Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp1334839imm; Tue, 5 Jun 2018 12:52:27 -0700 (PDT) X-Google-Smtp-Source: ADUXVKI+qlYNkzd3eHobfSc6lTCDjC7RogzV0cTtr5IntllP/uShIHubIGEmq+rOi9l18IPal3EP X-Received: by 2002:a63:7b1e:: with SMTP id w30-v6mr20242pgc.402.1528228347196; Tue, 05 Jun 2018 12:52:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528228347; cv=none; d=google.com; s=arc-20160816; b=OUvHKfd1TG0UmmVNCMH3qIGeJrkTA/liM+XRyMCMdscQoVep74+5DTaGE/5OfyFKAL Z/MmHbVI0tVNZPNF/AQhV2ogip1cOxyfzQq1lE7fU7z5Jx44CRT4KQBhQ2ib6R+PDoz0 6gjtmsHnJqI/3tZIa3cMtMqvTKurAbPSzmYttZF/v8rtOEspvqe/JbC7dTlfvMzf+e4z Q6FcDepz+5hl0MeIBtwqj2BD4Sij7AY7Y/u76zb01wSeWptXbHFpd3vCqLqt8wYj0Yol 2cvl86BQCbYEsd9qiXhpBwUHlhwJ7bS9InxbaOgcpANhon70S0uqeungyt6q2BajUhqM pKcw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=+9RV+bocQpYX1UaeORnx/veSEXHxvAb6NrqmRthEG9w=; b=ruhzAOu7Lr7jFwWPCy+B9psT+g7/XySHoFPPkaMKB1ujeXu31Mkq09d3zssVkoNO/W zGWKRjq4Zieo7PG1rnAmoBpvIVog5Pd59YnTj3IJNy20Oty26cw8Db+yBf2NXUEOZylF 1bXlAgzwVodT4Fw7pqCdklbBdeGHXFVxHMRW1kXMqtvh5mvf4hoO5l+R3wqAUN6glLOa 5ZXWs6z9WdITOgljzXl61+o6FXlWU5oeLCDXLuGTiVIaAnd6BRqehPsBRpTlP4AxyARs xxYqQ08clUBwtcfZCrsVfO6+k/6oae/8AB9dX1rzLYncEyew7/9oY7m140spIQC3GG+t BR7w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y13-v6si4578899pgq.69.2018.06.05.12.52.12; Tue, 05 Jun 2018 12:52:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752301AbeFETvn (ORCPT + 99 others); Tue, 5 Jun 2018 15:51:43 -0400 Received: from outbound-smtp10.blacknight.com ([46.22.139.15]:57887 "EHLO outbound-smtp10.blacknight.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751965AbeFETvm (ORCPT ); Tue, 5 Jun 2018 15:51:42 -0400 Received: from mail.blacknight.com (pemlinmail03.blacknight.ie [81.17.254.16]) by outbound-smtp10.blacknight.com (Postfix) with ESMTPS id 6D96E1C1E23 for ; Tue, 5 Jun 2018 20:51:41 +0100 (IST) Received: (qmail 21321 invoked from network); 5 Jun 2018 19:51:41 -0000 Received: from unknown (HELO techsingularity.net) (mgorman@techsingularity.net@[37.228.237.73]) by 81.17.254.9 with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 5 Jun 2018 19:51:41 -0000 Date: Tue, 5 Jun 2018 20:51:40 +0100 From: Mel Gorman To: Dave Hansen Cc: Andrew Morton , mhocko@kernel.org, vbabka@suse.cz, Aaron Lu , linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: Re: [PATCH] mremap: Avoid TLB flushing anonymous pages that are not in swap cache Message-ID: <20180605195140.afc7xzgbre26m76l@techsingularity.net> References: <20180605171319.uc5jxdkxopio6kg3@techsingularity.net> <20180605191245.3owve7gfut22tyob@techsingularity.net> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170912 (1.9.0) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jun 05, 2018 at 12:49:18PM -0700, Dave Hansen wrote: > >> I usually try to make the non-pte-modifying functions take a pte_t > >> instead of 'pte_t *' to make it obvious that there no modification going > >> on. Any reason not to do that here? > > > > No, it was just a minor saving on stack usage. > > We're just splitting hairs now :) but, realistically, this little helper > will get inlined anyway, so it probably all generates the same code. > I expect so and your point is valid that it should be obvious that no modifications can take place. > ... > >> BTW, do you want to add a tiny comment about why we do the > >> trylock_page()? I assume it's because we don't want to wait on finding > >> an exact answer: we just assume it is in the swap cache if the page is > >> locked and flush regardless. > > > > It's really because calling lock_page while holding a spinlock is > > eventually going to ruin your day. > > Hah, yeah, that'll do it. Could you comment this, too? > Yep, I made the change after reading your mail. This is how it currently stands ---8<--- mremap: Avoid excessive TLB flushing for anonymous pages that are not in swap cache Commit 5d1904204c99 ("mremap: fix race between mremap() and page cleanning") fixed races between mremap and other operations for both file-backed and anonymous mappings. The file-backed was the most critical as it allowed the possibility that data could be changed on a physical page after