Received: by 2002:a05:7208:13ce:b0:7f:395a:35b6 with SMTP id r14csp336316rbe; Thu, 29 Feb 2024 00:31:55 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCWAfpmCT9wCzxfyJckxCkv8dDsRMIGa8q4NhRrcw1lNUgEnQCYOqgKwHzH4DqiQTPL4KEtjBC8lMs5jUSYfidOVw6asGoD5SSCmxPknfQ== X-Google-Smtp-Source: AGHT+IH0ERUJt63Ji4gN0BWxWXFDQbGji7EzP9RXMuAEyrJvFNOgdMJFk1f0ut62M1rMDU1NRbyY X-Received: by 2002:a50:c88b:0:b0:566:44ca:9f5c with SMTP id d11-20020a50c88b000000b0056644ca9f5cmr932157edh.8.1709195515225; Thu, 29 Feb 2024 00:31:55 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709195515; cv=pass; d=google.com; s=arc-20160816; b=Crj3j7IDd79kzZnywyPT05BDnSp+f5ZGiMkozkroK1oca9LSZYXcdhZTlzK+L0z8pX r+gMafWc09piwiEbt8J+PhKSA1dB19vsE1MgkEzrEJ51z7Vv8+UcalwlUHiawMgELf9c tceq8/dq/BSyG5SWSTDRHpi40wyDQYg2AdUf5DkBVuRr1MFzRBtW4DCUUXMtpLJNm0n5 U9H2ueCkK1w5uTbNQQE8l9PykthCPrZhSK/txqQ7Mf0YGiXNincXVWeSJKoOI1BruLh9 zvKeC5VRV5EYifMfzQKc/aVNpBjeLly5OsIRAaQSypxohcVaaQd6fG4+1Oa0jSVXs/DC Z1mg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id:dkim-signature; bh=CIXz9poscJ25R+s8NLZsjk5IhMPKPfWRzUA3JmSxalM=; fh=9/MvD3PBHcehUpKODxEdEq9LDbdKwyg3biYNx3AnL8Q=; b=sGEcvSkoNLwu6bsHEyptrBZgp26cLVTgTQy2gp8XchfwSfOj00w6SiMlX4Q//wjb/U SpPx58lhlu3tNCcggTECSSpZTmB71XxrkBJ5MJWUyr80LDVdWBr3qeHqy+tRccpT02v6 atLTpWNbn33E4G+q83ReEZm8NfJQhWCTvLgAomgSIM8+ZGqg9OUCEckE5hYGK9jVAp1A l656f5pZkZMkIX8J7ZKGf03vsg0rCssIqyJ2g7mAFABXl34JI23iVgt7Mblut+ox+ZPS FU4MLN/SPVt+fsqPKRdnQ7yFLp4aLasn3IHjJ6rtZHSNeCQE+w+EnNgDeAzg5X754I7J aUZw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=J8GEu49m; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-kernel+bounces-86294-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-86294-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id d13-20020a50ea8d000000b0056587505c83si361362edo.652.2024.02.29.00.31.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 29 Feb 2024 00:31:55 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-86294-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=J8GEu49m; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-kernel+bounces-86294-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-86294-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id CBA871F2477B for ; Thu, 29 Feb 2024 08:31:54 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id CFCE250A8F; Thu, 29 Feb 2024 08:31:36 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="J8GEu49m" Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2A7BB50264 for ; Thu, 29 Feb 2024 08:31:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.8 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709195495; cv=none; b=NJsdfN5e1NgKFyYpNPMbtws0LeeAdB2upIWbnL/C3QU0+SPj1Pyj9NA9TlMn/5bxeZMw/3vctymjroeG0ayimKUXzWmPz9VtvX/r7oKpgYCfUAowBtif3aDWwbC6kAn+cC0k1ijuSbYdIV0n3q6xpdHlBaDVdtkBrdiu6OEULDM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709195495; c=relaxed/simple; bh=JjpPOjjKpZiUK7efIQLHsqI/YCxusDj52aQ7YkjPHGg=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=hPxEu8f2kUj7RSsU7v3qatrg7ia78cV81mwSPXmdBEps1382Ry4MKV6jdejnpeWsjjrUnCsxqrS6uRCwLwYzVhoKqM5eujzspm7gzSw24Fzh7ZLbGJsZiyniCh2GU+kniToLhMoGDGApRMq53Obs/iHeQxW7fIw4l/mbPbiEXOY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=J8GEu49m; arc=none smtp.client-ip=192.198.163.8 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1709195493; x=1740731493; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=JjpPOjjKpZiUK7efIQLHsqI/YCxusDj52aQ7YkjPHGg=; b=J8GEu49mN93he6MjLddsvq8nxE0hUHIXHZ2m45WoAI5T0DDiQ9GWyCJz ZSpPNbQzz49ddPhkcR4Igm/lKKGgv3n1l0PHPPGH0g72NjEbJ5xdtDJir jr9dJXkfs2mZFPh9AUYykCMAGbD6CYpXhQiuNk4sFS+5A7oUmyOj64efG