Received: by 10.223.164.202 with SMTP id h10csp194130wrb; Tue, 14 Nov 2017 13:31:51 -0800 (PST) X-Google-Smtp-Source: AGs4zMbrCm3YF7Su4MUpVaETBlTTmODIen/VSZtwpISUOSkex3dsdpb0SEU8WWEBDI76eofODIII X-Received: by 10.159.208.71 with SMTP id w7mr13599129plz.228.1510695111133; Tue, 14 Nov 2017 13:31:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1510695111; cv=none; d=google.com; s=arc-20160816; b=AU49QI7y8O72wtz49+bOH20OyCJ1u1OSeuMTqmxOrDny0/D0HAhMLPIDrJgZeNn3v2 4IeJqwAr+RxE7rpLu5xQjhYVOjRkSyg7gqDucFvkpD6iTHi3siq+EmfIjZA9Z8Ah8Ghq ERmVBMAad//OuLMui8hLROmOunsICmXyYSqtheCNfypSC1YrY9e3g5gkfzbzLRRi0VRL Sg7BjRD9yqA+zGha7KaDEXx4UhP/dDOpgMp1B6xgDbQG0K0J0iixW/0firDVcF7fHTBx qibrEWKhw6IMX2KucXEPxx6eBSmF8FefhadSoU9RX9pORbUWH3lbLt22pyisWt/4rm/7 Rw5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:spamdiagnosticmetadata :spamdiagnosticoutput:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature:arc-authentication-results; bh=9SbE9Oua0Y9n4LGdyGwZMEqhnJSs61uG/Rjy6hntUts=; b=TLDvBTZzDh+xwpJOFumYe9re4mtIDUNzULeXk+sewnSS74JAChqX+SCCx12Q/kcYTp o3Q+4NqfBnPFAo6qUTCq3MZe4dIxytz3/9xwH88VVrZ6T5JcRDSzKHasjTQjlyyOHbwl cQiKNzzYPR6RxsWhb4cbWO+sER9L6IuxNC8kirhGqdBwMmLkHCGv9qR4fb/BSMNIdUex UknLbq3hN9p5zoB0jFgvVNpS20Guqpxzm5RRiT0ccxz+taqfCbrnZ9E8NP4ncczIar4L cu6j5cW4Hv4uzvjlXPZBGmJEo3yA3O62owbtzcoVnbuFdMEcDcMACrS9YsNefkbbCId0 D3xg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@virtuozzo.com header.s=selector1 header.b=EoimJ+kG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r7si16760349plo.348.2017.11.14.13.31.30; Tue, 14 Nov 2017 13:31:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@virtuozzo.com header.s=selector1 header.b=EoimJ+kG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756154AbdKNSiv (ORCPT + 88 others); Tue, 14 Nov 2017 13:38:51 -0500 Received: from mail-ve1eur01on0115.outbound.protection.outlook.com ([104.47.1.115]:6385 "EHLO EUR01-VE1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1755992AbdKNSip (ORCPT ); Tue, 14 Nov 2017 13:38:45 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=virtuozzo.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=9SbE9Oua0Y9n4LGdyGwZMEqhnJSs61uG/Rjy6hntUts=; b=EoimJ+kGoTcULmRA/R+uYfPfk8j/7mt8bVe1nMNg30k44LLpPR6N+k7TcOIoVNg9JL7zOhsa6eQrIqxdJfhN8Ldilcqi+7yp73UzxcKEN8AbHScUxaCoNG21TF+UPL27xTayV1qvjkq2Ez/BVTHbNO/r/+yD+O3fppxRDUJ5sh4= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=avagin@virtuozzo.com; Received: from outlook.office365.com (65.152.152.74) by DB5PR08MB0742.eurprd08.prod.outlook.com (2a01:111:e400:599c::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.239.5; Tue, 14 Nov 2017 18:38:35 +0000 Date: Tue, 14 Nov 2017 10:38:27 -0800 From: Andrei Vagin To: Kirill Tkhai Cc: davem@davemloft.net, vyasevic@redhat.com, kstewart@linuxfoundation.org, pombredanne@nexb.com, vyasevich@gmail.com, mark.rutland@arm.com, gregkh@linuxfoundation.org, adobriyan@gmail.com, fw@strlen.de, nicolas.dichtel@6wind.com, xiyou.wangcong@gmail.com, roman.kapl@sysgo.com, paul@paul-moore.com, dsahern@gmail.com, daniel@iogearbox.net, lucien.xin@gmail.com, mschiffer@universe-factory.net, rshearma@brocade.com, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, ebiederm@xmission.com, gorcunov@virtuozzo.com