Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp1106688ybp; Fri, 4 Oct 2019 09:35:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqzgntfaaxTnfpbgZ4Kv8xFqjxzQ9aBGN8Diq/QDaJuP0ATu4uo+DWGUlardXkAcrMt2+T4Y X-Received: by 2002:a17:906:5644:: with SMTP id v4mr13177892ejr.52.1570206908901; Fri, 04 Oct 2019 09:35:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570206908; cv=none; d=google.com; s=arc-20160816; b=C7fy+MWsLJi67mM1qbVDpds2k3da4iZGokVbnB2tQ4SkYOqbX1vq2kZO7UVSA0/I3g a92sKm8KiOHbigFfttoBsivB6ub6nTKkvHLafZhh8z9dQ46jwd7jP6p91EWvE0na5Ae4 X/cTL4IebKhXYJDM9fXXRNuOkfmLcBSH1YLvnvavYj839cqd+gQKFPE9I6fVLyXWGG58 pu2me2SAatZPfV7I+HoCxd9txv3XOjdfioUFwHRqnzrWJL8lv9L2kgmUshKGsnHwgven 1lmvKLep7EYW2PA2JoZSa0oKz1jQim3qgbdLNs+LvA+zTSugniJoiuc1fKBXcHhNygiX 1s6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=ukwWMT0M4WMAhyW+DY5+USKRuUhjpcCz/2GXBQpfOoE=; b=HS47tYUc1VjGt+wJRLeCzIf0D5WG8hxPvdxHEW2pZzZJWhLFdtCo8QLWYhI2BQXMFf ip0hDTRvLzT+8UBgAn5kOEQucsjAEsCVAwWPYs4vOF5nqzHn2DLLnIhgWXgeInMVsZC7 Gy61ovEgOlLytvIvmIifX2EmX+kaGKd/FT1azlFLQ2HpmRi5+0OVHfeh6OhtxH1dHNsp s8rmBoMVq9MjRGitJPprFnowUZAIAChVrgwlQcC5tR2mJS/dVhpZvOr1o9/gKc5inqmv cKf5H1clHHr0vEnctW2aZS9pLYPJMpkEPl5BZDkVD2HEcZrdo09YbSygKL6KRsUtyBGI fukQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@yandex-team.ru header.s=default header.b=T6SmeEEZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.ru Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w2si3936720edc.386.2019.10.04.09.34.45; Fri, 04 Oct 2019 09:35:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@yandex-team.ru header.s=default header.b=T6SmeEEZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.ru Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728878AbfJDQd6 (ORCPT + 99 others); Fri, 4 Oct 2019 12:33:58 -0400 Received: from forwardcorp1o.mail.yandex.net ([95.108.205.193]:60052 "EHLO forwardcorp1o.mail.yandex.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727587AbfJDQd6 (ORCPT ); Fri, 4 Oct 2019 12:33:58 -0400 Received: from mxbackcorp2j.mail.yandex.net (mxbackcorp2j.mail.yandex.net [IPv6:2a02:6b8:0:1619::119]) by forwardcorp1o.mail.yandex.net (Yandex) with ESMTP id 85C542E1569; Fri, 4 Oct 2019 19:33:54 +0300 (MSK) Received: from iva8-b53eb3f76dc7.qloud-c.yandex.net (iva8-b53eb3f76dc7.qloud-c.yandex.net [2a02:6b8:c0c:2ca1:0:640:b53e:b3f7]) by mxbackcorp2j.mail.yandex.net (nwsmtp/Yandex) with ESMTP id nWp6vumrBQ-XrN0IFUp; Fri, 04 Oct 2019 19:33:54 +0300 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex-team.ru; s=default; t=1570206834; bh=ukwWMT0M4WMAhyW+DY5+USKRuUhjpcCz/2GXBQpfOoE=; h=In-Reply-To:Message-ID:From:Date:References:To:Subject:Cc; b=T6SmeEEZp7N1X45t5VIybaCbKEBKRlCiNIj75gWi/hZJ9yt6CDzywcqjWB0ivHe4x pAvHEh7usqgYZ2+RrvAwlAS3aud304u+rKM1p3XNeqfFIuWrIfSxMVVHaMiUgf7mCp jlpg7l+eYLLIP7AQ6RWS4BkFX13/Vvnw1CXxZSBs= Authentication-Results: mxbackcorp2j.mail.yandex.net; dkim=pass header.i=@yandex-team.ru Received: from unknown (unknown [2a02:6b8:b080:8808::1:a]) by iva8-b53eb3f76dc7.qloud-c.yandex.net (nwsmtp/Yandex) with ESMTPSA id PRCoHVn9Jm-XrH877W3; Fri, 04 Oct 2019 19:33:53 +0300 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client certificate not present) Subject: Re: [PATCH] mm/rmap.c: reuse mergeable anon_vma as parent when fork To: Wei Yang , akpm@linux-foundation.org, kirill.shutemov@linux.intel.com, jglisse@redhat.com, mike.kravetz@oracle.com, riel@surriel.com Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org References: <20191004160632.30251-1-richardw.yang@linux.intel.com> From: Konstantin Khlebnikov Message-ID: Date: Fri, 4 Oct 2019 19:33:53 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20191004160632.30251-1-richardw.yang@linux.intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-CA Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/10/2019 19.06, Wei Yang wrote: > In function __anon_vma_prepare(), we will try to find anon_vma if it is > possible to reuse it. While on fork, the logic is different. > > Since commit 5beb49305251 ("mm: change anon_vma linking to fix > multi-process server scalability issue"), function anon_vma_clone() > tries to allocate new anon_vma for child process. But the logic here > will allocate a new anon_vma for each vma, even in parent this vma > is mergeable and share the same anon_vma with its sibling. This may do > better for scalability issue, while it is not necessary to do so > especially after interval tree is used. > > Commit 7a3ef208e662 ("mm: prevent endless growth of anon_vma hierarchy") > tries to reuse some anon_vma by counting child anon_vma and attached > vmas. While for those mergeable anon_vmas, we can just reuse it and not > necessary to go through the logic. > > After this change, kernel build test reduces 20% anon_vma allocation. > Makes sense. This might have much bigger effect for scenarios when task unmaps holes in huge vma as red-zones between allocations and then forks. Acked-by: Konstantin Khlebnikov > Signed-off-by: Wei Yang > --- > mm/rmap.c | 11 +++++++++++ > 1 file changed, 11 insertions(+) > > diff --git a/mm/rmap.c b/mm/rmap.c > index d9a23bb773bf..12f6c3d7fd9d 100644 > --- a/mm/rmap.c > +++ b/mm/rmap.c > @@ -262,6 +262,17 @@ int anon_vma_clone(struct vm_area_struct *dst, struct vm_area_struct *src) > { > struct anon_vma_chain *avc, *pavc; > struct anon_vma *root = NULL; > + struct vm_area_struct *prev = dst->vm_prev, *pprev = src->vm_prev; > + > + /* > + * If parent share anon_vma with its vm_prev, keep this sharing in in > + * child. > + * > + * 1. Parent has vm_prev, which implies we have vm_prev. > + * 2. Parent and its vm_prev have the same anon_vma. > + */ > + if (pprev && pprev->anon_vma == src->anon_vma) > + dst->anon_vma = prev->anon_vma; > > list_for_each_entry_reverse(pavc, &src->anon_vma_chain, same_vma) { > struct anon_vma *anon_vma; >