LmCQ3IOiQeFMbXVyU+bPfQeeoVd2Q4vgVyI2CiT+zHKFjrimjKdHDt9/V 6Xj7LOk3YwqCCoIwyoZBuZLAGVT/Dy8ZyoxO/dUF3OSJgsjzCwRM48JaS oNEAwheC428W5kwrY6YMnnUEfS1mLqDP5MZZlvVBQOJneJrbw9K1mkNPc g==; X-IronPort-AV: E=McAfee;i="6600,9927,10998"; a="21191352" X-IronPort-AV: E=Sophos;i="6.06,192,1705392000"; d="scan'208";a="21191352" Received: from orviesa008.jf.intel.com ([10.64.159.148]) by fmvoesa102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Feb 2024 00:31:32 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.06,192,1705392000"; d="scan'208";a="8307066" Received: from rulin.ccr.corp.intel.com (HELO [10.238.4.104]) ([10.238.4.104]) by orviesa008.jf.intel.com with ESMTP; 29 Feb 2024 00:31:28 -0800 Message-ID: Date: Thu, 29 Feb 2024 16:31:27 +0800 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v6] mm/vmalloc: lock contention optimization under multi-threading Content-Language: en-US To: urezki@gmail.com, bhe@redhat.com Cc: akpm@linux-foundation.org, colin.king@intel.com, hch@infradead.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, lstoakes@gmail.com, tianyou.li@intel.com, tim.c.chen@intel.com, wangyang.guo@intel.com, zhiguo.zhou@intel.com References: <20240229082611.4104839-1-rulin.huang@intel.com> From: "Huang, Rulin" In-Reply-To: <20240229082611.4104839-1-rulin.huang@intel.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Apologizes for the confusions the original format led to and thanks so much for your guidance which will surely enhance the efficiency when communicating with the kernel community. We've submitted the v6 of the patch, which more rigorously checks va_flag with BUG_ON, and at the same time ensures the additional performance overhead is subtle. In this modification we also moved the position of the macros because the definition of VMAP_RAM should be placed before alloc_vmap_area(). Much appreciation from you and Uladzislau on the code refinement. And at the same time, we'd also respect the internal review comments and suggestions from Tim and Colin, without which this patch cannot be qualified to be sent out for your review. Although the current implementation has been much different from its first version, I'd still recommend properly recognizing their contributions with the "review-by" tag. Does it make sense? Could you kindly help us review this version and share with us your further comments? Thanks again for your continuous help! On 2024/2/29 16:26, rulinhuang wrote: > When allocating a new memory area where the mapping address range is > known, it is observed that the vmap_node->busy.lock is acquired twice. > > The first acquisition occurs in the alloc_vmap_area() function when > inserting the vm area into the vm mapping red-black tree. The second > acquisition occurs in the setup_vmalloc_vm() function when updating the > properties of the vm, such as flags and address, etc. > > Combine these two operations together in alloc_vmap_area(), which > improves scalability when the vmap_node->busy.lock is contended. > By doing so, the need to acquire the lock twice can also be eliminated > to once. > > With the above change, tested on intel sapphire rapids > platform(224 vcpu), a 4% performance improvement is > gained on stress-ng/pthread(https://github.com/ColinIanKing/stress-ng), > which is the stress test of thread creations. > > Reviewed-by: Uladzislau Rezki > Reviewed-by: Baoquan He > Reviewed-by: "Chen, Tim C" > Reviewed-by: "King, Colin" > Signed-off-by: rulinhuang > --- > V1 -> V2: Avoided the partial initialization issue of vm and > separated insert_vmap_area() from alloc_vmap_area() > V2 -> V3: Rebased on 6.8-rc5 > V3 -> V4: Rebased on mm-unstable branch > V4 -> V5: cancel the split of alloc_vmap_area() > and keep insert_vmap_area() > V5 -> V6: add bug_on > --- > mm/vmalloc.c | 132 +++++++++++++++++++++++++-------------------------- > 1 file changed, 64 insertions(+), 68 deletions(-) > > diff --git a/mm/vmalloc.c b/mm/vmalloc.c > index 25a8df497255..5ae028b0d58d 100644 > --- a/mm/vmalloc.c > +++ b/mm/vmalloc.c > @@ -1841,15 +1841,66 @@ node_alloc(unsigned long size, unsigned long align, > return va; > } > > +/*** Per cpu kva allocator ***/ > + > +/* > + * vmap space is limited especially on 32 bit architectures. Ensure there is > + * room for at least 16 percpu vmap blocks per CPU. > + */ > +/* > + * If we had a constant VMALLOC_START and VMALLOC_END, we'd like to be able > + * to #define VMALLOC_SPACE (VMALLOC_END-VMALLOC_START). Guess > + * instead (we just need a rough idea) > + */ > +#if BITS_PER_LONG == 32 > +#define VMALLOC_SPACE (128UL*1024*1024) > +#else > +#define VMALLOC_SPACE (128UL*1024*1024*1024) > +#endif > + > +#define VMALLOC_PAGES (VMALLOC_SPACE / PAGE_SIZE) > +#define VMAP_MAX_ALLOC BITS_PER_LONG /* 256K with 4K pages */ > +#define VMAP_BBMAP_BITS_MAX 1024 /* 4MB with 4K pages */ > +#define VMAP_BBMAP_BITS_MIN (VMAP_MAX_ALLOC*2) > +#define VMAP_MIN(x, y) ((x) < (y) ? (x) : (y)) /* can't use min() */ > +#define VMAP_MAX(x, y) ((x) > (y) ? (x) : (y)) /* can't use max() */ > +#define VMAP_BBMAP_BITS \ > + VMAP_MIN(VMAP_BBMAP_BITS_MAX, \ > + VMAP_MAX(VMAP_BBMAP_BITS_MIN, \ > + VMALLOC_PAGES / roundup_pow_of_two(NR_CPUS) / 16)) > + > +#define VMAP_BLOCK_SIZE (VMAP_BBMAP_BITS * PAGE_SIZE) > + > +/* > + * Purge threshold to prevent overeager purging of fragmented blocks for > + * regular operations: Purge if vb->free is less than 1/4 of the capacity. > + */ > +#define VMAP_PURGE_THRESHOLD (VMAP_BBMAP_BITS / 4) > + > +#define VMAP_RAM 0x1 /* indicates vm_map_ram area*/ > +#define VMAP_BLOCK 0x2 /* mark out the vmap_block sub-type*/ > +#define VMAP_FLAGS_MASK 0x3 > + > +static inline void setup_vmalloc_vm(struct vm_struct *vm, > + struct vmap_area *va, unsigned long flags, const void *caller) > +{ > + vm->flags = flags; > + vm->addr = (void *)va->va_start; > + vm->size = va->va_end - va->va_start; > + vm->caller = caller; > + va->vm = vm; > +} > + > /* > * Allocate a region of KVA of the specified size and alignment, within the > - * vstart and vend. > + * vstart and vend. If vm is passed in, the two will also be bound. > */ > static struct vmap_area *alloc_vmap_area(unsigned long size, > unsigned long align, > unsigned long vstart, unsigned long vend, > int node, gfp_t gfp_mask, > - unsigned long va_flags) > + unsigned long va_flags, struct vm_struct *vm, > + unsigned long flags, const void *caller) > { > struct vmap_node *vn; > struct vmap_area *va; > @@ -1912,6 +1963,11 @@ static struct vmap_area *alloc_vmap_area(unsigned long size, > va->vm = NULL; > va->flags = (va_flags | vn_id); > > + if (vm) { > + BUG_ON(va_flags & VMAP_RAM); > + setup_vmalloc_vm(vm, va, flags, caller); > + } > + > vn = addr_to_node(va->va_start); > > spin_lock(&vn->busy.lock); > @@ -2325,46 +2381,6 @@ static struct vmap_area *find_unlink_vmap_area(unsigned long addr) > return NULL; > } > > -/*** Per cpu kva allocator ***/ > - > -/* > - * vmap space is limited especially on 32 bit architectures. Ensure there is > - * room for at least 16 percpu vmap blocks per CPU. > - */ > -/* > - * If we had a constant VMALLOC_START and VMALLOC_END, we'd like to be able > - * to #define VMALLOC_SPACE (VMALLOC_END-VMALLOC_START). Guess > - * instead (we just need a rough idea) > - */ > -#if BITS_PER_LONG == 32 > -#define VMALLOC_SPACE (128UL*1024*1024) > -#else > -#define VMALLOC_SPACE (128UL*1024*1024*1024) > -#endif > - > -#define VMALLOC_PAGES (VMALLOC_SPACE / PAGE_SIZE) > -#define VMAP_MAX_ALLOC BITS_PER_LONG /* 256K with 4K pages */ > -#define VMAP_BBMAP_BITS_MAX 1024 /* 4MB with 4K pages */ > -#define VMAP_BBMAP_BITS_MIN (VMAP_MAX_ALLOC*2) > -#define VMAP_MIN(x, y) ((x) < (y) ? (x) : (y)) /* can't use min() */ > -#define VMAP_MAX(x, y) ((x) > (y) ? (x) : (y)) /* can't use max() */ > -#define VMAP_BBMAP_BITS \ > - VMAP_MIN(VMAP_BBMAP_BITS_MAX, \ > - VMAP_MAX(VMAP_BBMAP_BITS_MIN, \ > - VMALLOC_PAGES / roundup_pow_of_two(NR_CPUS) / 16)) > - > -#define VMAP_BLOCK_SIZE (VMAP_BBMAP_BITS * PAGE_SIZE) > - > -/* > - * Purge threshold to prevent overeager purging of fragmented blocks for > - * regular operations: Purge if vb->free is less than 1/4 of the capacity. > - */ > -#define VMAP_PURGE_THRESHOLD (VMAP_BBMAP_BITS / 4) > - > -#define VMAP_RAM 0x1 /* indicates vm_map_ram area*/ > -#define VMAP_BLOCK 0x2 /* mark out the vmap_block sub-type*/ > -#define VMAP_FLAGS_MASK 0x3 > - > struct vmap_block_queue { > spinlock_t lock; > struct list_head free; > @@ -2486,7 +2502,8 @@ static void *new_vmap_block(unsigned int order, gfp_t gfp_mask) > va = alloc_vmap_area(VMAP_BLOCK_SIZE, VMAP_BLOCK_SIZE, > VMALLOC_START, VMALLOC_END, > node, gfp_mask, > - VMAP_RAM|VMAP_BLOCK); > + VMAP_RAM|VMAP_BLOCK, NULL, > + 0, NULL); > if (IS_ERR(va)) { > kfree(vb); > return ERR_CAST(va); > @@ -2843,7 +2860,8 @@ void *vm_map_ram(struct page **pages, unsigned int count, int node) > struct vmap_area *va; > va = alloc_vmap_area(size, PAGE_SIZE, > VMALLOC_START, VMALLOC_END, > - node, GFP_KERNEL, VMAP_RAM); > + node, GFP_KERNEL, VMAP_RAM, > + NULL, 0, NULL); > if (IS_ERR(va)) > return NULL; > > @@ -2946,26 +2964,6 @@ void __init vm_area_register_early(struct vm_struct *vm, size_t align) > kasan_populate_early_vm_area_shadow(vm->addr, vm->size); > } > > -static inline void setup_vmalloc_vm_locked(struct vm_struct *vm, > - struct vmap_area *va, unsigned long flags, const void *caller) > -{ > - vm->flags = flags; > - vm->addr = (void *)va->va_start; > - vm->size = va->va_end - va->va_start; > - vm->caller = caller; > - va->vm = vm; > -} > - > -static void setup_vmalloc_vm(struct vm_struct *vm, struct vmap_area *va, > - unsigned long flags, const void *caller) > -{ > - struct vmap_node *vn = addr_to_node(va->va_start); > - > - spin_lock(&vn->busy.lock); > - setup_vmalloc_vm_locked(vm, va, flags, caller); > - spin_unlock(&vn->busy.lock); > -} > - > static void clear_vm_uninitialized_flag(struct vm_struct *vm) > { > /* > @@ -3002,14 +3000,12 @@ static struct vm_struct *__get_vm_area_node(unsigned long size, > if (!(flags & VM_NO_GUARD)) > size += PAGE_SIZE; > > - va = alloc_vmap_area(size, align, start, end, node, gfp_mask, 0); > + va = alloc_vmap_area(size, align, start, end, node, gfp_mask, 0, area, flags, caller); > if (IS_ERR(va)) { > kfree(area); > return NULL; > } > > - setup_vmalloc_vm(area, va, flags, caller); > - > /* > * Mark pages for non-VM_ALLOC mappings as accessible. Do it now as a > * best-effort approach, as they can be mapped outside of vmalloc code. > @@ -4584,7 +4580,7 @@ struct vm_struct **pcpu_get_vm_areas(const unsigned long *offsets, > > spin_lock(&vn->busy.lock); > insert_vmap_area(vas[area], &vn->busy.root, &vn->busy.head); > - setup_vmalloc_vm_locked(vms[area], vas[area], VM_ALLOC, > + setup_vmalloc_vm(vms[area], vas[area], VM_ALLOC, > pcpu_get_vm_areas); > spin_unlock(&vn->busy.lock); > } > > base-commit: 7e6ae2db7f319bf9613ec6db8fa3c9bc1de1b346