Subject: Re: [PATCH] net: Convert net_mutex into rw_semaphore and down read it on net->init/->exit Message-ID: <20171114183826.GB11452@outlook.office365.com> References: <151066759055.14465.9783879083192000862.stgit@localhost.localdomain> <20171114174454.GA11452@outlook.office365.com> MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.1 (2017-09-22) X-Originating-IP: [65.152.152.74] X-ClientProxiedBy: BN6PR21CA0001.namprd21.prod.outlook.com (2603:10b6:404:8e::11) To DB5PR08MB0742.eurprd08.prod.outlook.com (2a01:111:e400:599c::12) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: fe0eff7a-bef2-424a-be9a-08d52b8eeccf X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001)(4534020)(4602075)(4627115)(201703031133081)(201702281549075)(2017052603199);SRVR:DB5PR08MB0742; X-Microsoft-Exchange-Diagnostics: 1;DB5PR08MB0742;3:jIXj4dax7Reh4oGf6+oM4j3B9YZj02N5MXKoZMHAPXVs4DIp0n6xeFI/7JDtnJuPQhYAHiiC71tULdf3Fer7vjpryIU34vPw/VhUfUbBr/LKwacCPHTZjvjW4W1TSaelJIwSr82IePtv8bPJVq9IzOXyXsxx5gfdqmdNjhhVjxD+t3D4JwkmGgpzkvDS2df7jO2k2XjrDGhBhi423AgRuoNiShTkTPitDGMRFD7aen92pGj3lEgGtoLDdEs3Snno;25:CvS3bQu+lv2x6Lbk+WxlwFcNWB5Xf5gE4HAEFWfdkcQDLUpWncFhlNUjxp4dITRofvmg4pjbvPBSbdKZKJj1hRocY2stzzbMXAvH7mzipbn0nKeZxPXQfP8S0N5rU4eM2F9gXBCvurgiYu6SdKvmqBanMrEvoha3e1dYBJe9vZK38DXn3znXnZKIxwPErK2LHS/6nKo/BWSMceUICe7MmUqsQPFSbiwsh4T6aiSvtpJxXIs+Jk/yFaZWeVYq5alq4vWcTxBFWhrKT3DBnJcMY6DYSx2GlpTXEfi1DOXVsSVutH/AvWc0bqRT32mABacNmwszKoSrkIwohDR/EK2jZA==;31:bLAuSeZ28kowYY5pqhYhHljUFblQ8YrgWuQmLYry0qvV5V59TZobwSetVtJbvdYWoUi/LSVE0RXPhWBTE5IRNT0u/w7eNqyHwAG+JLxp52w97oEXhyVkGjCiuK5b83xpH5ocmhD3d5BVNR6x4NZUQ1uPpB3RFt+x7oH/r2AOxaA3ip8fo+SaP8K8wssVd0eKeB+MvlTtlAN8MuFc9xggkSSwT+3nmGsj8858J8xzeks= X-MS-TrafficTypeDiagnostic: DB5PR08MB0742: X-Microsoft-Exchange-Diagnostics: 1;DB5PR08MB0742;20:vjMT110tvPhqVWAuXXww61mFqVPcVxFAqbBhiFMPoRJ6zgQVLgwJfK3R9PqvAZRYdHKIEHh7NjHCpp18uvydkjzWOTZxjRXJgIOLuWpjDN+14Vc5K0W9ipAjaBhVHt5xixdK/LgLdQ/rCLKf8THtCkllu5uU0F2rLjQ50bAJGb4JPTzXTdZnWyiIpEZI4H9kmcoc/lTihlmrTdjJ330cmkyPEAn6nEhyeQR1PQ3zX6Bex9xVGSw9HMMuhWyHGXGZTbPkFoaYaSDu7afaHG2CyFad6K3vLBQpCX53wmMHv94K10sBlfEIi6mb4CEVDgr8/tWVxjEvkYrc5rVnof7SuBDr7I0Jd6F6nCTR7faw2K9OUcQsSNOHsN0hoQTJnoM4yy0b7olmMz2F62pIayLQ25mVE0a9v1cCe4/GHPkEzSE=;4:bxNj/zET8SuFH2FrGACMU9+rFMGsXEzSQ8N99VrkC69WNH6uGrDgumKX17qI82kDxg1G8NuG0gvZNqYfOZxhI0exODq55lzTGlb4baElV+3idU+xWsG/gRgT+fvYW4zcnM9uo+/ANNJnH604Otdz6ASivycDlePcFmnlMwUnBP5UVzWDXGHJxQnmNirygyWGXs/9Q1zjr/NzhP2r/8wjJglDY/VsL4z4ZINw3LxxN44raRXhYoPl4twnoKN0XgcF1OkcQxocz4S8c/k5JE1gKA== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(8121501046)(5005006)(10201501046)(3231022)(3002001)(100000703101)(100105400095)(93006095)(93001095)(6041248)(20161123560025)(20161123555025)(20161123564025)(20161123562025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123558100)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:DB5PR08MB0742;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:DB5PR08MB0742; X-Forefront-PRVS: 