Received: by 2002:a05:7412:f589:b0:e2:908c:2ebd with SMTP id eh9csp270452rdb; Tue, 31 Oct 2023 07:09:16 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEB4JJg7We0uNjPeaOe2mnOrlvnOqDhv/2msr6BoOWnMbaXUkaiTxL4/gTNg83X/ndrGBrZ X-Received: by 2002:a05:6a20:3951:b0:15a:836:7239 with SMTP id r17-20020a056a20395100b0015a08367239mr11094243pzg.11.1698761355879; Tue, 31 Oct 2023 07:09:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698761355; cv=none; d=google.com; s=arc-20160816; b=mt+iC/bqvIRXnboMv9up3BomL7hntmwjQB7+jk4t0PY4M4j4s4u+272gIGkp4j15wu Em4vVZSbAZQKXT+qb20FFRFaUUXVoJVhywaRhcgKueM2V/k+dArrLTPJoIVr0elQQCN4 t5Z2K0VSMOTFgJcNkzmeoycN0JaXvCj1NqYBWa4ydlz3C7i7r8vwaC2JxLbzjhvxRNMv BqEmrwkoA2OecSJfBsWf+Wvgph9IDvuQ+EQrz/YiHIOVcUZpSBDmvuJAM4Cc34hgNIVz 5eIohZhQDMu+Y14ZvTSSk0GCdwPd8TzgeDRS99o5hghDBf9ADTcR6r2gv8Cw86/MJBED WrSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=vdLIZ4HQ998mSidy99GBLdIh30G2cHpNbjGYcZ/M/84=; fh=1GJaSiew/4nhYvae+yJYXPcARWi0PNZhXd1mB5ASXRg=; b=CvJUMa6e6A/aD/nfpzC16j5uWu03QFLcjEfde6ZF1fu+ewBfw4D/VBDI+lCycvgUVI X/7hks9iyY/dz56Zw49lWag3aQ64p7E/EOZBJTQL6ylBabgMiHVVSdkzDid/6iEBXT6d pZG75Gt9dU48DnViEU1WBm7uVrvpsk6y71zau4RymyG6FuJq+bi96a/4jPmAq53sGdCi 2u1GfPSaEswBeT5ikhoH99VGG+Td/z4DRNRdZaBvos8IN2kDZLiUuNuAbOgz/pSqKCIC 3H+VTn4nPqm57ty1dShLc/b4Z6IyQcLlDxawFngU8NTQ8gWAUrFT5uE6NRNJtYFeMSFB IK+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=p+5YJNbM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id y191-20020a638ac8000000b005b3d703ca05si760728pgd.780.2023.10.31.07.09.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 31 Oct 2023 07:09:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=p+5YJNbM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 3427D802B114; Tue, 31 Oct 2023 07:09:11 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229889AbjJaOJD (ORCPT + 99 others); Tue, 31 Oct 2023 10:09:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49562 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229518AbjJaOJC (ORCPT ); Tue, 31 Oct 2023 10:09:02 -0400 Received: from out-186.mta1.migadu.com (out-186.mta1.migadu.com [95.215.58.186]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F0AF6C1 for ; Tue, 31 Oct 2023 07:08:59 -0700 (PDT) X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1698761338; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=vdLIZ4HQ998mSidy99GBLdIh30G2cHpNbjGYcZ/M/84=; b=p+5YJNbM7e/sK1WxMNjw8pKd/1/3/bovhNq+XaMIz4UveYORIbck2aiUG0YXcuvA2XLaS/ tzYIGfCQY1h9jgoNsST3gAMMrUgN0F9wyxtg+u7h6lEjqTOkL/zWbIuywgdmE8mlPWZ11g xnirByVbnC7o+g6WllDelNK24JkGeNo= From: chengming.zhou@linux.dev To: vbabka@suse.cz, cl@linux.com, penberg@kernel.org, willy@infradead.org Cc: rientjes@google.com, iamjoonsoo.kim@lge.com, akpm@linux-foundation.org, roman.gushchin@linux.dev, 42.hyeyoo@gmail.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, chengming.zhou@linux.dev, Chengming Zhou Subject: [RFC PATCH v4 0/9] slub: Delay freezing of CPU partial slabs Date: Tue, 31 Oct 2023 14:07:32 +0000 Message-Id: <20231031140741.79387-1-chengming.zhou@linux.dev> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Tue, 31 Oct 2023 07:09:11 -0700 (PDT) From: Chengming Zhou Changes in RFC v4: - Reorder patches to put the two cleanup patches to the front. - Move slab_node_partial flag functions to mm/slub.c. - Fix freeze_slab() by using slab_update_freelist(). - Fix build error when !CONFIG_SLUB_CPU_PARTIAL. - Add a patch to rename all *unfreeze_partials* functions. - Add a patch to update inconsistent documentations in the source. - Some comments and changelog improvements. - Add Reviewed-by and Suggested-by tags. Many thanks! - RFC v3: https://lore.kernel.org/all/20231024093345.3676493-1-chengming.zhou@linux.dev/ Changes in RFC v3: - Directly use __set_bit() and __clear_bit() for the slab_node_partial flag operations to avoid exporting non-atomic "workingset" interfaces. - Change get_partial() related functions to return a slab instead of returning the freelist or single object. - Don't freeze any slab under the node list_lock to further reduce list_lock holding times, as suggested by Vlastimil Babka. - Introduce freeze_slab() to do the delay freezing and return freelist. - Reorder patches. - RFC v2: https://lore.kernel.org/all/20231021144317.3400916-1-chengming.zhou@linux.dev/ Changes in RFC v2: - Reuse PG_workingset bit to keep track of whether slub is on the per-node partial list, as suggested by Matthew Wilcox. - Fix OOM problem on kernel without CONFIG_SLUB_CPU_PARTIAL, which is caused by leak of partial slabs when get_partial_node(). - Add a patch to simplify acquire_slab(). - Reorder patches a little. - RFC v1: https://lore.kernel.org/all/20231017154439.3036608-1-chengming.zhou@linux.dev/ 1. Problem ========== Now we have to freeze the slab when get from the node partial list, and unfreeze the slab when put to the node partial list. Because we need to rely on the node list_lock to synchronize the "frozen" bit changes. This implementation has some drawbacks: - Alloc path: twice cmpxchg_double. It has to get some partial slabs from node when the allocator has used up the CPU partial slabs. So it freeze the slab (one cmpxchg_double) with node list_lock held, put those frozen slabs on its CPU partial list. Later ___slab_alloc() will cmpxchg_double try-loop again if that slab is picked to use. - Alloc path: amplified contention on node list_lock. Since we have to synchronize the "frozen" bit changes under the node list_lock, the contention of slab (struct page) can be transferred to the node list_lock. On machine with many CPUs in one node, the contention of list_lock will be amplified by all CPUs' alloc path. The current code has to workaround this problem by avoiding using cmpxchg_double try-loop, which will just break and return when contention of page encountered and the first cmpxchg_double failed. But this workaround has its own problem. For more context, see 9b1ea29bc0d7 ("Revert "mm, slub: consider rest of partial list if acquire_slab() fails""). - Free path: redundant unfreeze. __slab_free() will freeze and cache some slabs on its partial list, and flush them to the node partial list when exceed, which has to unfreeze those slabs again under the node list_lock. Actually we don't need to freeze slab on CPU partial list, in which case we can save the unfreeze cmpxchg_double operations in flush path. 2. Solution =========== We solve these problems by leaving slabs unfrozen when moving out of the node partial list and on CPU partial list, so "frozen" bit is 0. These partial slabs won't be manipulate concurrently by alloc path, the only racer is free path, which may manipulate its list when !inuse. So we need to introduce another synchronization way to avoid it, we reuse PG_workingset to keep track of whether the slab is on node partial list or not, only in that case we can manipulate the slab list. The slab will be delay frozen when it's picked to actively use by the CPU, it becomes full at the same time, in which case we still need to rely on "frozen" bit to avoid manipulating its list. So the slab will be frozen only when activate use and be unfrozen only when deactivate. 3. Testing ========== We just did some simple testing on a server with 128 CPUs (2 nodes) to compare performance for now. - perf bench sched messaging -g 5 -t -l 100000 baseline RFC 7.042s 6.966s 7.022s 7.045s 7.054s 6.985s - stress-ng --rawpkt 128 --rawpkt-ops 100000000 baseline RFC 2.42s 2.15s 2.45s 2.16s 2.44s 2.17s It shows above there is about 10% improvement on stress-ng rawpkt testcase, although no much improvement on perf sched bench testcase. Thanks for any comment and code review! Chengming Zhou (9): slub: Reflow ___slab_alloc() slub: Change get_partial() interfaces to return slab slub: Keep track of whether slub is on the per-node partial list slub: Prepare __slab_free() for unfrozen partial slab out of node partial list slub: Introduce freeze_slab() slub: Delay freezing of partial slabs slub: Optimize deactivate_slab() slub: Rename all *unfreeze_partials* functions to *put_partials* slub: Update frozen slabs documentations in the source mm/slub.c | 381 ++++++++++++++++++++++++++---------------------------- 1 file changed, 180 insertions(+), 201 deletions(-) -- 2.20.1