Received: by 10.213.65.68 with SMTP id h4csp136370imn; Wed, 21 Mar 2018 14:25:24 -0700 (PDT) X-Google-Smtp-Source: AG47ELukIhb8XMo5UcPL3UmMvstpVn8vcvXAc1FsC/aK2UzjNqu8OicpULiAgvfdjx+9B9j8pNNG X-Received: by 2002:a17:902:44c:: with SMTP id 70-v6mr22560457ple.354.1521667524492; Wed, 21 Mar 2018 14:25:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521667524; cv=none; d=google.com; s=arc-20160816; b=fyWjMc2slIoEhJDpfjvgNlooc+PZwmjyKbQUcItAIRBoTX6Ppcu+s88a8Tw9HLKB8l ONUnzyUY3OAdoFZ+puiiXSoawc6/1CYTOf8qTCb/hZP3pWO8DFV6r37PiuSvSSxujyhN Fom2+CwjkL8AM4/FK0he8rrPJD5RZcysJQONrEjx8GvomjAKiZVnawj5hkCgeLgDa1OO KvKTJzuzGWmDxULz/EZEr9zyhtLyAdTR1frFQElVDa2hq2Iy8lhGJegEJIHAmnp0tym1 XUfkjmazEy3XhgPQpA9ewnfLxwZBkp/0aWtsfpBOJNbzp502AiT9w+mF7xh939Uc3lr5 Ua7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=qRFGtx7gfTM5ZMRlvAmXUvxTydDuCyft+JDiNigON2Y=; b=CWXCWXg/lWrmHen56aykroGUROzyDa6m+1K3MU08fc5Ka9F5cJ/Gle+RPXht5ElhBq x9WPYx+jQlST0luMDCISR2SJAuZY6xB2gEpmsZTdrKnLlsvY5wGbC19t3YdOPUuMsy0g 8zXnWxCg/pbsBIj7pWw43fqKW+nRH07VGiiA26uF/nLkVwd/YaeA5ez5LuDIcn8eK4BW gAIdrKOzSIxt+lBjjVVfsjvhziCK28CVhQKvi94vjuCjwtqwz5BAlIEYly5YKUfnvBk8 kHm8MTlO8bdd4boi6i0KXhO6nuJHNOUxIEIqgEaZiuCmP+FsvcNfH54oKZyAmXEQooCc uiZQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z13-v6si4527196plo.614.2018.03.21.14.25.10; Wed, 21 Mar 2018 14:25:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753751AbeCUVYG (ORCPT + 99 others); Wed, 21 Mar 2018 17:24:06 -0400 Received: from mx2.suse.de ([195.135.220.15]:58287 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753549AbeCUVYD (ORCPT ); Wed, 21 Mar 2018 17:24:03 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 0682BABB2; Wed, 21 Mar 2018 21:24:01 +0000 (UTC) Date: Wed, 21 Mar 2018 22:23:56 +0100 From: Michal Hocko To: Yang Shi Cc: akpm@linux-foundation.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH 1/8] mm: mmap: unmap large mapping by section Message-ID: <20180321212355.GR23100@dhcp22.suse.cz> References: <1521581486-99134-1-git-send-email-yang.shi@linux.alibaba.com> <1521581486-99134-2-git-send-email-yang.shi@linux.alibaba.com> <20180321131449.GN23100@dhcp22.suse.cz> <8e0ded7b-4be4-fa25-f40c-d3116a6db4db@linux.alibaba.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 21-03-18 10:16:41, Yang Shi wrote: > > > On 3/21/18 9:50 AM, Yang Shi wrote: > > > > > > On 3/21/18 6:14 AM, Michal Hocko wrote: > > > On Wed 21-03-18 05:31:19, Yang Shi wrote: > > > > When running some mmap/munmap scalability tests with large memory (i.e. > > > > > 300GB), the below hung task issue may happen occasionally. > > > > INFO: task ps:14018 blocked for more than 120 seconds. > > > > Tainted: G E 4.9.79-009.ali3000.alios7.x86_64 #1 > > > > "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this > > > > message. > > > > ps D 0 14018 1 0x00000004 > > > > ffff885582f84000 ffff885e8682f000 ffff880972943000 ffff885ebf499bc0 > > > > ffff8828ee120000 ffffc900349bfca8 ffffffff817154d0 0000000000000040 > > > > 00ffffff812f872a ffff885ebf499bc0 024000d000948300 ffff880972943000 > > > > Call Trace: > > > > [] ? __schedule+0x250/0x730 > > > > [] schedule+0x36/0x80 > > > > [] rwsem_down_read_failed+0xf0/0x150 > > > > [] call_rwsem_down_read_failed+0x18/0x30 > > > > [] down_read+0x20/0x40 > > > > [] proc_pid_cmdline_read+0xd9/0x4e0 > > > Slightly off-topic: > > > Btw. this sucks as well. Do we really need to take mmap_sem here? Do any > > > of > > > arg_start = mm->arg_start; > > > arg_end = mm->arg_end; > > > env_start = mm->env_start; > > > env_end = mm->env_end; > > > > > > change after exec or while the pid is already visible in proc? If yes > > > maybe we can use a dedicated lock. > > BTW, this is not the only place to acquire mmap_sem in > proc_pid_cmdline_read(), it calls access_remote_vm() which need acquire > mmap_sem too, so the mmap_sem scalability issue will be hit sooner or later. Ohh, absolutely. mmap_sem is unfortunatelly abused and it would be great to remove that. munmap should perform much better. How to do that safely is a different question. I am not yet convinced that tearing down a vma in batches is safe. The vast majority of time is spent on tearing down pages and that is quite easy to move out of the write lock. That would be an improvement already and it should be risk safe. If even that is not sufficient then using range locking should help a lot. There shouldn't be really any other address space operations within the range most of the time so this would be basically non-contended access. -- Michal Hocko SUSE Labs