04916EA04C X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10019020)(6009001)(376002)(346002)(189002)(24454002)(52314003)(199003)(55016002)(5660300001)(50986999)(6116002)(3846002)(1076002)(69596002)(2950100002)(47776003)(6666003)(33656002)(106356001)(105586002)(6636002)(66066001)(53546010)(86362001)(54356999)(76176999)(101416001)(53416004)(50466002)(6506006)(83506002)(7416002)(229853002)(6246003)(53936002)(4326008)(8936002)(2906002)(16586007)(966005)(16526018)(478600001)(107886003)(189998001)(6306002)(9686003)(25786009)(7736002)(58126008)(305945005)(6862004)(39060400002)(97736004)(81156014)(81166006)(316002)(8676002)(23686003)(68736007)(18370500001);DIR:OUT;SFP:1102;SCL:1;SRVR:DB5PR08MB0742;H:outlook.office365.com;FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; Received-SPF: None (protection.outlook.com: virtuozzo.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?koi8-r?Q?1;DB5PR08MB0742;23:+ZKpx8qmgrAwGlvSjJrEePjYBNV3uDTJDOhMSpyI5e8?= =?koi8-r?Q?UHitysgDMlI1/Jhflohg29ubFjbrpSFh4A/MvI8yX7YlJkkAUovJrF9hNdeYC+?= =?koi8-r?Q?3YZFvd2Vp23k9BY9qV8wwdeLFkkSbOMuZbk7jQf0SEPYXXpdrTTe58zIbaQLEu?= =?koi8-r?Q?E3aEqTE+WdkkhxB/8YqByHioa4NPGKFzDEBoWjOmSdOo2nue/LH50S7HAK9ddn?= =?koi8-r?Q?sPQw+5nmtebNX8UoS35/wj10bCs1xct6uiJCnP0znF1dzChgNyjRphoVlPp+oG?= =?koi8-r?Q?JGpoIGR+dHDQdWrJVoiIjyL5hSHHRtbyPbgezVYIh9LD8OFOCqb5dAEy2j2OKw?= =?koi8-r?Q?3XTQyk5STV79kWNpllR/3S6BhplAKnIAOHiXH2G9+wicvotvDVPKgSNS4cQjQ+?= =?koi8-r?Q?29SdcOwsS3aDY6l4gyEozV90Kp4U4tp16G0S5cCAcc2k7W/ZEhRpvUDUo52R4P?= =?koi8-r?Q?aZNKe2fDciAZGI9frOleTj68wAVbCGGyKNtr//cYHjbtlEev1C9kx/4UpMSCr0?= =?koi8-r?Q?E5+Ipn1hFKcZAHJM5d4YzVksqbqndeFsRbVj21pdbmqdjs483eBVcxtiljhAS4?= =?koi8-r?Q?4z6dVd7jMtgQeUaYsaevxNHp1nrqrBuJTe9ZeEZK2zhGjw8KBN9gI3Re4kMHgF?= =?koi8-r?Q?JWRcxVaDLF7MbFTK5cYn32XAVGG8yLlYYIngrziIZoqrBH3rbhibe9jC770J1L?= =?koi8-r?Q?Y4e7Q+kUks/75gvObW8wCw4SkWGeFMldesT9oFuG9LuCBvn79CRXxz6NqHnnhQ?= =?koi8-r?Q?qrKKTUfYDGxPNoPzX7I7bZAMgDPbvhLbI+MjF3qW6eCMA7SlG7SvX1zXp3f+kx?= =?koi8-r?Q?ANNtJqlmI9E63g1xUpVhHjYyg23gfEhnXYx32r3n+aHAqiMKPX2seoTtBWJ6Fd?= =?koi8-r?Q?w1yHF4k8Km3rJYJwGlTVZW1rhgAMizEFTXRSjSvmbZJCVDSVOYeMNsfcVTS9zm?= =?koi8-r?Q?f9bw+AR9TPEOzZpVe/iO7RL3GlqXAsFE62P90YJo5+UWsjIi9QAAo69mYeblM7?= =?koi8-r?Q?uSzXMjufKULV/KwArNniv37j16yHkiOaR0ZlpKdYkcc3bTNWBW14amNYM+7A8O?= =?koi8-r?Q?TswXtTj10AFoxLfnOnoB+xE7n3ek52XsziYVVaSaPPBe2oRNTiifkFi4aLJ1Mv?= =?koi8-r?Q?7pT8Xh8izlX1xYKdnsZGGvlMI3LjLoPTRGTpbDjmpAM4069wpGlbY/ySGnXkPS?= =?koi8-r?Q?nD458slxXDNsfXbsHkdDrPR3ejbcACPaDtILcMBubNlImhQ1ACDrzebBc2Zh/p?= =?koi8-r?Q?aOWDKJQrl9GQNybyd1WVIRdqeVUgHRRICmPUxUne9PcRAr61cR/0uKQ5h9qYUk?= =?koi8-r?Q?WqXZ3xdQgbAyNAtrLF0Z1J7JMCYQsyCkT5uT1VZ27E=3D?