Received: by 10.213.65.68 with SMTP id h4csp814955imn; Thu, 22 Mar 2018 09:08:12 -0700 (PDT) X-Google-Smtp-Source: AG47ELslRZejsnpBFptYeF41479WU+E0uoqAKQf+H6xwknctA8sPDTuNbN9SXmOx4co/X60jyDJl X-Received: by 10.99.110.133 with SMTP id j127mr18516115pgc.79.1521734892722; Thu, 22 Mar 2018 09:08:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521734892; cv=none; d=google.com; s=arc-20160816; b=TVPfYyEAEB10iW5UQJBcQ4Uptc8jMzoZvNt5Nf7UfjpTYiwlpoQEYnqjQ8e3hili7b TpteNIcBwFuWLv5ovIbThkHVFixYUPEp31u/va/Oj9eU/i0Wsmnv1dygFW/2x+w8WE+F tsrYU4THYkECmtrkFrIoom63t56BY0aU4uRjkokx45UBncd5+Ulc7DxyidMnNR2JNgoZ epJ7ZIujijGy1WPjoAeXkA+Xg7B2+dW3UJ/Id0rc0KUOgMVFn7e8gRCqytzrT85UotnX KqpViwm1m9Y1QVvoorEX4XHx6V2Q7TXK2S3guyn6bNpd/uiHv6vL6+X1cEB6rSPbGqjM CG6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=N1YzOrvfIf4iZyYK4ITp49ZrYQu4mY/TypCGVHffq2k=; b=MhcRGwbLD4BOJfLELmzVl1Dhs40b05PZLsvun0H2YoxcZX2xvVsLlcZyIV050uzDfv KxfhpWwhQNwHaMgIVQXlZG9MtS1NFnESj7AIQIr2J7x39+OXDhXZEOb5o8ahHLIVhyX1 eJoD7bpCFdGHxaVTHjj1rNDuyZKKvHuZReB9kvk4wwYfRCqgNaiXkpYPYxsnzVWxAvkq Xg+kaRJkPr3PFtEqPod0/IVoI7hhlEJTnf2P7pxdH4Fy2YBukY8aOI6VRYHHVITYxhvb xJRxM70NjI6durwurZ8DlWTeSKoIN438Un0ZmcVU0kkBJRqK7tvz6YpgzQx9S7MpSQiK 2zBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b11-v6si3488791plx.631.2018.03.22.09.07.53; Thu, 22 Mar 2018 09:08:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751811AbeCVQGb (ORCPT + 99 others); Thu, 22 Mar 2018 12:06:31 -0400 Received: from out30-131.freemail.mail.aliyun.com ([115.124.30.131]:48670 "EHLO out30-131.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751729AbeCVQGa (ORCPT ); Thu, 22 Mar 2018 12:06:30 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R151e4;CH=green;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e01353;MF=yang.shi@linux.alibaba.com;NM=1;PH=DS;RN=4;SR=0;TI=SMTPD_---0SzvSVwE_1521734777; Received: from US-143344MP.local(mailfrom:yang.shi@linux.alibaba.com fp:73.158.237.84) by smtp.aliyun-inc.com(127.0.0.1); Fri, 23 Mar 2018 00:06:19 +0800 Subject: Re: [RFC PATCH 1/8] mm: mmap: unmap large mapping by section To: Michal Hocko Cc: akpm@linux-foundation.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org References: <1521581486-99134-1-git-send-email-yang.shi@linux.alibaba.com> <1521581486-99134-2-git-send-email-yang.shi@linux.alibaba.com> <20180321131449.GN23100@dhcp22.suse.cz> <8e0ded7b-4be4-fa25-f40c-d3116a6db4db@linux.alibaba.com> <20180321212355.GR23100@dhcp22.suse.cz> <952dcae2-a73e-0726-3cc5-9b6a63b417b7@linux.alibaba.com> <20180322091008.GZ23100@dhcp22.suse.cz> From: Yang Shi Message-ID: <8b4407dd-78f6-2f6f-3f45-ddb8a2d805c8@linux.alibaba.com> Date: Thu, 22 Mar 2018 09:06:14 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 In-Reply-To: <20180322091008.GZ23100@dhcp22.suse.cz> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 3/22/18 2:10 AM, Michal Hocko wrote: > On Wed 21-03-18 15:36:12, Yang Shi wrote: >> >> On 3/21/18 2:23 PM, Michal Hocko wrote: >>> On Wed 21-03-18 10:16:41, Yang Shi wrote: >>>> On 3/21/18 9:50 AM, Yang Shi wrote: >>>>> On 3/21/18 6:14 AM, Michal Hocko wrote: >>>>>> On