Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4649imu; Sun, 4 Nov 2018 17:32:36 -0800 (PST) X-Google-Smtp-Source: AJdET5egS+zL1QnZtj3VdYNNUVD978cNt5J9Y5vvIEezFe+HVKINU3Gow3aYYf21uITitqjTT2AL X-Received: by 2002:a62:31c2:: with SMTP id x185-v6mr2199277pfx.39.1541381556497; Sun, 04 Nov 2018 17:32:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541381556; cv=none; d=google.com; s=arc-20160816; b=DX9dyJCFnw4/FWin6FB0yZfmD07eZ7/ZRshXU0kmyuocLoj7gF/gQe5R4Wxc1Dv6c8 6H+9thvdLM7zJwZmTwGzefpoaK7VRhq9goIHnR3mHhfvPfk27OuLAVcABdVER07M7833 DS6I8j67tVLlAmx2PWtydgQuhj65V04GXq5ZxLK0gBgDdb6COfCSTqoldvzxgD6FnORA lYMq08XVdjBfryXbnvSnsXIZTYemDzIcMAQaFEg3u0WOuZ2Bjlcxng/SQi9TcQoKfg1j ztPftmLZAKSYWpPssh6vZ+Cqc+kK1vXqDNoHkOens0PN1GaZcmC4gEJofrprdcX1jjFP fivA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:message-id:cc:subject:date:to:from; bh=+IjP43PGnkQYJSoix6vH0ZhvshxQ3mBwLqlS0mnaaM4=; b=W1ud0SPMfgO2bEMIjto/DfgvU+YzgickVENxIMGdDjJAwFTBQK6GVf4FgO7BQvCznP an5lx/GrMQQ3kLpzfmFnRIHttjFkfO4pMhAq9nKGJZA3683RZD2+m3Ah7rwO5ZxtmYTd QyLwFQZn8z0HPecQhmN7UZRIHkv+1S0oS+b5lynjVwIiVH2o+UfgV1VW+i8tWeqq4pwa +mQdpRLL6njwJzSw2D2r6xSeoRSMSTRgCox2lbpAax5zz5HOnCLybIPxgYtV1M90jV29 87Bkc7xRQjZImdu/IuoKeCoVxEGJFJBGBNp3qxPs70FI4Ky7j6pkSnTMvAQHruaiHuU3 wxMg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h6-v6si1433401plk.373.2018.11.04.17.32.08; Sun, 04 Nov 2018 17:32:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727032AbeKEKsp (ORCPT + 99 others); Mon, 5 Nov 2018 05:48:45 -0500 Received: from mx2.suse.de ([195.135.220.15]:60480 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726494AbeKEKsp (ORCPT ); Mon, 5 Nov 2018 05:48:45 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id B9BAAAFD9; Mon, 5 Nov 2018 01:31:37 +0000 (UTC) From: NeilBrown To: Jeff Layton , Alexander Viro Date: Mon, 05 Nov 2018 12:30:47 +1100 Subject: [PATCH 00/12] Series short description Cc: "J. Bruce Fields" , Martin Wilck , linux-fsdevel@vger.kernel.org, Frank Filz , linux-kernel@vger.kernel.org Message-ID: <154138128401.31651.1381177427603557514.stgit@noble> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Here is the respin on this series with the file_lock properly initlized for unlock requests. I found one that I had missed before - in locks_remove_flock() The change makes this code smaller! Original series description: If you have a many-core machine, and have many threads all wanting to briefly lock a give file (udev is known to do this), you can get quite poor performance. When one thread releases a lock, it wakes up all other threads that are waiting (classic thundering-herd) - one will get the lock and the others go to sleep. When you have few cores, this is not very noticeable: by the time the 4th or 5th thread gets enough CPU time to try to claim the lock, the earlier threads have claimed it, done what was needed, and released. With 50+ cores, the contention can easily be measured. This patchset creates a tree of pending lock request in which siblings don't conflict and each lock request does conflict with its parent. When a lock is released, only requests which don't conflict with each other a woken. Testing shows that lock-acquisitions-per-second is now fairly stable even as number of contending process goes to 1000. Without this patch, locks-per-second drops off steeply after a few 10s of processes. There is a small cost to this extra complexity. At 20 processes running a particular test on 72 cores, the lock acquisitions per second drops from 1.8 million to 1.4 million with this patch. For 100 processes, this patch still provides 1.4 million while without this patch there are about 700,000. NeilBrown --- NeilBrown (12): fs/locks: rename some lists and pointers. fs/locks: split out __locks_wake_up_blocks(). NFS: use locks_copy_lock() to copy locks. gfs2: properly initial file_lock used for unlock. ocfs2: properly initial file_lock used for unlock. locks: use properly initialized file_lock when unlocking. fs/locks: allow a lock request to block other requests. fs/locks: always delete_block after waiting. fs/locks: change all *_conflict() functions to return bool. fs/locks: create a tree of dependent requests. locks: merge posix_unblock_lock() and locks_delete_block() VFS: locks: remove unnecessary white space. fs/cifs/file.c | 4 - fs/gfs2/file.c | 10 +- fs/lockd/svclock.c | 2 fs/locks.c | 253 +++++++++++++++++++++------------------ fs/nfs/nfs4proc.c | 6 + fs/nfsd/nfs4state.c | 6 - fs/ocfs2/locks.c | 10 +- include/linux/fs.h | 11 +- include/trace/events/filelock.h | 16 +- 9 files changed, 173 insertions(+), 145 deletions(-) -- Signature