= X-Microsoft-Exchange-Diagnostics: 1;DB5PR08MB0742;6:DuYlkKif+mpjHE/AOrXXnIR2fkhCT2XUe+eBxeuWXAUfJU5QIRZA7pLgyGhjiJSdLIAllSLuYSoLGPH13pWxTFX6IhIM+jyiTedEZTp8d8Krtviimd82NKchKYFve0LI7XbbnFVbqFAR50Ti8CwBbafcNI76qms0WDGwskilgK2HzwXnS4zAnRmCUWNOy1vSaoS6jSz5OYxBbgWr8D2EpC296BJfGRsdrAJDXG0QutgyVuSOTbry+Wq8aI0a/mlK+rkSp85lvTR/eOQyju+zO/dBzGWB5gGfWxFblX6HHsIR8nem7+Xd/LIYD4/4da5TT/2a2LVfV0NitiA7jxn0hu5r89Uim5z/yXpN6Jj7u/4=;5:M1vZEUNTk73YUNr8UEIHSrKxSI9de48sn131tFdxEfLH1ZHKOvIZiRCavEBbIZo9/UGmIq8p6WE899JC+VoVciDjWZZ/rgXhCwZi5XQuZtEh6tPX4cuJyCUG3uWZ9aQJ/ctZJvLck5azkZ2JKWcjyJycNVl8uWflWR/EnJ9i07Y=;24:GRyA7ED/cAU8yFpw4+tZ+ocA40Cw+xp0NWH6nxBcmGO4tC7PkYv7V5dtxJa+Kas8Reoc8Lu6T3WhsA/6+uF59kRmlWNJnKfmfh4b88ciu64=;7:MOmtaD5DdxDx1WTO6/swp1bFX0gCMAODt1N6itfWz8MDJk8BHnR9CpJy4MN4UdEeRAB79520i+JIo0Ui9UDPau/HRKaj2jnXJNM9yN6aUeaG13yiR5GIyVfK8wpdItrvOc4/eoV9F4JFflFHL5AlmeWoEygDaGYi6MEODKPNvwDikCWakmfBj+mZ3qTxfHHPM23Iyd5he2+jXcbaImLIUoLvDNrFax7ulfWphax+6yU0Vhv1BEsSyD4tq5EcZTzJ SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;DB5PR08MB0742;20:jnBdqfuImQDE+dIfZtEcVWbYL8ClGMCbFV2s/ZZKNHONL4j9P8Q4ZGWxKBALo9cx7WOmS9ITOw8GB3K9DLlirayvDkN+9uTK8ck9B+d/BAQXHB3buJ8T4kSzxKX79PuRL64X7ZZqsG4grp0PJE9B0B1JJi5L8hYZNuvlqPTtaXE= X-OriginatorOrg: virtuozzo.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Nov 2017 18:38:35.8366 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: fe0eff7a-bef2-424a-be9a-08d52b8eeccf X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 0bc7f26d-0264-416e-a6fc-8352af79c58f X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB5PR08MB0742 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Nov 14, 2017 at 09:04:06PM +0300, Kirill Tkhai wrote: > On 14.11.2017 20:44, Andrei Vagin wrote: > > On Tue, Nov 14, 2017 at 04:53:33PM +0300, Kirill Tkhai wrote: > >> Curently mutex is used to protect pernet operations list. It makes > >> cleanup_net() to execute ->exit methods of the same operations set, > >> which was used on the time of ->init, even after net namespace is > >> unlinked from net_namespace_list. > >> > >> But the problem is it's need to synchronize_rcu() after net is removed > >> from net_namespace_list(): > >> > >> Destroy net_ns: > >> cleanup_net() > >> mutex_lock(&net_mutex) > >> list_del_rcu(&net->list) > >> synchronize_rcu() <--- Sleep there for ages > >> list_for_each_entry_reverse(ops, &pernet_list, list) > >> ops_exit_list(ops, &net_exit_list) > >> list_for_each_entry_reverse(ops, &pernet_list, list) > >> ops_free_list(ops, &net_exit_list) > >> mutex_unlock(&net_mutex) > >> > >> This primitive is not fast, especially on the systems with many processors > >> and/or when preemptible RCU is enabled in config. So, all the time, while > >> cleanup_net() is waiting for RCU grace period, creation of new net namespaces > >> is not possible, the tasks, who makes it, are sleeping on the same mutex: > >> > >> Create net_ns: > >> copy_net_ns() > >> mutex_lock_killable(&net_mutex) <--- Sleep there for ages > >> > >> The solution is to convert net_mutex to the rw_semaphore. Then, > >> pernet_operations::init/::exit methods, modifying the net-related data, > >> will require down_read() locking only, while down_write() will be used > >> for changing pernet_list. > >> > >> This gives signify performance increase, like you may see below. There > >> is measured sequential net namespace creation in a cycle, in single > >> thread, without other tasks (single user