Wed 21-03-18 05:31:19, Yang Shi wrote: >>>>>>> When running some mmap/munmap scalability tests with large memory (i.e. >>>>>>>> 300GB), the below hung task issue may happen occasionally. >>>>>>> INFO: task ps:14018 blocked for more than 120 seconds. >>>>>>> Tainted: G E 4.9.79-009.ali3000.alios7.x86_64 #1 >>>>>>> "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this >>>>>>> message. >>>>>>> ps D 0 14018 1 0x00000004 >>>>>>> ffff885582f84000 ffff885e8682f000 ffff880972943000 ffff885ebf499bc0 >>>>>>> ffff8828ee120000 ffffc900349bfca8 ffffffff817154d0 0000000000000040 >>>>>>> 00ffffff812f872a ffff885ebf499bc0 024000d000948300 ffff880972943000 >>>>>>> Call Trace: >>>>>>> [] ? __schedule+0x250/0x730 >>>>>>> [] schedule+0x36/0x80 >>>>>>> [] rwsem_down_read_failed+0xf0/0x150 >>>>>>> [] call_rwsem_down_read_failed+0x18/0x30 >>>>>>> [] down_read+0x20/0x40 >>>>>>> [] proc_pid_cmdline_read+0xd9/0x4e0 >>>>>> Slightly off-topic: >>>>>> Btw. this sucks as well. Do we really need to take mmap_sem here? Do any >>>>>> of >>>>>> arg_start = mm->arg_start; >>>>>> arg_end = mm->arg_end; >>>>>> env_start = mm->env_start; >>>>>> env_end = mm->env_end; >>>>>> >>>>>> change after exec or while the pid is already visible in proc? If yes >>>>>> maybe we can use a dedicated lock. >>>> BTW, this is not the only place to acquire mmap_sem in >>>> proc_pid_cmdline_read(), it calls access_remote_vm() which need acquire >>>> mmap_sem too, so the mmap_sem scalability issue will be hit sooner or later. >>> Ohh, absolutely. mmap_sem is unfortunatelly abused and it would be great >>> to remove that. munmap should perform much better. How to do that safely >> Yes, agree. We are on the same page. >> >>> is a different question. I am not yet convinced that tearing down a vma >>> in batches is safe. The vast majority of time is spent on tearing down >> You can try my patches. I did full LTP test and running multiple kernel >> build in parallel. It survives. > Which doesn't really mean anything. Those tests are likely to not hit > corner cases where an application silently depends on the mmap locking > and unmap atomicity. They definitely can't cover all corner cases. But, they do give us somehow confidence that the most part works. The mmap stress tests in LTP did discover some race conditions when I tried different approaches. > >>> pages and that is quite easy to move out of the write lock. That would >>> be an improvement already and it should be risk safe. If even that is >>> not sufficient then using range locking should help a lot. There >>> shouldn't be really any other address space operations within the range >>> most of the time so this would be basically non-contended access. >> It might depend on how the range is defined. Too big range may lead to >> surprisingly more contention, but too small range may bring in too much >> lock/unlock operations. > The full vma will have to be range locked. So there is nothing small or large. It sounds not helpful to a single large vma case since just one range lock for the vma, it sounds equal to mmap_sem. Yang