Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4589668yba; Wed, 17 Apr 2019 15:00:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqwxx7Jvl832n7jHD7k6cgVUDXql7he5OI9jhee0LU4bXivp5kWycvgfAVkzEf33uLTnVJYY X-Received: by 2002:a63:195f:: with SMTP id 31mr85631088pgz.116.1555538404344; Wed, 17 Apr 2019 15:00:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555538404; cv=none; d=google.com; s=arc-20160816; b=n0ms+NixGkob4GNuAKEzl4FH3iDPdaQNYVHtDjl6/4lUMtMTWpRQxt5VtKP1cjtl0M HfhmHkYvuB0MbEYHy9oEPbVybk07lotZAzDvS7LtDt//TOo6Lxw13tkYddyPLOsJ3DIc FhkeRHZYiROpn25SvauYOkqEOTlNoa+cNlBskAEwWYxcatBEm0UcYE1Nfum0nA2JMhdG HWaKuiqNyK9k1D+5eAW5Hd/X5lz9Ct8pa37FlMVa1LtKWu4see2gLVBVlI+UhnxvC6An pxLdJOnZUfDq+4KNxJN5rv3XNJDjpfVG9MVZShwEAMc1c1ivihJjh1DtGLjeLyxoB3pZ dJ8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=JCM5S0gkR2qqqtfgO9v0jRrej0U2QzvhxpvwqW2iiZE=; b=pfTHq1c1dvj3mkcj8zP1kzqzty97pjjc8MLRkpdLbk6yVJGTggF68N+RUk3p1J4M0W sQoffP3+0tFeDvaXSUpnG9MpMRrr9cKU4RytkKRyNczfauIOszdMKu5GK2TMHO2WMqQ9 Xl3MJbZO3qN3SWbj3+nTmFOvFyGm2qLPr7bfXs5Gmy5WbDew/j3fzJmBhJuwxEPWDFC9 537Xb1inXQdIUgPebNHLz93+0gqhJWFDOcZUrFMChuSNDcdpT7vk0BF8+sPf2heK+/tq eRUeculYUnAAttG4qvI00qUnA1FI3yKYRbsSNgUN6tyN7u/nQIdNPasLVpr4lYo5z+21 HO/w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d6si123696pls.402.2019.04.17.14.59.46; Wed, 17 Apr 2019 15:00:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387511AbfDQV6a (ORCPT + 99 others); Wed, 17 Apr 2019 17:58:30 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:55036 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729782AbfDQV6a (ORCPT ); Wed, 17 Apr 2019 17:58:30 -0400 Received: from akpm3.svl.corp.google.com (unknown [104.133.8.65]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id C52E2A95; Wed, 17 Apr 2019 21:58:28 +0000 (UTC) Date: Wed, 17 Apr 2019 14:58:27 -0700 From: Andrew Morton To: Roman Gushchin Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, kernel-team@fb.com, Matthew Wilcox , Johannes Weiner , Vlastimil Babka , Roman Gushchin Subject: Re: [PATCH v4 1/2] mm: refactor __vunmap() to avoid duplicated call to find_vm_area() Message-Id: <20190417145827.8b1c83bf22de8ba514f157e3@linux-foundation.org> In-Reply-To: <20190417194002.12369-2-guro@fb.com> References: <20190417194002.12369-1-guro@fb.com> <20190417194002.12369-2-guro@fb.com> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 17 Apr 2019 12:40:01 -0700 Roman Gushchin wrote: > __vunmap() calls find_vm_area() twice without an obvious reason: > first directly to get the area pointer, second indirectly by calling > remove_vm_area(), which is again searching for the area. > > To remove this redundancy, let's split remove_vm_area() into > __remove_vm_area(struct vmap_area *), which performs the actual area > removal, and remove_vm_area(const void *addr) wrapper, which can > be used everywhere, where it has been used before. > > On my test setup, I've got 5-10% speed up on vfree()'ing 1000000 > of 4-pages vmalloc blocks. > > Perf report before: > 22.64% cat [kernel.vmlinux] [k] free_pcppages_bulk > 10.30% cat [kernel.vmlinux] [k] __vunmap > 9.80% cat [kernel.vmlinux] [k] find_vmap_area > 8.11% cat [kernel.vmlinux] [k] vunmap_page_range > 4.20% cat [kernel.vmlinux] [k] __slab_free > 3.56% cat [kernel.vmlinux] [k] __list_del_entry_valid > 3.46% cat [kernel.vmlinux] [k] smp_call_function_many > 3.33% cat [kernel.vmlinux] [k] kfree > 3.32% cat [kernel.vmlinux] [k] free_unref_page > > Perf report after: > 23.01% cat [kernel.kallsyms] [k] free_pcppages_bulk > 9.46% cat [kernel.kallsyms] [k] __vunmap > 9.15% cat [kernel.kallsyms] [k] vunmap_page_range > 6.17% cat [kernel.kallsyms] [k] __slab_free > 5.61% cat [kernel.kallsyms] [k] kfree > 4.86% cat [kernel.kallsyms] [k] bad_range > 4.67% cat [kernel.kallsyms] [k] free_unref_page_commit > 4.24% cat [kernel.kallsyms] [k] __list_del_entry_valid > 3.68% cat [kernel.kallsyms] [k] free_unref_page > 3.65% cat [kernel.kallsyms] [k] __list_add_valid > 3.19% cat [kernel.kallsyms] [k] __purge_vmap_area_lazy > 3.10% cat [kernel.kallsyms] [k] find_vmap_area > 3.05% cat [kernel.kallsyms] [k] rcu_cblist_dequeue > > ... > > --- a/mm/vmalloc.c > +++ b/mm/vmalloc.c > @@ -2068,6 +2068,24 @@ struct vm_struct *find_vm_area(const void *addr) > return NULL; > } > > +static struct vm_struct *__remove_vm_area(struct vmap_area *va) > +{ > + struct vm_struct *vm = va->vm; > + > + might_sleep(); Where might __remove_vm_area() sleep? From a quick scan I'm only seeing vfree(), and that has the might_sleep_if(!in_interrupt()). So perhaps we can remove this... > + spin_lock(&vmap_area_lock); > + va->vm = NULL; > + va->flags &= ~VM_VM_AREA; > + va->flags |= VM_LAZY_FREE; > + spin_unlock(&vmap_area_lock); > + > + kasan_free_shadow(vm); > + free_unmap_vmap_area(va); > + > + return vm; > +} > +