Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp1261846rwl; Fri, 24 Mar 2023 08:15:15 -0700 (PDT) X-Google-Smtp-Source: AKy350bGMH78CNIP1ICJ2pDp2rsKZq6c8pDyzwVjIU/mfhHcXWB41McN3iP2uSHlGLU+lV/iMKeR X-Received: by 2002:a17:903:1390:b0:19c:d7a9:8be1 with SMTP id jx16-20020a170903139000b0019cd7a98be1mr2597533plb.61.1679670915299; Fri, 24 Mar 2023 08:15:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679670915; cv=none; d=google.com; s=arc-20160816; b=YG6uHVzRExL7dInvBJdhOv+qaZoa97Yt97WMRKlaRfwl0CGsKk+278HeJyi+qlDpQ4 MrVsghuNNHUtn9Ee3kv2HM0VmVdChH48/xlovZg4n1Fc/nvfhuEk7pJ7P5Wm/0Oey6Wd JdTQ+BpFLtsFDmG9FcNxIFUW/t38a7dn1RZQEJBOupRpPdL6lxeDqiYLGKXK0jcGNWTs UU5kjRy+YBu2cZ5RFdW8DhTRggIRXiUmKZSr76RzJU2T48Yn015kMPMHGmlJYIn5DNNk 3mRb6lNhqbtB5bMBn9p6r2ljmvFskJqB3L8UFOxnP97xchCmzQwE0T898OK0Q2Yyj25G MtxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=c9VYuHHYkjeYQP4B8l8g3Kph6l5aAo+aMshO918WiTI=; b=i/sB90u7Z82KMjQ1vGeg7K1ubXbDkId6AAFzn9YB9ccF20BMvfK556Lx1kP69zl3rJ 6uS/+v1N/qGUVkIDFPlhbnWZcIXD53nVGfhjd7KFyg5rOrpGczvM9MzY2Z2IaHEiJLcM vF3nE7TaLxSGHi91kyJw7GHR1Cr+Vd4IxjUekQ36OvQAJTj1VgiIrt6fzKfOYm6KBc86 UzPrR32+Z95O+O7FMw+5VBdMPYe1pmhYpiae+eXb4nclXnwk2V2O2o8OS3kVPpMvdtyG Mg5VA2UyQO7V+0QhKpYkn5uw3o19t1wNDlasLT7yZrYa7U/n1Ti5qOWvjg7H6+bA/yOO KeFA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=Ku7kRlRu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a7-20020a631a47000000b004f2200cade5si21281078pgm.359.2023.03.24.08.15.02; Fri, 24 Mar 2023 08:15:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=Ku7kRlRu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232358AbjCXPMP (ORCPT + 99 others); Fri, 24 Mar 2023 11:12:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60142 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232123AbjCXPMM (ORCPT ); Fri, 24 Mar 2023 11:12:12 -0400 Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6D71E1A97B; Fri, 24 Mar 2023 08:11:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding: Content-Type:In-Reply-To:From:References:Cc:To:Subject:MIME-Version:Date: Message-ID:Sender:Reply-To:Content-ID:Content-Description; bh=c9VYuHHYkjeYQP4B8l8g3Kph6l5aAo+aMshO918WiTI=; b=Ku7kRlRuzoyAjjEPIdZ8JYg22/ JEj+wPVOoFI0NCgR17Rfqu3XZKX31HdhfJp19iBoik7O4NaMNxnD6ORolCVAHH7zdwc0iVGth5uqH naFQaNsrnVFkqjYaNjckl+6KJKcy2SM7wobL+uJVrpE+2FflkzH0V6UFpNpX7/q1av3ulbsTPRXwD q/bv+vWvSJ0L+chlr5gRLUaupTdKPRJQuypbDn8TZRiU/xJIkzy7T81GgykG8z1lKBTza7v/z/NXv D68LnjhsifrSiZhA1+6tOK4Uc714I6iUva1uYQmANm/+K1dK8HiMdsJhmnMOiN8LOXm1yiDJBVloL mLcXQK9g==; Received: from [2601:1c2:980:9ec0::21b4] by bombadil.infradead.org with esmtpsa (Exim 4.96 #2 (Red Hat Linux)) id 1pfj56-004lC2-0c; Fri, 24 Mar 2023 15:11:52 +0000 Message-ID: Date: Fri, 24 Mar 2023 08:09:26 -0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.8.0 Subject: Re: [PATCH v1] Documentation: Add document for false sharing Content-Language: en-US To: Feng Tang , Jonathan Corbet , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Arnaldo Carvalho de Melo , Joe Mario , Ingo Molnar , Peter Zijlstra , Linus Torvalds , Andrew Morton , Eric Dumazet , Shakeel Butt , dave.hansen@intel.com, ying.huang@intel.com, tim.c.chen@intel.com, andi.kleen@intel.com References: <20230324071316.167337-1-feng.tang@intel.com> From: Randy Dunlap In-Reply-To: <20230324071316.167337-1-feng.tang@intel.