Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp1519789rwb; Thu, 19 Jan 2023 11:43:52 -0800 (PST) X-Google-Smtp-Source: AMrXdXvEdrYvf3UgRzUwN+V7BDBybIzFDR+Vgcoy6bOJVwb+uhdvLR/V9zgWLWmJFjOC8r1nmBDs X-Received: by 2002:a17:902:e5cd:b0:192:4ed2:7509 with SMTP id u13-20020a170902e5cd00b001924ed27509mr17043236plf.15.1674157432330; Thu, 19 Jan 2023 11:43:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674157432; cv=none; d=google.com; s=arc-20160816; b=KJa1M42stXZCJjpUNwsJc0DA10ey5Q5aDhRjwq5HF1jl5fuxim9zAzKnQoAQ6TV/6f dlOFOGHkt7tPzlGAUr8sWgMd/kvEaYooKNZPR70m4pTCZnFNMJ6jWwmw8DoLdmT2lIpn bbXXc6Dp35hozsWo4TWeqOGVWwqE8SC3mrblsw8pMX24y0zGKLc3nOlFujfPN4N427fD 1RmYTlh0zaoa2n2C7lT0Em/vBgEnY6IHDA8OX3sR3ucRE6gu6DrQOw2VqddbORPZiyPu ivFBqCH7uTJ8ZlyUSp472u6j2/fIoX4dbzFmeKvrg9KhOGjFXKvg8J6oQmAfqAAlAmjS pUqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=ToHyrSNIoPykkmHjpmy+AXA0uDswLz8tCL1AkqWK5E4=; b=uliNz55Uvuc9A+Z8QYp5bB3MAc4o059UVFRHaDc/pV0I/fGMh5Kz/0BLHQwadlrVep V86aHHDCuTL8E8Lg85VxcFlphzzRzhouX+sWLgAM8ChARzJ7UXRlNm3tuGVxQ+2GdfQz 49ZgcsZT5mXp2EyspLFLUxnKaWl3uveORBGvCQ+AQ8roW4PjUnygOTE0gnVSIhDO/b7O 4ZsnDBBH+wphczsVkodaBKkECXgXr9XVZlBxRBY4q1vNEpp7tgzAZh74k3kXqj5sJDHJ Kw9fPoKbn04fQAMvGuv8c6Zvt4tbwP222cGpgxCkqlgHJX9nP/I/arOj59RbO2FRDJ05 KkEQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=mo0ihRCw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 131-20020a630089000000b0047865b303a5si1912831pga.762.2023.01.19.11.43.39; Thu, 19 Jan 2023 11:43:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=mo0ihRCw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229769AbjASSwW (ORCPT + 45 others); Thu, 19 Jan 2023 13:52:22 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36688 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229818AbjASSwT (ORCPT ); Thu, 19 Jan 2023 13:52:19 -0500 Received: from mail-yb1-xb30.google.com (mail-yb1-xb30.google.com [IPv6:2607:f8b0:4864:20::b30]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1B5A194315 for ; Thu, 19 Jan 2023 10:52:16 -0800 (PST) Received: by mail-yb1-xb30.google.com with SMTP id 203so3738150yby.10 for ; Thu, 19 Jan 2023 10:52:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=ToHyrSNIoPykkmHjpmy+AXA0uDswLz8tCL1AkqWK5E4=; b=mo0ihRCw6Y3aWSIWf6n6XXsp3Czez4pmBoLn4xxcvfC7MIJwMGncIVEoR+KlAAsFdZ X+KL3ImyMm7CDvgKDNaitAKtQYJmfDiQS5wzretGPDK1Mi1wi1p+dYAlWVDWQ7EB8COm 73VnlegayZ9CXqL1k0bgORj7azfFIJkz0+xJkhEfX5/5LxFj6WaWcB6V5foMDa3ZSoca mTUKfpVRCQYGi2+eL0D4ZMiEMZnLqo9cHtAvJNd2hYyr8+pslpkuYm69SorYbX73aFGZ KE1jn5AwD+MqZBLCrvWROTxITII/UL5w0qzHVSzaDoEabOI+otr/5WNJbNSN6S8nkrsZ TpOg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=ToHyrSNIoPykkmHjpmy+AXA0uDswLz8tCL1AkqWK5E4=; b=P76m3i8UdGv5Y+lvwbRBxVY4fd+VRcDUafDaYsJw5vxe3rmRSYT/C5luPApcP29+kL txuYrd0IS1fHjQe1RHmnr41OTPNjW8yxMYtpnPECHFTJi8qXWsWEVLU4NbsXt5vgLUuO nO7YP2NAkpLRfOWytSi7n+QCK0t1+ux/e9BPNjFT1Uzd+8L6h/bAXwnYhO3ZkFH3c05h jwbGvGdYtqtGfQmSdxC3RSM4ONZ+Xe5A0b5oKVjrFMS58sCvktL9LpHmeLSBtJd4xc9Q pAV+pig60FiqaZHZkY4repA2UAmZnhQXWjdd3YGgM4gDA0c8T0Um+NJ1r3MtnwBNggsm SbZw== X-Gm-Message-State: AFqh2kqk2d1MfVF59Drv+RMSMtukefW7XnSF4/ATHKlh9IydjMsuk2zT tkBetExS11i/La2wpEh1hW+P//iAdVfYTvW8TFC2lQ== X-Received: by 2002:a25:9801:0:b0:7d5:b884:3617 with SMTP id a1-20020a259801000000b007d5b8843617mr1116250ybo.380.1674154334935; Thu, 19 Jan 2023 10:52:14 -0800 (PST) MIME-Version: 1.0 References: <20230109205336.3665937-1-surenb@google.com> <20230109205336.3665937-40-surenb@google.com> In-Reply-To: From: Suren Baghdasaryan Date: Thu, 19 Jan 2023 10:52:03 -0800 Message-ID: Subject: Re: [PATCH 39/41] kernel/fork: throttle call_rcu() calls in