Received: by 2002:a05:7412:8521:b0:e2:908c:2ebd with SMTP id t33csp2401722rdf; Mon, 6 Nov 2023 13:07:37 -0800 (PST) X-Google-Smtp-Source: AGHT+IGmLNLynDwh9G1K0m6q9SS8Zq3FY0Ymtgan1kMUX8naleHWPj+OcZSHL7JrAY5XaS1WhNBY X-Received: by 2002:a05:6a20:3c91:b0:17a:f4b6:bf89 with SMTP id b17-20020a056a203c9100b0017af4b6bf89mr774794pzj.31.1699304857580; Mon, 06 Nov 2023 13:07:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1699304857; cv=none; d=google.com; s=arc-20160816; b=QW6zCETn2fzzg8bFgrGt7P9y8OscaQbqMwzfV9QPWpztrR2PSdMG9i5yZDxju55Py5 dILuMGxMeG0RlYECg/b+PoMmBfc5TdT3hdyKWN/LhumoQiU/+CiHJ6M8PGSBTdzhxLpg XH46/3QnDOr9DNTyOsQKGlTFx616XzEQoX4y/kSLEb+o1hYbK2L0k3W1B+ywHJsqJSx7 VOPduYpMFF7mLvmRPA7PlOnTkmqNpeilEQjgKdQ9KWmxtkpUoYpYYaXcXFOul3DxgJiZ QJkVZmqxzefV0d7UyxOw2bDVBusU2WXRk+vHOU7wtDxRj2SL6HaXW2Qp05iNHRKQ8h7E E6hg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=6PNx4HIo8NY4HGuw4fzO7hUfJjjWL+b6X4lShZX05nE=; fh=vy39GFVfO6UaqrntP4AkYjitNZbWGjYvUyBXYh7mu0A=; b=JurNpO8E9DVbDmzzprGACdMs3TP1gSm8XHISUcbSM9K1rfcmc7XX4VkQw9LvJdASsw XOzv89Xl5G4ZF8XsuCJVVI220gy1S7ay8E1I/Cn+H4G/46BK8mD6+x+HWnfQpfz0LFGG oBSE5CaqKARZ61PDKSiZOXXM0xjHaksXcH8iwNbpwX4vHLTk6cmzKEz0U4rZCHmFyg0j 8Bh0BLgei0e/A8ifrb8WnInVp2dhYFwjeYFmfSxJ4yEq3WKzamsSU3wYOOF8OroXPJoI KRkFkpk0eeLug5UedynHE9KJHsWbFVYVnDPrKkeO5m3UtwWYJ3kPRSeUZOmpsUwRcVSt SyUg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=X7PC8f3i; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id bq9-20020a056a02044900b005b98cb7b465si593024pgb.637.2023.11.06.13.07.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 06 Nov 2023 13:07:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=X7PC8f3i; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id DA0548031129; Mon, 6 Nov 2023 13:07:34 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233099AbjKFVHI (ORCPT + 99 others); Mon, 6 Nov 2023 16:07:08 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56952 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233080AbjKFVHC (ORCPT ); Mon, 6 Nov 2023 16:07:02 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DA979D75 for ; Mon, 6 Nov 2023 13:06:13 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1699304773; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=6PNx4HIo8NY4HGuw4fzO7hUfJjjWL+b6X4lShZX05nE=; b=X7PC8f3i7xVCp1S5uRpvWm9+h16nJpF6lZCsYLmTl+PXDdVy48TocaBBOItis9LYiV3oGU I/E1nkmxZ9ags/Fcfppex9KDE/9xV41rKXmE3WUh4nNTjgcnl1ljJB8ONzLlWA8ThsuZFR ow3L+y6VAW0bxMZmG8NlxuYkZRBQKr4= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-57-v292ar40M1mwxl98adFakw-1; Mon, 06 Nov 2023 16:06:09 -0500 X-MC-Unique: v292ar40M1mwxl98adFakw-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com [10.11.54.8]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 37C90895694; Mon, 6 Nov 2023 21:06:09 +0000 (UTC) Received: from llong.com (unknown [10.22.17.168]) by smtp.corp.redhat.com (Postfix) with ESMTP id BE165C12911; Mon, 6 Nov 2023 21:06:08 +0000 (UTC) From: Waiman Long To: Tejun Heo , Zefan Li , Johannes Weiner Cc: cgroups@vger.kernel.org, linux-kernel@vger.kernel.org, Joe Mario , Sebastian Jug , Yosry Ahmed , Waiman Long Subject: [PATCH v4 2/3] cgroup/rstat: Optimize cgroup_rstat_updated_list() Date: Mon, 6 Nov 2023 16:05:42 -0500 Message-Id: <20231106210543.717486-3-longman@redhat.com> In-Reply-To: <20231106210543.717486-1-longman@redhat.com> References: <20231106210543.717486-1-longman@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.8 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Mon, 06 Nov 2023 13:07:35 -0800 (PST) The current design of cgroup_rstat_cpu_pop_updated() is to traverse the updated tree in a way to pop out the leaf nodes first before their parents. This can cause traversal of multiple nodes before a leaf node can be found and popped out. IOW, a given node in the tree can