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.5 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 3/24/23 00:13, Feng Tang wrote: > When doing performance tuning or debugging performance regressions, > more and more cases are found to be related to false sharing [1][2], > and the situation can be worse for newer platforms with hundreds of > CPUs. There are already many commits in current kernel specially > for mitigating the performance degradation due to false sharing. > > False sharing could harm the performance silently without being > noticed, due to reasons like: > * data members of a big data structure randomly sitting together > in one cache line > * global data of small size are linked compactly together > > So it's better to make a simple document about the normal pattern > of false sharing, basic ways to mitigate it and call out to > developers to pay attention during code-writing. > > [ Many thanks to Dave Hansen, Ying Huang, Tim Chen, Julie Du and > Yu Chen for their contributions ] > > [1]. https://lore.kernel.org/lkml/20220619150456.GB34471@xsang-OptiPlex-9020/ > [2]. https://lore.kernel.org/lkml/20201102091543.GM31092@shao2-debian/ > > Signed-off-by: Feng Tang Reviewed-by: Randy Dunlap Thanks. > --- > Changelog: > > since RFC: > * Reword paragraphs with grammar issues; fixes many format and > typo issues (Randy Dunlap) > > .../kernel-hacking/false-sharing.rst | 201 ++++++++++++++++++ > Documentation/kernel-hacking/index.rst | 1 + > 2 files changed, 202 insertions(+) > create mode 100644 Documentation/kernel-hacking/false-sharing.rst > > diff --git a/Documentation/kernel-hacking/false-sharing.rst b/Documentation/kernel-hacking/false-sharing.rst > new file mode 100644 > index 000000000000..c67745e8da3d > --- /dev/null > +++ b/Documentation/kernel-hacking/false-sharing.rst > @@ -0,0 +1,201 @@ > +.. SPDX-License-Identifier: GPL-2.0 > + > +============= > +False Sharing > +============= > + > +What is False Sharing > +===================== > +False sharing is related with cache mechanism of maintaining the data > +coherence of one cache line stored in multiple CPU's caches; then > +academic definition for it is in [1]_. Consider a struct with a > +refcount and a string:: > + > + struct foo { > + refcount_t refcount; > + ... > + char name[16]; > + } ____cacheline_internodealigned_in_smp; > + > +Member 'refcount'(A) and 'name'(B) _share_ one cache line like below:: > + > + +-----------+ +-----------+ > + | CPU 0 | | CPU 1 | > + +-----------+ +-----------+ > + / | > + / | > + V V > + +----------------------+ +----------------------+ > + | A B | Cache 0 | A B | Cache 1 > + +----------------------+ +----------------------+ > + | | > + ---------------------------+------------------+----------------------------- > + | | > + +----------------------+ > + | | > + +----------------------+ > + Main Memory | A B | > + +----------------------+ > + > +'refcount' is modified frequently, but 'name' is set once at object > +creation time and is never modified. When many CPUs access 'foo' at > +the same time, with 'refcount' being only bumped by one CPU frequently > +and 'name' being read by other CPUs, all those reading CPUs have to > +reload the whole cache line over and over due to the 'sharing', even > +though 'name' is never changed. > + > +There are many real-world cases of performance regressions caused by > +false sharing, and one is a rw_semaphore 'mmap_lock' inside struct > +mm_struct, whose cache line layout change triggered a regression > +and Linus analyzed in [2]_. > + > +There are two key factors for a harmful false sharing: > + > +* A global datum accessed (shared) by many CPUs > +* In the concurrent accesses to the data, there is at least one write > + operation: write/write or write/read cases. > + > +The sharing could be from totally unrelated kernel components, or > +different code paths of the same kernel component. > + > + > +False Sharing Pitfalls > +====================== > +Back in time when one platform had only one or a few CPUs, hot data > +members could be purposely put in the same cache line to make them > +cache hot and save cacheline/TLB, like a lock and the data protected > +by it. But for recent large system with hundreds of CPUs, this may > +not work when the lock is heavily contended, as the lock owner CPU > +could write to the data, while other CPUs are busy spinning the lock. > + > +Looking at past cases, there are several frequently occurring patterns > +for false sharing: > + > +* lock (spinlock/mutex/semaphore) and data protected by it are > + purposely put in one cache line. > +* global data being put together in one cache line. Some kernel > + subsystems have many global parameters of small size (4 bytes), > + which can easily be grouped together and put into one cache line. > +* data members of a big data structure randomly sitting together > + without being noticed (cache line is usually 64 bytes or more), > + like struct 'mem_cgroup'. > + > +Following 'mitigation' section provides real-world examples. > + > +False sharing could easily happen unless they are intentionally > +checked, and it is valuable to run specific tools for performance > +critical workloads to detect false sharing affecting performance case > +and optimize accordingly. > + > + > +How to detect and analysis False Sharing > +======================================== > +perf record/report/stat are widely used for performance tuning, and > +once hotspots are detected, tools like 'perf-c2c' and 'pahole' can > +be further used to detect and pinpoint the possible false sharing > +data structures. 'addr2line' is also good at decoding instruction > +pointer when there are multiple layers of inline functions. > + > +perf-c2c can capture the cache lines with most false sharing hits, > +decoded functions (line number of file) accessing that cache line, > +and in-line offset of the data. Simple commands are:: > + > + #perf c2c record -ag sleep 3 > + #perf c2c report --call-graph none -k vmlinux > + > +Run it when testing will-it-scale's tlb_flush1 case, and the report > +has pieces like:: > + > + Total records : 1658231 > + Locked Load/Store Operations : 89439 > + Load Operations : 623219 > + Load Local HITM : 92117 > + Load Remote HITM : 139 > + > + #---------------------------------------------------------------------- > + 4 0 2374 0 0 0 0xff1100088366d880 > + #---------------------------------------------------------------------- > + 0.00% 42.29% 0.00% 0.00% 0.00% 0x8 1 1 0xffffffff81373b7b 0 231 129 5312 64 [k] __mod_lruvec_page_state [kernel.vmlinux] memcontrol.h:752 1 > + 0.00% 13.10% 0.00% 0.00% 0.00% 0x8 1 1 0xffffffff81374718 0 226 97 3551 64 [k] folio_lruvec_lock_irqsave [kernel.vmlinux] memcontrol.h:752 1 > + 0.00% 11.20% 0.00% 0.00% 0.00% 0x8 1 1 0xffffffff812c29bf 0 170 136 555 64 [k] lru_add_fn [kernel.vmlinux] mm_inline.h:41 1 > + 0.00% 7.62% 0.00% 0.00% 0.00% 0x8 1 1 0xffffffff812c3ec5 0 175 108 632 64 [k] release_pages [kernel.vmlinux] mm_inline.h:41 1 > + 0.00% 23.29% 0.00% 0.00% 0.00% 0x10 1 1 0xffffffff81372d0a 0 234 279 1051 64 [k] __mod_memcg_lruvec_state [kernel.vmlinux] memcontrol.c:736 1 > + > +A nice introduction for perf-c2c is [3]_. > + > +'pahole' decodes data structure layouts delimited in cache line > +granularity. Users can match the offset in perf-c2c output with > +pahole's decoding