Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp504681ybg; Mon, 1 Jun 2020 07:07:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwhGJX5zXSYNh22mEzA6xTK07DsN7pkfkh1USA3mrppnEFaVesgwaIazrbpcdLpb6Jb8lRP X-Received: by 2002:aa7:dc58:: with SMTP id g24mr2265591edu.136.1591020469743; Mon, 01 Jun 2020 07:07:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591020469; cv=none; d=google.com; s=arc-20160816; b=brJWE0cpRFkNE8dH6GgyBqb2GKFV7KksXkjdeJAVbsj0wHytTK5Wsjm9Lg+dCI+XRr u1S/0El6IO/wwtqlOFrDodVB7Yfd7FMNRgZq8veGbiDbaS3IJc8a/POwIj9k9Q0zACZM ShamTaho7MMNPnseWmJkSJCDi8U5OPP0MKm8kEXp8u7SHuTQT/jF7NIqorkkr9NZnatV NoPtPzMgSPYjAcPfXGkoJix7jA0v6DvN1k3dvlZGpMTL56MMGoQAg425y8AHBokr9SgW TX3H4NvrfmrHvCll1t94guR74znY3Ojyh81bHMTRvD8jO2/Fj7P2JVt9CzNu/mHnq7vS hyhw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=rjPOG8Z0wJMfWArVJ/ZN/tvqGGIe7c325xdGHqofvaU=; b=Tn71DiauWpha+G04BRhUvB7dDL7IElqS6IE1AcqD4euTxp80q62bQL8YmpM2eKn2x6 cdzYAfRE8vEikU2pHr2Lj5qer345K3gXWKaMb3C9oGAaHJEpVSgoHMFcTIKnCO9y+zqq Vy7nISTEvlOSqj/RVrume3fip/1h/rN09vPzPpy7g28visMbKFcLO+lGUn35Lx5nqGmL BlqI05/lL5VwzJdgpKBo6JCvW0Mbd54c+L2KPozv2a3jYqQhDhjfOqOyIGiEsrHntkO9 KK3Kl9V0H79GzrQ0Zi5s2infR+Jc+FzVPQt8mP+pp1RsPmYMQs++Hus+tkSu6lD+hnVf yViw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Ixd+zdga; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 8si12450730ejx.280.2020.06.01.07.07.26; Mon, 01 Jun 2020 07:07:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Ixd+zdga; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727056AbgFAOCu (ORCPT + 99 others); Mon, 1 Jun 2020 10:02:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56128 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726017AbgFAOCt (ORCPT ); Mon, 1 Jun 2020 10:02:49 -0400 Received: from mail-lj1-x242.google.com (mail-lj1-x242.google.com [IPv6:2a00:1450:4864:20::242]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2D628C05BD43 for ; Mon, 1 Jun 2020 07:02:49 -0700 (PDT) Received: by mail-lj1-x242.google.com with SMTP id s1so8292566ljo.0 for ; Mon, 01 Jun 2020 07:02:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to; bh=rjPOG8Z0wJMfWArVJ/ZN/tvqGGIe7c325xdGHqofvaU=; b=Ixd+zdgaqaIK206l7IRV/8M9XDAEVWiaW3KL8mSyqA9o5cvG/jeLKxxPTlw4oTPITO lxPf84U1FPDjy+I3Ja6eJ0fUCkNrDPlW1PXXG7jjMDLSX8y3NfmMlT+eZwhz7vDgspor N0BSfwhwosyxJd5QEAkKw1qhP3egsgazuTdLxMGe52bakHkm7ItVdxBUwyKs7Pc43hiK 3ZCKq30lxN+8/22zL/jRCtMdluWFJLlKUkhd3eVKk24rOXON8ZcPzgQ56IkTUDlpREU7 4Pk4fhmh7CiwkpB7w+sWivMJkc8+DgGBL31jI+5NXv0YP0QdvTgddYrQ4PTZKbwCYajE JIuQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=rjPOG8Z0wJMfWArVJ/ZN/tvqGGIe7c325xdGHqofvaU=; b=RZr3twF/lmwZs5jxA0Vd5YjTZsLU6V/+XIV+9l+5yZPCUNNZZl6DvJIgJToyTrJubW 8RrCJcbRX0G2bAt6KZpKXdxY9lFOCurS64d9wDlaDMu8uUiB027L6TiOw1wjY/CWaw0V Z3j4HYkYyxLFhtdo9JPx8cmjXlUuJ6R2CvjtcNsPOnOBD+oSsSoVgm0ehr2z3c4anxe4 Cs0SrxL5HYxIpJ58w+Po5VRHkXATG3uYK9m24V3+wNjMw10fDIxpORepYhzAW+HJcvqJ Kz1sQGiT/loJiUM4adc7x7O3wjmBcwqaSOv34pR9dZ2zQjLsA6ZW/6JwjOoXrZF7Z4xl kM0A== X-Gm-Message-State: AOAM530O76VPNKBsSzSrWjeoCvQO73cUnG16YpRP2cig1lhwbd8m3Dnk BNrQYz8JankrI6m86+p0A4c= X-Received: by 2002:a2e:9192:: with SMTP id f18mr1552319ljg.383.1591020167548; Mon, 01 Jun 2020 07:02:47 -0700 (PDT) Received: from a-barsegyan ([85.249.97.232]) by smtp.gmail.com with ESMTPSA id p15sm775835ljn.53.2020.06.01.07.02.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 01 Jun 2020 07:02:46 -0700 (PDT) Date: Mon, 1 Jun 2020 17:02:44 +0300 From: Artur Barsegyan To: Manfred Spraul Cc: skutepov@gmail.com, Andrew Morton , Lu Shuaibing , Nathan Chancellor , linux-kernel@vger.kernel.org Subject: Re: [PATCH] ipc/msg.c: wake up senders until there is a queue empty capacity Message-ID: <20200601140244.GA24678@a-barsegyan> References: <20200523203448.84235-1-a.barsegyan96@gmail.com> <0410a00b-fb20-cbaa-4a29-c7752a469fdd@colorfullife.com> <20200526075618.GA19866@a-barsegyan> <4c9cc53a-ad71-2716-ecd9-7df78948519e@colorfullife.com> <20200527112257.GC12093@a-barsegyan> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20200527112257.GC12093@a-barsegyan> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, Manfred. Did you get my last message? On Wed, May 27, 2020 at 02:22:57PM +0300, Artur Barsegyan wrote: > [sorry for the duplicates — I have changed my email client] > > About your case: > > The new receiver puts at the end of the receivers list. > pipelined_send() starts from the beginning of the list and iterates until the end. > > If our queue is always full, each receiver should get a message because new receivers appends at the end. > In my vision: we waste some time in that loop but in general should increase the throughout. But it should be tested. > > Yes, I'm gonna implement it and make a benchmark. But maybe it should be done in another patch thread? > > On Wed, May 27, 2020 at 08:03:17AM +0200, Manfred Spraul wrote: > > Hello Artur, > > > > On 5/26/20 9:56 AM, Artur Barsegyan wrote: > > > Hello, Manfred! > > > > > > Thank you, for your review. I've reviewed your patch. > > > > > > I forgot about the case with different message types. At now with your patch, > > > a sender will force message consuming if that doesn't hold own capacity. > > > > > > I have measured queue throughput and have pushed the results to: > > > https://github.com/artur-barsegyan/systemv_queue_research > > > > > > But I'm confused about the next thought: in general loop in the do_msgsnd() > > > function, we doesn't check pipeline sending availability. Your case will be > > > optimized if we check the pipeline sending inside the loop. > > > > I don't get your concern, or perhaps this is a feature that I had always > > assumed as "normal": > > > > "msg_fits_inqueue(msq, msgsz)" is in the loop, this ensures progress. > > > > The rational is a design decision: > > > > The check for pipeline sending is only done if there would be space to store > > the message in the queue. > > > > I was afraid that performing the pipeline send immediately, without checking > > queue availability, could break apps: > > > > Some messages would arrive immediately (if there is a waiting receiver), > > other messages are stuck forever (since the queue is full). > > > > Initial patch: https://lkml.org/lkml/1999/10/3/5 (without any remarks about > > the design decision) > > > > The risk that I had seen was theoretical, I do not have any real bug > > reports. So we could change it. > > > > Perhaps: Go in the same direction as it was done for POSIX mqueue: implement > > pipelined receive. > > > > > On Sun, May 24, 2020 at 03:21:31PM +0200, Manfred Spraul wrote: > > > > Hello Artur, > > > > > > > > On 5/23/20 10:34 PM, Artur Barsegyan wrote: > > > > > Take into account the total size of the already enqueued messages of > > > > > previously handled senders before another one. > > > > > > > > > > Otherwise, we have serious degradation of receiver throughput for > > > > > case with multiple senders because another sender wakes up, > > > > > checks the queue capacity and falls into sleep again. > > > > > > > > > > Each round-trip wastes CPU time a lot and leads to perceptible > > > > > throughput degradation. > > > > > > > > > > Source code of: > > > > > - sender/receiver > > > > > - benchmark script > > > > > - ready graphics of before/after results > > > > > > > > > > is located here: https://github.com/artur-barsegyan/systemv_queue_research > > > > Thanks for analyzing the issue! > > > > > > > > > Signed-off-by: Artur Barsegyan > > > > > --- > > > > > ipc/msg.c | 4 +++- > > > > > 1 file changed, 3 insertions(+), 1 deletion(-) > > > > > > > > > > diff --git a/ipc/msg.c b/ipc/msg.c > > > > > index caca67368cb5..52d634b0a65a 100644 > > > > > --- a/ipc/msg.c > > > > > +++ b/ipc/msg.c > > > > > @@ -214,6 +214,7 @@ static void ss_wakeup(struct msg_queue *msq, > > > > > struct msg_sender *mss, *t; > > > > > struct task_struct *stop_tsk = NULL; > > > > > struct list_head *h = &msq->q_senders; > > > > > + size_t msq_quota_used = 0; > > > > > list_for_each_entry_safe(mss, t, h, list) { > > > > > if (kill) > > > > > @@ -233,7 +234,7 @@ static void ss_wakeup(struct msg_queue *msq, > > > > > * move the sender to the tail on behalf of the > > > > > * blocked task. > > > > > */ > > > > > - else if (!msg_fits_inqueue(msq, mss->msgsz)) { > > > > > + else if (!msg_fits_inqueue(msq, msq_quota_used + mss->msgsz)) { > > > > > if (!stop_tsk) > > > > > stop_tsk = mss->tsk; > > > > > @@ -241,6 +242,7 @@ static void ss_wakeup(struct msg_queue *msq, > > > > > continue; > > > > > } > > > > > + msq_quota_used += mss->msgsz; > > > > > wake_q_add(wake_q, mss->tsk); > > > > You have missed the case of a do_msgsnd() that doesn't enqueue the message: > > > > > > > > Situation: > > > > > > > > - 2 messages of type 1 in the queue (2x8192 bytes, queue full) > > > > > > > > - 6 senders waiting to send messages of type 2 > > > > > > > > - 6 receivers waiting to get messages of type 2. > > > > > > > > If now a receiver reads one message of type 1, then all 6 senders can send. > > > > > > > > WIth your patch applied, only one sender sends the message to one receiver, > > > > and the remaining 10 tasks continue to sleep. > > > > > > > > > > > > Could you please check and (assuming that you agree) run your benchmarks > > > > with the patch applied? > > > > > > > > -- > > > > > > > >     Manfred > > > > > > > > > > > > > > > > From fe2f257b1950a19bf5c6f67e71aa25c2f13bcdc3 Mon Sep 17 00:00:00 2001 > > > > From: Manfred Spraul > > > > Date: Sun, 24 May 2020 14:47:31 +0200 > > > > Subject: [PATCH 2/2] ipc/msg.c: Handle case of senders not enqueuing the > > > > message > > > > > > > > The patch "ipc/msg.c: wake up senders until there is a queue empty > > > > capacity" avoids the thundering herd problem by wakeing up > > > > only as many potential senders as there is free space in the queue. > > > > > > > > This patch is a fix: If one of the senders doesn't enqueue its message, > > > > then a search for further potential senders must be performed. > > > > > > > > Signed-off-by: Manfred Spraul > > > > --- > > > > ipc/msg.c | 21 +++++++++++++++++++++ > > > > 1 file changed, 21 insertions(+) > > > > > > > > diff --git a/ipc/msg.c b/ipc/msg.c > > > > index 52d634b0a65a..f6d5188db38a 100644 > > > > --- a/ipc/msg.c > > > > +++ b/ipc/msg.c > > > > @@ -208,6 +208,12 @@ static inline void ss_del(struct msg_sender *mss) > > > > list_del(&mss->list); > > > > } > > > > +/* > > > > + * ss_wakeup() assumes that the stored senders will enqueue the pending message. > > > > + * Thus: If a woken up task doesn't send the enqueued message for whatever > > > > + * reason, then that task must call ss_wakeup() again, to ensure that no > > > > + * wakeup is lost. > > > > + */ > > > > static void ss_wakeup(struct msg_queue *msq, > > > > struct wake_q_head *wake_q, bool kill) > > > > { > > > > @@ -843,6 +849,7 @@ static long do_msgsnd(int msqid, long mtype, void __user *mtext, > > > > struct msg_queue *msq; > > > > struct msg_msg *msg; > > > > int err; > > > > + bool need_wakeup; > > > > struct ipc_namespace *ns; > > > > DEFINE_WAKE_Q(wake_q); > > > > @@ -869,6 +876,7 @@ static long do_msgsnd(int msqid, long mtype, void __user *mtext, > > > > ipc_lock_object(&msq->q_perm); > > > > + need_wakeup = false; > > > > for (;;) { > > > > struct msg_sender s; > > > > @@ -898,6 +906,13 @@ static long do_msgsnd(int msqid, long mtype, void __user *mtext, > > > > /* enqueue the sender and prepare to block */ > > > > ss_add(msq, &s, msgsz); > > > > + /* Enqueuing a sender is actually an obligation: > > > > + * The sender must either enqueue the message, or call > > > > + * ss_wakeup(). Thus track that we have added our message > > > > + * to the candidates for the message queue. > > > > + */ > > > > + need_wakeup = true; > > > > + > > > > if (!ipc_rcu_getref(&msq->q_perm)) { > > > > err = -EIDRM; > > > > goto out_unlock0; > > > > @@ -935,12 +950,18 @@ static long do_msgsnd(int msqid, long mtype, void __user *mtext, > > > > msq->q_qnum++; > > > > atomic_add(msgsz, &ns->msg_bytes); > > > > atomic_inc(&ns->msg_hdrs); > > > > + > > > > + /* we have fulfilled our obligation, no need for wakeup */ > > > > + need_wakeup = false; > > > > } > > > > err = 0; > > > > msg = NULL; > > > > out_unlock0: > > > > + if (need_wakeup) > > > > + ss_wakeup(msq, &wake_q, false); > > > > + > > > > ipc_unlock_object(&msq->q_perm); > > > > wake_up_q(&wake_q); > > > > out_unlock1: > > > > -- > > > > 2.26.2 > > > > > >