Received: by 2002:a05:6358:5282:b0:b5:90e7:25cb with SMTP id g2csp2671348rwa; Mon, 22 Aug 2022 11:29:10 -0700 (PDT) X-Google-Smtp-Source: AA6agR5GbLF2rlDX+e34m7xMlzEw3mjJBxcRyKZxMzLXCbm/xVaTTZB9JcsoAW9BE81GRDSAhh35 X-Received: by 2002:a17:90a:9a9:b0:1f6:a38b:e0bc with SMTP id 38-20020a17090a09a900b001f6a38be0bcmr24674284pjo.212.1661192949995; Mon, 22 Aug 2022 11:29:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661192949; cv=none; d=google.com; s=arc-20160816; b=e8O0nONQDjfXti6+ihszyCsdHa0Z5nNvmX7cbhnv4EUrLWY3qumtTMr7wT1YYnY2cg 868E4QRR6YLl2jJSAJBujQfe8sp2a84UfjEBbblfbOT09g+L+vmX8z5IC94M5ZKYpy/W WZjeaij9IykYyX/hJkqUdvgfc8uU3sXtR65iEZ+5g7YUAkAU7oc17rX1OpuWmJUkFIl8 35+EeW48LO9Grv6cmUUtKBdSxQV7k5Qv7v43NEA9ACATRc3IkAQavn9KA/XKgTxVOAsE zJPGXPJ6bDyf5lBIjevjgObnNDkBK1LP+7DOJrYB7M5ubic4X8m5CA5QfjqLV+I4UmXQ PydQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:dkim-signature:date; bh=bQzUYJbzeSJVtDIpGsHXApQTdq+ArDiyBUiXh9dJl9c=; b=ozTClxGLvjlhieRfyyBePHj1rJjWSHepx6JhIyulZbgW3DPw+wuyacEtPq2kh7MMjp etDgEc7qNVbqt7rWyZhS+o25g5SWFtJhkMbhyXkkW2huhEGEj+LEIuKcFTfw7QATzvmj WNjnJiWoMQVHGCTR979Qc96sP5d6RonMzlAxgLVfhnlPeGanyAHGdplp71HwHmZFgMoy CNJVV/hJz4lSkXaU2N4E+t0GGCB73+lPLMNCra5BoqpBo4RuiFDgOXAsxxRPMJzmYg6g uTCe3Ilr6mgpefjQVQhZ81CjGe+Ph7oe1CDs4OfTdeZ10Hz8wwL2keQAZHF8gQ82w96O wXDg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=ko5CwHMh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x5-20020a1709028ec500b0017086b1c40dsi12960143plo.400.2022.08.22.11.28.58; Mon, 22 Aug 2022 11:29:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=ko5CwHMh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236755AbiHVSYO (ORCPT + 99 others); Mon, 22 Aug 2022 14:24:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48926 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237425AbiHVSYI (ORCPT ); Mon, 22 Aug 2022 14:24:08 -0400 Received: from out2.migadu.com (out2.migadu.com [IPv6:2001:41d0:2:aacc::]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5EA141A81F; Mon, 22 Aug 2022 11:24:03 -0700 (PDT) Date: Mon, 22 Aug 2022 11:23:56 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1661192642; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=bQzUYJbzeSJVtDIpGsHXApQTdq+ArDiyBUiXh9dJl9c=; b=ko5CwHMhDHobyMV2JTCqgpMz2+52hcGSQVRXn7bUUUSzOzmxP9AFk+/mRkwC+S5zY6MqdX F2q4LAhYZbvIHrC86yIgvLfaWvRCGsb0n0M91E3H2sYMBQDtjW1gtraZ1MHGzTdRTZPXQf PJRtOi3CP/lPjq5dDiL0j6nSDxN5b2s= X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Roman Gushchin To: Shakeel Butt Cc: Johannes Weiner , Michal Hocko , Muchun Song , Michal =?iso-8859-1?Q?Koutn=FD?= , Eric Dumazet , Soheil Hassas Yeganeh , Feng Tang , Oliver Sang , Andrew Morton , lkp@lists.01.org, cgroups@vger.kernel.org, linux-mm@kvack.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 1/3] mm: page_counter: remove unneeded atomic ops for low/min Message-ID: References: <20220822001737.4120417-1-shakeelb@google.com> <20220822001737.4120417-2-shakeelb@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220822001737.4120417-2-shakeelb@google.com> X-Migadu-Flow: FLOW_OUT X-Migadu-Auth-User: linux.dev X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_HELO_PASS, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Aug 22, 2022 at 12:17:35AM +0000, Shakeel Butt wrote: > For cgroups using low or min protections, the function > propagate_protected_usage() was doing an atomic xchg() operation > irrespectively. It only needs to do that operation if the new value of > protection is different from older one. This patch does that. > > To evaluate the impact of this optimization, on a 72 CPUs machine, we > ran the following workload in a three level of cgroup hierarchy with top > level having min and low setup appropriately. More specifically > memory.min equal to size of netperf binary and memory.low double of > that. > > $ netserver -6 > # 36 instances of netperf with following params > $ netperf -6 -H ::1 -l 60 -t TCP_SENDFILE -- -m 10K > > Results (average throughput of netperf): > Without (6.0-rc1) 10482.7 Mbps > With patch 14542.5 Mbps (38.7% improvement) > > With the patch, the throughput improved by 38.7% Nice savings! > > Signed-off-by: Shakeel Butt > Reported-by: kernel test robot > --- > mm/page_counter.c | 13 ++++++------- > 1 file changed, 6 insertions(+), 7 deletions(-) > > diff --git a/mm/page_counter.c b/mm/page_counter.c > index eb156ff5d603..47711aa28161 100644 > --- a/mm/page_counter.c > +++ b/mm/page_counter.c > @@ -17,24 +17,23 @@ static void propagate_protected_usage(struct page_counter *c, > unsigned long usage) > { > unsigned long protected, old_protected; > - unsigned long low, min; > long delta; > > if (!c->parent) > return; > > - min = READ_ONCE(c->min); > - if (min || atomic_long_read(&c->min_usage)) { > - protected = min(usage, min); > + protected = min(usage, READ_ONCE(c->min)); > + old_protected = atomic_long_read(&c->min_usage); > + if (protected != old_protected) { > old_protected = atomic_long_xchg(&c->min_usage, protected); > delta = protected - old_protected; > if (delta) > atomic_long_add(delta, &c->parent->children_min_usage); What if there is a concurrent update of c->min_usage? Then the patched version can miss an update. I can't imagine a case when it will lead to bad consequences, so probably it's ok. But not super obvious. I think the way to think of it is that a missed update will be fixed by the next one, so it's ok to run some time with old numbers. Acked-by: Roman Gushchin Thanks!