be visited multiple times before the whole operation is done. So it is not very efficient and the code can be hard to read. With the introduction of cgroup_rstat_updated_list() to build a list of cgroups to be flushed first before any flushing operation is being done, we can optimize the way the updated tree nodes are being popped by pushing the parents first to the tail end of the list before their children. In this way, most updated tree nodes will be visited only once with the exception of the subtree root as we still need to go back to its parent and popped it out of its updated_children list. This also makes the code easier to read. A parallel kernel build on a 2-socket x86-64 server is used as the benchmarking tool for measuring the lock hold time. Below were the lock hold time frequency distribution before and after the patch: Hold time Before patch After patch --------- ------------ ----------- 0-01 us 13,738,708 14,594,545 01-05 us 1,177,194 439,926 05-10 us 4,984 5,960 10-15 us 3,562 3,543 15-20 us 1,314 1,397 20-25 us 18 25 25-30 us 12 12 It can be seen that the patch pushes the lock hold time towards the lower end. Signed-off-by: Waiman Long --- kernel/cgroup/rstat.c | 134 +++++++++++++++++++++++------------------- 1 file changed, 72 insertions(+), 62 deletions(-) diff --git a/kernel/cgroup/rstat.c b/kernel/cgroup/rstat.c index 1f300bf4dc40..701388fa215f 100644 --- a/kernel/cgroup/rstat.c +++ b/kernel/cgroup/rstat.c @@ -74,64 +74,92 @@ __bpf_kfunc void cgroup_rstat_updated(struct cgroup *cgrp, int cpu) } /** - * cgroup_rstat_cpu_pop_updated - iterate and dismantle rstat_cpu updated tree - * @pos: current position - * @root: root of the tree to traversal + * cgroup_rstat_push_children - push children cgroups into the given list + * @head: current head of the list (= parent cgroup) + * @prstatc: cgroup_rstat_cpu of the parent cgroup * @cpu: target cpu + * Return: A new singly linked list of cgroups to be flush * - * Walks the updated rstat_cpu tree on @cpu from @root. %NULL @pos starts - * the traversal and %NULL return indicates the end. During traversal, - * each returned cgroup is unlinked from the tree. Must be called with the - * matching cgroup_rstat_cpu_lock held. + * Recursively traverse down the cgroup_rstat_cpu updated tree and push + * parent first before its children into a singly linked list built from + * the tail backward like "pushing" cgroups into a stack. The parent is + * pushed by the caller. The recursion depth is the depth of the current + * updated subtree. + */ +static struct cgroup *cgroup_rstat_push_children(struct cgroup *head, + struct cgroup_rstat_cpu *prstatc, int cpu) +{ + struct cgroup *child, *parent; + struct cgroup_rstat_cpu *crstatc; + + parent = head; + child = prstatc->updated_children; + prstatc->updated_children = parent; + + /* updated_next is parent cgroup terminated */ + while (child != parent) { + child->rstat_flush_next = head; + head = child; + crstatc = cgroup_rstat_cpu(child, cpu); + if (crstatc->updated_children != child) + head = cgroup_rstat_push_children(head, crstatc, cpu); + child = crstatc->updated_next; + crstatc->updated_next = NULL; + } + return head; +} + +/** + * cgroup_rstat_updated_list - return a list of updated cgroups to be flushed + * @root: root of the cgroup subtree to traverse + * @cpu: target cpu + * Return: A singly linked list of cgroups to be flushed + * + * Walks the updated rstat_cpu tree on @cpu from @root. During traversal, + * each returned cgroup is unlinked from the updated tree. * * The only ordering guarantee is that, for a parent and a child pair - * covered by a given traversal, if a child is visited, its parent is - * guaranteed to be visited afterwards. + * covered by a given traversal, the child is before its parent