@linux-foundation.org> X-Mailer: Sylpheed 3.8.0beta1 (GTK+ 2.24.33; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.2 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 5 Jul 2023 17:32:09 -0700 Suren Baghdasaryan wrote: > On Wed, Jul 5, 2023 at 5:30 PM Suren Baghdasaryan wrote: > > > > On Wed, Jul 5, 2023 at 5:24 PM Andrew Morton wrote: > > > > > > On Wed, 5 Jul 2023 13:33:26 -0700 Suren Baghdasaryan wrote: > > > > > > > I was hoping we could re-enable VMA locks in 6.4 once we get more > > > > confirmations that the problem is gone. Is that not possible once the > > > > BROKEN dependency is merged? > > > > > > I think "no". By doing this we're effectively backporting a minor > > > performance optimization, which isn't a thing we'd normally do. > > > > In that case, maybe for 6.4 we send the fix and only disable it by > > default without marking BROKEN? That way we still have a way to enable > > it if desired? > > I'm preparing the next version with Liam's corrections. If the above > option I suggested is acceptable I can send a modified second patch > which would not have BROKEN dependency. I think just mark it broken and move on. At some later time we can consider backporting the fixes into 6.4.x and reenabling, but I don't think it's likely that we'll do this.