mode): > >> > >> 1)int main(int argc, char *argv[]) > >> { > >> unsigned nr; > >> if (argc < 2) { > >> fprintf(stderr, "Provide nr iterations arg\n"); > >> return 1; > >> } > >> nr = atoi(argv[1]); > >> while (nr-- > 0) { > >> if (unshare(CLONE_NEWNET)) { > >> perror("Can't unshare"); > >> return 1; > >> } > >> } > >> return 0; > >> } > >> > >> Origin, 100000 unshare(): > >> 0.03user 23.14system 1:39.85elapsed 23%CPU > >> > >> Patched, 100000 unshare(): > >> 0.03user 67.49system 1:08.34elapsed 98%CPU > >> > >> 2)for i in {1..10000}; do unshare -n bash -c exit; done > > > > Hi Kirill, > > > > This mutex has another role. You know that net namespaces are destroyed > > asynchronously, and the net mutex gurantees that a backlog will be not > > big. If we have something in backlog, we know that it will be handled > > before creating a new net ns. > > > > As far as I remember net namespaces are created much faster than > > they are destroyed, so with this changes we can create a really big > > backlog, can't we? > > I don't think limitation is a good goal or a gool for the mutex, > because it's very easy to create many net namespaces in case of > the mutex exists. You may open /proc/[pid]/ns/net like a file, > and net_ns counter will increment. Then, do unshare(), and > the mutex has no a way to protect against that. You are right, but with the mutex a user can not support a big backlog for a long time, it is shrunk to zero periodically. With these changes he can support a big backlog for a long time. A big backlog affects other users. If someone creates namespaces, he probably expects that they will be destroyed for a reasonable time. But currently someone else can increase a destroy time to a really big values. This problem was before your patches, but they may do this problem worse. The question here is: Should we think about this problem in the context of these patches? > Anyway, mutex > can't limit a number of something in general, I've never seen > a (good) example in kernel. I'm agree with you here. > > As I see, the real limitation happen in inc_net_namespaces(), > which is decremented after RCU grace period in cleanup_net(), > and it has not changed. ucount limits are to big to handle this problem. > > > There was a discussion a few month ago: > > https://lists.onap.org/pipermail/containers/2016-October/037509.html > > > > > >> > >> Origin: > >> real 1m24,190s > >> user 0m6,225s > >> sys 0m15,132s > > > > Here you measure time of creating and destroying net namespaces. > > > >> > >> Patched: > >> real 0m18,235s (4.6 times faster) > >> user 0m4,544s > >> sys 0m13,796s > > > > But here you measure time of crearing namespaces and you know nothing > > when they will be destroyed. > > You're right, and I predict, the sum time, spent on cpu, will remain the same, > but the think is that now creation and destroying may be executed in parallel. From 1584075742870167232@xxx Tue Nov 14 20:45:51 +0000 2017 X-GM-THRID: 1584049999819820517 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread