Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp399275rdg; Tue, 10 Oct 2023 13:46:48 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFJO2yLScYXqWXjfkAVVvMK76jmY6ikgE5fQsQk6Lsjf9byovgbx/9+NMkhRltuRa4dAWhA X-Received: by 2002:a17:90a:9c0f:b0:274:914f:7fcc with SMTP id h15-20020a17090a9c0f00b00274914f7fccmr18596994pjp.1.1696970807660; Tue, 10 Oct 2023 13:46:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696970807; cv=none; d=google.com; s=arc-20160816; b=CqtGzjV7zN7OKN2w9H3lSI8JK817etJgz/uGTIdms8SGDzn61nFKo/ykj5z5+M7Q4R uhGX90jUuSf7CYIMMxfoDAafzLuHRwdjwAEHuXjKW2x7E9j5xSBHkDvHpjRFz5iq3Nsk pJoer2aI6Bxh2za8ICoutqlK2oInf2u7JG3eZ6EWMdYCea3+UoxHWEW4D3Ihwht6RrGU HZTTQ3b5KvBBvLkZESbnwCGxQy1/va9n4bNjy3qFcpB8sRnSFyLnzskR+WKyKUfzjOri b6N6GZEB845dwiAsjsXDYbE74qPNesgmagfF1dKhtgpzCC5nbtrELM9mEtNppMCRxbpd 0tvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=zVLiaUpK8j9SVqP3cJBkx4qz/lYpuaR+XH3Am5P8yyY=; fh=FliBBm5o+YgmQVfOIrBzy/uWPpKZJLxbs5bNc203T7I=; b=VQZJFG5wCrndHegPTh6QQZxG3iMxOlJE1svuBWbEINziIXidobyUM5IKmowGn77GvB PQDNOVpIDCrod6/UeBblytYpVKRIfu0/NtoClKua+kbN9cxXnZuS5o3JtFisb1skXOfu Q518yrt7Nw/flMee3R8zuMkhTP0WnQa4QaEBmiHjfWchPIX7+/7WqzpXpIWnPqqSY/G6 aPVs6d/ffYOPdEJqz+/1BEDMxgf89G6IohO545jm5RUdTmbtRG9GKRghv6Bxong8gD0O ZlnyBBwd6jMsit+r4KEszn3K0scexcABpNkp2fvRvivUNU7TCzUow26L9yO5pxZnVLMp 0O2w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=kYIwpyp4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id l9-20020a170903244900b001c77a0c5a61si13405430pls.551.2023.10.10.13.46.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 13:46:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=kYIwpyp4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 2299F8090EB7; Tue, 10 Oct 2023 13:46:05 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343989AbjJJUpo (ORCPT + 99 others); Tue, 10 Oct 2023 16:45:44 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41014 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231825AbjJJUpl (ORCPT ); Tue, 10 Oct 2023 16:45:41 -0400 Received: from mail-pl1-x62f.google.com (mail-pl1-x62f.google.com [IPv6:2607:f8b0:4864:20::62f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2F5CDC9 for ; Tue, 10 Oct 2023 13:45:39 -0700 (PDT) Received: by mail-pl1-x62f.google.com with SMTP id d9443c01a7336-1c6193d6bb4so55745ad.0 for ; Tue, 10 Oct 2023 13:45:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1696970738; x=1697575538; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=zVLiaUpK8j9SVqP3cJBkx4qz/lYpuaR+XH3Am5P8yyY=; b=kYIwpyp4jdHfGrGBkXrV9MqBB/xPLf1FeC8FapT0Yze7jFZPhGH2A+F0+4vocYXKSh nQPf9r7PYQvRP3ZwRvcufCgYbociTedFN6w0jRRiu5QS/OH8WV2oNe3Kqb7CciM1NoKH /j9+C4yx37bk8sdSS6+JZGt7MP2rVuJCaYqv1RlEu7MYTncrJ4nHGX6LjhmkIUfYKgYg UBdLwoqqNEbCcWwJVT2aQHbnwhRNjyXi5/hbxuKfPAr1Zc9r0gPEWV9KWXsymx2aBunS /cMa6B3QkhGi4uicDaroUGp4bXVa1IJ79zcXKN+R0HI92zSijie9hX1h2VOVykGm2At+ ZEZQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696970738; x=1697575538; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=zVLiaUpK8j9SVqP3cJBkx4qz/lYpuaR+XH3Am5P8yyY=; b=BTsyIf7O1aqERnGy3ywlW+vunNbZAiOIq2hfU8BEHtImmvah8BzutjBXUPgP64Aa4p Qg9STKzEIhfwXtWLAuhuitpbp32E9JCY98CNxZAlO7E2xQ6Z0wD9wQMs/62kYwY8yb2X Z/PooZsxv9f04r/fXgU1kHJtEtoaaYUW//FioIhHbIbe1fT/iM8XZll4yMTx8O7deG5n B58cNCBlXRmdngUZdbSubt6PMNwCgsGSokAjH3XpxMKpm/WDViI0D6zL960hudOv5jm7 nwK2+D+U+gRY2g0Nk61bDUhDlK58i6udFkAnIjcRV+19F2D+MJ3ZhCsbnTF700CyFdJF 9faA== X-Gm-Message-State: AOJu0Yx+DYrYUKIjnU6oG5/UBH9lsGuS42d3mnVfoCcpm0GcJ+21+Zfp P8XQVuF0AErb8NlJ9Kl4fG4wQWxFFxdtgAq0sDhUlg== X-Received: by 2002:a17:902:f94b:b0:1c3:5df4:a778 with SMTP id kx11-20020a170902f94b00b001c35df4a778mr20935plb.13.1696970738334; Tue, 10 Oct 2023 13:45:38 -0700 (PDT) MIME-Version: 1.0 References: <20231010032117.1577496-1-yosryahmed@google.com> <20231010032117.1577496-4-yosryahmed@google.com> In-Reply-To: <20231010032117.1577496-4-yosryahmed@google.com> From: Shakeel Butt Date: Tue, 10 Oct 2023 13:45:26 -0700 Message-ID: Subject: Re: [PATCH v2 3/5] mm: memcg: make stats flushing threshold per-memcg To: Yosry Ahmed Cc: Andrew Morton , Johannes Weiner , Michal Hocko , Roman Gushchin , Muchun Song , Ivan Babrou , Tejun Heo , =?UTF-8?Q?Michal_Koutn=C3=BD?= , Waiman Long , kernel-team@cloudflare.com, Wei Xu , Greg Thelen , linux-mm@kvack.org, cgroups@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-4.8 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Tue, 10 Oct 2023 13:46:05 -0700 (PDT) On Mon, Oct 9, 2023 at 8:21=E2=80=AFPM Yosry Ahmed = wrote: > > A global counter for the magnitude of memcg stats update is maintained > on the memcg side to avoid invoking rstat flushes when the pending > updates are not significant. This avoids unnecessary flushes, which are > not very cheap even if there isn't a lot of stats to flush. It also > avoids unnecessary lock contention on the underlying global rstat lock. > > Make this threshold per-memcg. The scheme is followed where percpu (now > also per-memcg) counters are incremented in the update path, and only > propagated to per-memcg atomics when they exceed a certain threshold. > > This provides two benefits: > (a) On large machines with a lot of memcgs, the global threshold can be > reached relatively fast, so guarding the underlying lock becomes less > effective. Making the threshold per-memcg avoids this. > > (b) Having a global threshold makes it hard to do subtree flushes, as we > cannot reset the global counter except for a full flush. Per-memcg > counters removes this as a blocker from doing subtree flushes, which > helps avoid unnecessary work when the stats of a small subtree are > needed. > > Nothing is free, of course. This comes at a cost: > (a) A new per-cpu counter per memcg, consuming NR_CPUS * NR_MEMCGS * 4 > bytes. The extra memory usage is insigificant. > > (b) More work on the update side, although in the common case it will > only be percpu counter updates. The amount of work scales with the > number of ancestors (i.e. tree depth). This is not a new concept, adding > a cgroup to the rstat tree involves a parent loop, so is charging. > Testing results below show no significant regressions. > > (c) The error margin in the stats for the system as a whole increases > from NR_CPUS * MEMCG_CHARGE_BATCH to NR_CPUS * MEMCG_CHARGE_BATCH * > NR_MEMCGS. This is probably fine because we have a similar per-memcg > error in charges coming from percpu stocks, and we have a periodic > flusher that makes sure we always flush all the stats every 2s anyway. > > This patch was tested to make sure no significant regressions are > introduced on the update path as follows. The following benchmarks were > ran in a cgroup that is 4 levels deep (/sys/fs/cgroup/a/b/c/d), which is > deeper than a usual setup: > > (a) neper [1] with 1000 flows and 100 threads (single machine). The > values in the table are the average of server and client throughputs in > mbps after 30 iterations, each running for 30s: > > tcp_rr tcp_stream > Base 9504218.56 357366.84 > Patched 9656205.68 356978.39 > Delta +1.6% -0.1% > Standard Deviation 0.95% 1.03% > > An increase in the performance of tcp_rr doesn't really make sense, but > it's probably in the noise. The same tests were ran with 1 flow and 1 > thread but the throughput was too noisy to make any conclusions (the > averages did not show regressions nonetheless). > > Looking at perf for one iteration of the above test, __mod_memcg_state() > (which is where memcg_rstat_updated() is called) does not show up at all > without this patch, but it shows up with this patch as 1.06% for tcp_rr > and 0.36% for tcp_stream. > > (b) "stress-ng --vm 0 -t 1m --times --perf". I don't understand > stress-ng very well, so I am not sure that's the best way to test this, > but it spawns 384 workers and spits a lot of metrics which looks nice :) > I picked a few ones that seem to be relevant to the stats update path. I > also included cache misses as this patch introduce more atomics that may > bounce between cpu caches: > > Metric Base Patched Delta > Cache Misses 3.394 B/sec 3.433 B/sec +1.14% > Cache L1D Read 0.148 T/sec 0.154 T/sec +4.05% > Cache L1D Read Miss 20.430 B/sec 21.820 B/sec +6.8% > Page Faults Total 4.304 M/sec 4.535 M/sec +5.4% > Page Faults Minor 4.304 M/sec 4.535 M/sec +5.4% > Page Faults Major 18.794 /sec 0.000 /sec > Kmalloc 0.153 M/sec 0.152 M/sec -0.65% > Kfree 0.152 M/sec 0.153 M/sec +0.65% > MM Page Alloc 4.640 M/sec 4.898 M/sec +5.56% > MM Page Free 4.639 M/sec 4.897 M/sec +5.56% > Lock Contention Begin 0.362 M/sec 0.479 M/sec +32.32% > Lock Contention End 0.362 M/sec 0.479 M/sec +32.32% > page-cache add 238.057 /sec 0.000 /sec > page-cache del 6.265 /sec 6.267 /sec -0.03% > > This is only using a single run in each case. I am not sure what to > make out of most of these numbers, but they mostly seem in the noise > (some better, some worse). The lock contention numbers are interesting. > I am not sure if higher is better or worse here. No new locks or lock > sections are introduced by this patch either way. > > Looking at perf, __mod_memcg_state() shows up as 0.00% with and without > this patch. This is suspicious, but I verified while stress-ng is > running that all the threads are in the right cgroup. > > (3) will-it-scale page_fault tests. These tests (specifically > per_process_ops in page_fault3 test) detected a 25.9% regression before > for a change in the stats update path [2]. These are the > numbers from 30 runs (+ is good): > > LABEL | MEAN | MEDIAN | STDDEV | > ------------------------------+-------------+-------------+------------- > page_fault1_per_process_ops | | | | > (A) base | 265207.738 | 262941.000 | 12112.379 | > (B) patched | 249249.191 | 248781.000 | 8767.457 | > | -6.02% | -5.39% | | > page_fault1_per_thread_ops | | | | > (A) base | 241618.484 | 240209.000 | 10162.207 | > (B) patched | 229820.671 | 229108.000 | 7506.582 | > | -4.88% | -4.62% | | > page_fault1_scalability | | | > (A) base | 0.03545 | 0.035705 | 0.0015837 | > (B) patched | 0.029952 | 0.029957 | 0.0013551 | > | -9.29% | -9.35% | | This much regression is not acceptable. In addition, I ran netperf with the same 4 level hierarchy as you have run and I am seeing ~11% regression. More specifically on a machine with 44 CPUs (HT disabled ixion machine): # for server $ netserver -6 # 22 instances of netperf clients $ netperf -6 -H ::1 -l 60 -t TCP_SENDFILE -- -m 10K (averaged over 4 runs) base (next-20231009): 33081 MBPS patched: 29267 MBPS So, this series is not acceptable unless this regression is resolved.