Received: by 2002:a05:7208:13ce:b0:7f:395a:35b6 with SMTP id r14csp284819rbe; Wed, 28 Feb 2024 22:09:36 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCV4GWJnEZzERcJyjuBKkJBRfM3gpFIkFok5l3hnrdSmWG7pzIbnGk+7umXMMVuKyXeM1LRv/p0FVEHtiuHi3gzDZbZ+VDCxbP4WxwuVFg== X-Google-Smtp-Source: AGHT+IEom1SMRhAl7RsZLCNcRtnd4Xk50EpRTKrQlBiM6GkBV9xmYGXVX301+w6GpVupVFPyOkzf X-Received: by 2002:a05:620a:20cb:b0:787:d28c:2bb2 with SMTP id f11-20020a05620a20cb00b00787d28c2bb2mr1422097qka.67.1709186976590; Wed, 28 Feb 2024 22:09:36 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709186976; cv=pass; d=google.com; s=arc-20160816; b=jBf2Zk5TwkY7ukRoB2GY0Omwtk+U24DQEPV5b1RKrDD5ebR33aa4UVuvjr+S9yxfWi mfLyq4CG+OGLFiEHwGL7liDGhiGgPQBOa9c0LFA/k9y8Y7dHa1lM/GaVLGsFUptj0sIz mqllVuwfMq6fyluhr4GhdwXpDZw8FDsIugd3l82EqVtqxrytvYeDpAGY0ovrZVcG9PC8 3M3yea5g+FiihbYxIwuqX/wN88JP65FAxYhfflHBgGXbody8f1uMApPvMUZsy3lhUFUZ AxWEd5eQC5kNqJowuyMw/ErTfFkF8catkfO3SBObVy0b+/q59vJfICWsHjk/Ypa+2mZo p9gg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from; bh=PsYHfkepqgSq+4yroC8oL5snXBDrOe84TnLYYeqyVT0=; fh=fcD19hXSFGUnjNvjXuo5CWHUlWeTjvAdIZ3yBUGWUAQ=; b=SapJdoDDjuJU6yxFHsSStedKa+xCg5vi3msj8SySKt3XTlp/Lx9CRnBh9uGv2wa/CQ 7XRlr4WpNjs740L6GJaH32qEV14VXB2sBgMcTuKEDiLiuTIzdlPElbDpG7TLeG6SOuVb SYgwbfp8/ECvXc/SVtmmh0RvSPyDkW+jqMa6LBcjSDzmkbcm8Iw78LNmWbxphr7HEJlR 81AYmz7cF/P68sE0NH95tB1Hcuxd9fMIz05maViB47vGH0+tmU3IZcH/TrEkiMZFVOjK rnaKAPLcw5Y2JuGm9BOdpbE7uGBhDnaqjSXQJr9yr/7Nr48qcI3skdnx1vyW4ms+NA+x sFzg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=huawei.com dmarc=pass fromdomain=huawei.com); spf=pass (google.com: domain of linux-kernel+bounces-86157-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-86157-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=QUARANTINE) header.from=huawei.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id wg2-20020a05620a568200b00787720524f9si783370qkn.124.2024.02.28.22.09.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Feb 2024 22:09:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-86157-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=huawei.com dmarc=pass fromdomain=huawei.com); spf=pass (google.com: domain of linux-kernel+bounces-86157-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-86157-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=QUARANTINE) header.from=huawei.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 445981C2257A for ; Thu, 29 Feb 2024 06:09:36 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 2AB3C3C082; Thu, 29 Feb 2024 06:09:31 +0000 (UTC) Received: from szxga05-in.huawei.com (szxga05-in.huawei.com [45.249.212.191]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 66726374EF for ; Thu, 29 Feb 2024 06:09:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=45.249.212.191 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709186970; cv=none; b=liErFjuxxLF/mdkn5mw4J9LeGoFCcQWflH6DW1xH+o8AZlEbU698jCwRAuuPcySRTz6EtstA3HA3G+PmEDLC4LNBqITA0f+p2ti8B0KJNbClULKTxyGJpoKMW8xuoYCSMuph002auhDmqZ8xiPzumBfnfzt8KwhoqM6ludPrN90= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709186970; c=relaxed/simple; bh=RGrKyOJ3X0IWrN5SKyUO1fWpo0WaUS4LG/9K4VmLqfA=; h=From:To:CC:Subject:Date:Message-ID:MIME-Version:Content-Type; b=fTeS4EZiUVDAFZbdzKaszyepz6jYj1QfgEfSPaJvhpZWQ4ZX5415A1670lLW7paOO5XvQm9HPgo8uKvjSOfMvx/f896NaQkMgA4BnPdSgRai8M5Qa8QIxgqDVk7vb3exFBPn5hft4wK85foCJGfhUNHCm/5otJ8YN0/bPs0a7Sk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=huawei.com; spf=pass smtp.mailfrom=huawei.com; arc=none smtp.client-ip=45.249.212.191 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=huawei.