page_mkclean returned which could trigger data loss or data integrity issues. A customer reported that the cost of the TLBs for anonymous regressions was excessive and resulting in a 30-50% drop in performance overall since this commit on a microbenchmark. Unfortunately I neither have access to the test-case nor can I describe what it does other than saying that mremap operations dominate heavily. The anonymous page race fix is overkill for two reasons. Pages that are not in the swap cache are not going to be issued for IO and if a stale TLB entry is used, the write still occurs on the same physical page. Any race with mmap replacing the address space is handled by mmap_sem. As anonymous pages are often dirty, it can mean that mremap always has to flush even when it is not necessary. This patch special cases anonymous pages to only flush ranges under the page table lock if the page is in swap cache and can be potentially queued for IO. Note that the full flush of the range being mremapped is still flushed so TLB flushes are not eliminated entirely. It uses the page lock to serialise against any potential reclaim. If the page is added to the swap cache on the reclaim side after the page lock is dropped on the mremap side then reclaim will call try_to_unmap_flush_dirty() before issuing any IO so there is no data integrity issue. This means that in the common case where a workload avoids swap entirely that mremap is a much cheaper operation due to the lack of TLB flushes. Using another testcase that simply calls mremap heavily with varying number of threads, it was found that very broadly speaking that TLB shootdowns were reduced by 31% on average throughout the entire test case but your milage will vary. Signed-off-by: Mel Gorman --- mm/mremap.c | 45 ++++++++++++++++++++++++++++++++++++++++----- 1 file changed, 40 insertions(+), 5 deletions(-) diff --git a/mm/mremap.c b/mm/mremap.c index 049470aa1e3e..5b9767b0446e 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -24,6 +24,7 @@ #include #include #include +#include #include #include @@ -112,6 +113,44 @@ static pte_t move_soft_dirty_pte(pte_t pte) return pte; } +/* Returns true if a TLB must be flushed before PTL is dropped */ +static bool should_force_flush(pte_t pte) +{ + bool is_swapcache; + struct page *page; + + if (!pte_present(pte) || !pte_dirty(pte)) + return false; + + /* + * If we are remapping a dirty file PTE, make sure to flush TLB + * before we drop the PTL for the old PTE or we may race with + * page_mkclean(). + */ + page = pte_page(pte); + if (page_is_file_cache(page)) + return true; + + /* + * For anonymous pages, only flush swap cache pages that could + * be unmapped and queued for swap since flush_tlb_batched_pending was + * last called. Reclaim itself takes care that the TLB is flushed + * before IO is queued. If a page is not in swap cache and a stale TLB + * is used before mremap is complete then the write hits the same + * physical page and there is no lost data loss. + * + * Check under the page lock to avoid any potential race with reclaim. + * trylock is necessary as spinlocks are currently held. In the unlikely + * event of contention, flush the TLB to be safe. + */ + if (!trylock_page(page)) + return true; + is_swapcache = PageSwapCache(page); + unlock_page(page); + + return is_swapcache; +} + static void move_ptes(struct vm_area_struct *vma, pmd_t *old_pmd, unsigned long old_addr, unsigned long old_end, struct vm_area_struct *new_vma, pmd_t *new_pmd, @@ -163,15 +202,11 @@ static void move_ptes(struct vm_area_struct *vma, pmd_t *old_pmd, pte = ptep_get_and_clear(mm, old_addr, old_pte); /* - * If we are remapping a dirty PTE, make sure - * to flush TLB before we drop the PTL for the - * old PTE or we may race with page_mkclean(). - * * This check has to be done after we removed the * old PTE from page tables or another thread may * dirty it after the check and before the removal. */ - if (pte_present(pte) && pte_dirty(pte)) + if (should_force_flush(pte)) force_flush = true; pte = move_pte(pte, new_vma->vm_page_prot, old_addr, new_addr); pte = move_soft_dirty_pte(pte); -- Mel Gorman SUSE Labs