to locate the exact data members. For global > +data, users can search the data address in System.map. > + > + > +Possible Mitigations > +==================== > +False sharing does not always need to be mitigated. False sharing > +mitigations need to balance performance gains with complexity and > +space consumption. Sometimes, lower performance is OK, and it's > +unnecessary to hyper-optimize every rarely used data structure or > +a cold data path. > + > +False sharing hurting performance cases are seen more frequently with > +core count increasing, and there have been many patches merged to > +solve it, like in networking and memory management subsystems. Some > +common mitigations (with examples) are: > + > +* Separate hot global data in its own dedicated cache line, even if it > + is just a 'short' type. The downside is more consumption of memory, > + cache line and TLB entries. > + > + Commit 91b6d3256356 ("net: cache align tcp_memory_allocated, tcp_sockets_allocated") > + > +* Reorganize the data structure, separate the interfering members to > + different cache lines. One downside is it may introduce new false > + sharing of other members. > + > + Commit 802f1d522d5f ("mm: page_counter: re-layout structure to reduce false sharing") > + > +* Replace 'write' with 'read' when possible, especially in loops. > + Like for some global variable, use compare(read)-then-write instead > + of unconditional write. For example, use: > + > + if (!test_bit(XXX)) > + set_bit(XXX); > + > + instead of directly "set_bit(XXX);", similarly for atomic_t data. > + > + Commit 7b1002f7cfe5 ("bcache: fixup bcache_dev_sectors_dirty_add() multithreaded CPU false sharing") > + Commit 292648ac5cf1 ("mm: gup: allow FOLL_PIN to scale in SMP") > + > +* Turn hot global data to 'per-cpu data + global data' when possible, > + or reasonably increase the threshold for syncing per-cpu data to > + global data, to reduce or postpone the 'write' to that global data. > + > + Commit 520f897a3554 ("ext4: use percpu_counters for extent_status cache hits/misses") > + Commit 56f3547bfa4d ("mm: adjust vm_committed_as_batch according to vm overcommit policy") > + > +Surely, all mitigations should be carefully verified to not cause side > +effects. And to avoid false sharing in advance during coding, it's > +better to: > + > +* Be aware of cache line boundaries > +* Group mostly read-only fields together > +* Group things that are written at the same time together > +* Separate known read-mostly and written-mostly fields > + > +and better add a comment stating the false sharing consideration. > + > +One note is, sometimes even after a severe false sharing is detected > +and solved, the performance may still has no obvious improvement as > +the hotspot switches to a new place. > + > + > +Miscellaneous > +============= > +One open issue is that kernel has an optional data structure > +randomization mechanism, which also randomizes the situation of cache > +line sharing of data members. > + > + > +.. [1] https://en.wikipedia.org/wiki/False_sharing > +.. [2] https://lore.kernel.org/lkml/CAHk-=whoqV=cX5VC80mmR9rr+Z+yQ6fiQZm36Fb-izsanHg23w@mail.gmail.com/ > +.. [3] https://joemario.github.io/blog/2016/09/01/c2c-blog/ > diff --git a/Documentation/kernel-hacking/index.rst b/Documentation/kernel-hacking/index.rst > index f53027652290..79c03bac99a2 100644 > --- a/Documentation/kernel-hacking/index.rst > +++ b/Documentation/kernel-hacking/index.rst > @@ -9,3 +9,4 @@ Kernel Hacking Guides > > hacking > locking > + false-sharing -- ~Randy