in + * the list. + * + * Note that updated_children is self terminated and points to a list of + * child cgroups if not empty. Whereas updated_next is like a sibling link + * within the children list and terminated by the parent cgroup. An exception + * here is the cgroup root whose updated_next can be self terminated. */ -static struct cgroup *cgroup_rstat_cpu_pop_updated(struct cgroup *pos, - struct cgroup *root, int cpu) +static struct cgroup *cgroup_rstat_updated_list(struct cgroup *root, int cpu) { - struct cgroup_rstat_cpu *rstatc; - struct cgroup *parent; - - if (pos == root) - return NULL; + raw_spinlock_t *cpu_lock = per_cpu_ptr(&cgroup_rstat_cpu_lock, cpu); + struct cgroup_rstat_cpu *rstatc = cgroup_rstat_cpu(root, cpu); + struct cgroup *head = NULL, *parent; + unsigned long flags; /* - * We're gonna walk down to the first leaf and visit/remove it. We - * can pick whatever unvisited node as the starting point. + * The _irqsave() is needed because cgroup_rstat_lock is + * spinlock_t which is a sleeping lock on PREEMPT_RT. Acquiring + * this lock with the _irq() suffix only disables interrupts on + * a non-PREEMPT_RT kernel. The raw_spinlock_t below disables + * interrupts on both configurations. The _irqsave() ensures + * that interrupts are always disabled and later restored. */ - if (!pos) { - pos = root; - /* return NULL if this subtree is not on-list */ - if (!cgroup_rstat_cpu(pos, cpu)->updated_next) - return NULL; - } else { - pos = cgroup_parent(pos); - } + raw_spin_lock_irqsave(cpu_lock, flags); - /* walk down to the first leaf */ - while (true) { - rstatc = cgroup_rstat_cpu(pos, cpu); - if (rstatc->updated_children == pos) - break; - pos = rstatc->updated_children; - } + /* Return NULL if this subtree is not on-list */ + if (!rstatc->updated_next) + goto unlock_ret; /* - * Unlink @pos from the tree. As the updated_children list is + * Unlink @root from its parent. As the updated_children list is * singly linked, we have to walk it to find the removal point. - * However, due to the way we traverse, @pos will be the first - * child in most cases. The only exception is @root. */ - parent = cgroup_parent(pos); + parent = cgroup_parent(root); if (parent) { struct cgroup_rstat_cpu *prstatc; struct cgroup **nextp; prstatc = cgroup_rstat_cpu(parent, cpu); nextp = &prstatc->updated_children; - while (*nextp != pos) { + while (*nextp != root) { struct cgroup_rstat_cpu *nrstatc; nrstatc = cgroup_rstat_cpu(*nextp, cpu); @@ -142,31 +170,13 @@ static struct cgroup *cgroup_rstat_cpu_pop_updated(struct cgroup *pos, } rstatc->updated_next = NULL; - return pos; -} - -/* Return a list of updated cgroups to be flushed */ -static struct cgroup *cgroup_rstat_updated_list(struct cgroup *root, int cpu) -{ - raw_spinlock_t *cpu_lock = per_cpu_ptr(&cgroup_rstat_cpu_lock, cpu); - struct cgroup *head, *tail, *next; - unsigned long flags; - /* - * The _irqsave() is needed because cgroup_rstat_lock is - * spinlock_t which is a sleeping lock on PREEMPT_RT. Acquiring - * this lock with the _irq() suffix only disables interrupts on - * a non-PREEMPT_RT kernel. The raw_spinlock_t below disables - * interrupts on both configurations. The _irqsave() ensures - * that interrupts are always disabled and later restored. - */ - raw_spin_lock_irqsave(cpu_lock, flags); - head = tail = cgroup_rstat_cpu_pop_updated(NULL, root, cpu); - while (tail) { - next = cgroup_rstat_cpu_pop_updated(tail, root, cpu); - tail->rstat_flush_next = next; - tail = next; - } + /* Push @root to the list first before pushing the children */ + head = root; + root->rstat_flush_next = NULL; + if (rstatc->updated_children != root) + head = cgroup_rstat_push_children(head, rstatc, cpu); +unlock_ret: raw_spin_unlock_irqrestore(cpu_lock, flags); return head; } -- 2.39.3