vm_area_free To: Michal Hocko Cc: akpm@linux-foundation.org, michel@lespinasse.org, jglisse@google.com, vbabka@suse.cz, hannes@cmpxchg.org, mgorman@techsingularity.net, dave@stgolabs.net, willy@infradead.org, liam.howlett@oracle.com, peterz@infradead.org, ldufour@linux.ibm.com, laurent.dufour@fr.ibm.com, paulmck@kernel.org, luto@kernel.org, songliubraving@fb.com, peterx@redhat.com, david@redhat.com, dhowells@redhat.com, hughd@google.com, bigeasy@linutronix.de, kent.overstreet@linux.dev, punit.agrawal@bytedance.com, lstoakes@gmail.com, peterjung1337@gmail.com, rientjes@google.com, axelrasmussen@google.com, joelaf@google.com, minchan@google.com, jannh@google.com, shakeelb@google.com, tatashin@google.com, edumazet@google.com, gthelen@google.com, gurua@google.com, arjunroy@google.com, soheil@google.com, hughlynch@google.com, leewalsh@google.com, posk@google.com, linux-mm@kvack.org, linux-arm-kernel@lists.infradead.org, linuxppc-dev@lists.ozlabs.org, x86@kernel.org, linux-kernel@vger.kernel.org, kernel-team@android.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 19, 2023 at 4:59 AM Michal Hocko wrote: > > On Mon 09-01-23 12:53:34, Suren Baghdasaryan wrote: > > call_rcu() can take a long time when callback offloading is enabled. > > Its use in the vm_area_free can cause regressions in the exit path when > > multiple VMAs are being freed. To minimize that impact, place VMAs into > > a list and free them in groups using one call_rcu() call per group. > > After some more clarification I can understand how call_rcu might not be > super happy about thousands of callbacks to be invoked and I do agree > that this is not really optimal. > > On the other hand I do not like this solution much either. > VM_AREA_FREE_LIST_MAX is arbitrary and it won't really help all that > much with processes with a huge number of vmas either. It would still be > in housands of callbacks to be scheduled without a good reason. > > Instead, are there any other cases than remove_vma that need this > batching? We could easily just link all the vmas into linked list and > use a single call_rcu instead, no? This would both simplify the > implementation, remove the scaling issue as well and we do not have to > argue whether VM_AREA_FREE_LIST_MAX should be epsilon or epsilon + 1. Yes, I agree the solution is not stellar. I wanted something simple but this is probably too simple. OTOH keeping all dead vm_area_structs on the list without hooking up a shrinker (additional complexity) does not sound too appealing either. WDYT about time domain throttling to limit draining the list to say once per second like this: void vm_area_free(struct vm_area_struct *vma) { struct mm_struct *mm = vma->vm_mm; bool drain; free_anon_vma_name(vma); spin_lock(&mm->vma_free_list.lock); list_add(&vma->vm_free_list, &mm->vma_free_list.head); mm->vma_free_list.size++; - drain = mm->vma_free_list.size > VM_AREA_FREE_LIST_MAX; + drain = jiffies > mm->last_drain_tm + HZ; spin_unlock(&mm->vma_free_list.lock); - if (drain) + if (drain) { drain_free_vmas(mm); + mm->last_drain_tm = jiffies; + } } Ultimately we want to prevent very frequent call_rcu() calls, so throttling in the time domain seems appropriate. That's the simplest way I can think of to address your concern about a quick spike in VMA freeing. It does not place any restriction on the list size and we might have excessive dead vm_area_structs if after a large spike there are no vm_area_free() calls but I don't know if that's a real problem, so not sure we should be addressing it at this time. WDYT? > > -- > Michal Hocko > SUSE Labs