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=huawei.com Received: from mail.maildlp.com (unknown [172.19.163.17]) by szxga05-in.huawei.com (SkyGuard) with ESMTP id 4Tlgm3152cz1FLNZ; Thu, 29 Feb 2024 14:09:23 +0800 (CST) Received: from kwepemm600020.china.huawei.com (unknown [7.193.23.147]) by mail.maildlp.com (Postfix) with ESMTPS id 8CCBD1A0172; Thu, 29 Feb 2024 14:09:24 +0800 (CST) Received: from localhost.localdomain (10.175.112.125) by kwepemm600020.china.huawei.com (7.193.23.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Thu, 29 Feb 2024 14:09:23 +0800 From: Peng Zhang To: , CC: , , , , , , , , , , Subject: [PATCH v3] filemap: avoid unnecessary major faults in filemap_fault() Date: Thu, 29 Feb 2024 14:09:07 +0800 Message-ID: <20240229060907.836589-1-zhangpeng362@huawei.com> X-Mailer: git-send-email 2.25.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To kwepemm600020.china.huawei.com (7.193.23.147) From: ZhangPeng The major fault occurred when using mlockall(MCL_CURRENT | MCL_FUTURE) in application, which leading to an unexpected issue[1]. This caused by temporarily cleared PTE during a read+clear/modify/write update of the PTE, eg, do_numa_page()/change_pte_range(). For the data segment of the user-mode program, the global variable area is a private mapping. After the pagecache is loaded, the private anonymous page is generated after the COW is triggered. Mlockall can lock COW pages (anonymous pages), but the original file pages cannot be locked and may be reclaimed. If the global variable (private anon page) is accessed when vmf->pte is zeroed in numa fault, a file page fault will be triggered. At this time, the original private file page may have been reclaimed. If the page cache is not available at this time, a major fault will be triggered and the file will be read, causing additional overhead. This issue affects our traffic analysis service. The inbound traffic is heavy. If a major fault occurs, the I/O schedule is triggered and the original I/O is suspended. Generally, the I/O schedule is 0.7 ms. If other applications are operating disks, the system needs to wait for more than 10 ms. However, the inbound traffic is heavy and the NIC buffer is small. As a result, packet loss occurs. But the traffic analysis service can't tolerate packet loss. Fix this by holding PTL and rechecking the PTE in filemap_fault() before triggering a major fault. We do this check only if vma is VM_LOCKED. In our service test environment, the baseline is 7 major faults / 12 hours. After the patch is applied, no major fault will be triggered. Testing file anonymous page read and write page fault performance in ext4, tmpfs and ramdisk using will-it-scale[2] on a x86 physical machine. The data is the average change compared with the mainline after the patch is applied. The test results are indicates some performance regressions. We do this check only if vma is VM_LOCKED, therefore, no performance regressions is caused for most common cases. The test results are as follows: processes processes_idle threads threads_idle ext4 private file write: -0.51% 0.08% -0.03% -0.04% ext4 shared file write: 0.135% -0.531% 2.883% -0.772% ramdisk private file write: -0.48% 0.23% -1.08% 0.27% ramdisk private file read: 0.07% -6.90% -5.85% -0.70% tmpfs private file write: -0.344% -0.110% 0.200% 0.145% tmpfs shared file write: 0.958% 0.101% 2.781% -0.337% tmpfs private file read: -0.16% 0.00% -0.12% 0.41% [1] https://lore.kernel.org/linux-mm/9e62fd9a-bee0-52bf-50a7-498fa17434ee@huawei.com/ [2] https://github.com/antonblanchard/will-it-scale/ Suggested-by: "Huang, Ying" Suggested-by: David Hildenbrand Signed-off-by: ZhangPeng Signed-off-by: Kefeng Wang --- v2->v3: - Do this check only if vma is VM_LOCKED per David Hildenbrand - Hold PTL and recheck the PTE - Place the recheck code in a new function filemap_fault_recheck_pte() v1->v2: - Add more test results per Huang, Ying - Add more comments before check PTE per Huang, Ying, David Hildenbrand and Yin Fengwei - Change pte_offset_map_nolock to pte_offset_map as the PTL won't be used RFC->v1: - Add error handling when ptep == NULL per Huang, Ying and Matthew Wilcox - Check the PTE without acquiring PTL in filemap_fault(), suggested by Huang, Ying and Yin Fengwei - Add pmd_none() check before PTE map - Update commit message and add performance test information mm/filemap.c | 40 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) diff --git a/mm/filemap.c b/mm/filemap.c index b4858d89f1b1..2668bac68df7 100644 --- a/mm/filemap.c +++ b/mm/filemap.c @@ -3181,6 +3181,42 @@ static struct file *do_async_mmap_readahead(struct vm_fault *vmf, return fpin; } +/* + * filemap_fault_recheck_pte - hold PTL and recheck whether pte is none. + * @vmf - the vm_fault for this fault. + * + * Recheck PTE as the PTE can be cleared temporarily during a read+clear/modify + * /write update of the PTE, eg, do_numa_page()/change_pte_range(). This will + * trigger an unexpected major fault, even if we use mlockall(), which may + * increase IO and thus cause other unexpected behavior. + * + * Return VM_FAULT_NOPAGE if the PTE is not none or pte_offset_map_lock() + * fails. In other cases, 0 is returned. + */ +static vm_fault_t filemap_fault_recheck_pte(struct vm_fault *vmf) +{ + struct vm_area_struct *vma = vmf->vma; + vm_fault_t ret = 0; + pte_t *ptep; + + if (!(vma->vm_flags & VM_LOCKED)) + return ret; + + if (pmd_none(*vmf->pmd)) + return ret; + + ptep = pte_offset_map_lock(vma->vm_mm, vmf->pmd, vmf->address, + &vmf->ptl); + if (unlikely(!ptep)) + return VM_FAULT_NOPAGE; + + if (unlikely(!pte_none(ptep_get(ptep)))) + ret = VM_FAULT_NOPAGE; + + pte_unmap_unlock(ptep, vmf->ptl); + return ret; +} + /** * filemap_fault - read in file data for page fault handling * @vmf: struct vm_fault containing details of the fault @@ -3236,6 +3272,10 @@ vm_fault_t filemap_fault(struct vm_fault *vmf) mapping_locked = true; } } else { + ret = filemap_fault_recheck_pte(vmf); + if (unlikely(ret)) + return ret; + /* No page in the page cache at all */ count_vm_event(PGMAJFAULT); count_memcg_event_mm(vmf->vma->vm_mm, PGMAJFAULT); -- 2.25.1