From patchwork Tue Feb 6 09:26:27 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "zhangpeng (AS)" X-Patchwork-Id: 13546921 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 00516C48286 for ; Tue, 6 Feb 2024 09:26:43 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 464C76B0075; Tue, 6 Feb 2024 04:26:43 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 414FD6B007B; Tue, 6 Feb 2024 04:26:43 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2DC306B0078; Tue, 6 Feb 2024 04:26:43 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id 1AA4B6B0071 for ; Tue, 6 Feb 2024 04:26:43 -0500 (EST) Received: from smtpin19.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id DA049A04C9 for ; Tue, 6 Feb 2024 09:26:42 +0000 (UTC) X-FDA: 81760849044.19.F4C1DC2 Received: from szxga07-in.huawei.com (szxga07-in.huawei.com [45.249.212.35]) by imf05.hostedemail.com (Postfix) with ESMTP id B419D100004 for ; Tue, 6 Feb 2024 09:26:39 +0000 (UTC) Authentication-Results: imf05.hostedemail.com; dkim=none; dmarc=pass (policy=quarantine) header.from=huawei.com; spf=pass (imf05.hostedemail.com: domain of zhangpeng362@huawei.com designates 45.249.212.35 as permitted sender) smtp.mailfrom=zhangpeng362@huawei.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1707211601; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding:in-reply-to: references; bh=CCpbJTh5AES4OoNIMO9ohciRM4d5LGvF4KlwXr3jmNk=; b=kjUhF4A6pKKifmLXPi38mIDti9S1yACtWrT+urRvHzxZ/IiEn5vxkLxKD1KThf3yqFeGQI m4qDMYG0JQfcrZ8kneqmL+dCq2bwZPu8ORPl2SRkiOf0GsII6jaGGWVJlTFK0sZvjV802v HfV0ILdxN66wfTJ39ynF/dWyoZa+qIc= ARC-Authentication-Results: i=1; imf05.hostedemail.com; dkim=none; dmarc=pass (policy=quarantine) header.from=huawei.com; spf=pass (imf05.hostedemail.com: domain of zhangpeng362@huawei.com designates 45.249.212.35 as permitted sender) smtp.mailfrom=zhangpeng362@huawei.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1707211601; a=rsa-sha256; cv=none; b=IKm5ClEefW6BIV7nKrElLIZiXB9PXSPFMHYm/RubiQnJLCg2gevZ68gnsQ7nOY6QD9RQRQ Lu0OJR4dDHr248dYYf83K6VsJuHTSz57z99uUF/TA0Uf/b2lYjQt7CIrwZEkyTUw9sv3Yj o5ypmZTjVm2T0OFEoO9QZalYmdfhwwU= Received: from mail.maildlp.com (unknown [172.19.88.234]) by szxga07-in.huawei.com (SkyGuard) with ESMTP id 4TTd9z0Pk5z1Q8fm; Tue, 6 Feb 2024 17:24:39 +0800 (CST) Received: from kwepemm600020.china.huawei.com (unknown [7.193.23.147]) by mail.maildlp.com (Postfix) with ESMTPS id 10280140382; Tue, 6 Feb 2024 17:26:35 +0800 (CST) Received: from localhost.localdomain (10.175.112.125) by kwepemm600020.china.huawei.com (7.193.23.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 6 Feb 2024 17:26:33 +0800 From: Peng Zhang To: , CC: , , , , , , , , , Subject: [PATCH v2] filemap: avoid unnecessary major faults in filemap_fault() Date: Tue, 6 Feb 2024 17:26:27 +0800 Message-ID: <20240206092627.1421712-1-zhangpeng362@huawei.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 X-Originating-IP: [10.175.112.125] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To kwepemm600020.china.huawei.com (7.193.23.147) X-Rspam-User: X-Stat-Signature: q376s7mdw3b1sirgn1cn9hpnxcgi64or X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: B419D100004 X-HE-Tag: 1707211599-800103 X-HE-Meta: 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 YenW8HAr V4kvUgEaREk6EvL9JvOoIYbb+SqT3C71+YXEqNnyTT+2FkrzbZ63FzTqCLO6zlJpG2r/ypOYPwBYgg3IY9En/NySC8iXxecoqMYx6ZqhEogzti9mEy7KiEeE+4jKUjvwMrEgRwx6V//Kze7n+wP7Avaji4cYrOeBgrWd0fp9x9TI3liH6249K+srnL3E+nmuBNVBU0S2wN/usxnIwiBF5RP3WWvUBt+VyYrOOke5VOGFXTip/kRChnNpBXSdxi9++Q5OK9mZze1PMKro34bISgAW6QM+Ldi+QbJvYz9hvdkVYb5A= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: ZhangPeng The major fault occurred when using mlockall(MCL_CURRENT | MCL_FUTURE) in application, which leading to an unexpected performance issue[1]. This caused by temporarily cleared PTE during a read+clear/modify/write update of the PTE, eg, do_numa_page()/change_pte_range(). For the data segment of the user-mode program, the global variable area is a private mapping. After the pagecache is loaded, the private anonymous page is generated after the COW is triggered. Mlockall can lock COW pages (anonymous pages), but the original file pages cannot be locked and may be reclaimed. If the global variable (private anon page) is accessed when vmf->pte is zeroed in numa fault, a file page fault will be triggered. At this time, the original private file page may have been reclaimed. If the page cache is not available at this time, a major fault will be triggered and the file will be read, causing additional overhead. Fix this by rechecking the PTE without acquiring PTL in filemap_fault() before triggering a major fault. Testing file anonymous page read and write page fault performance in ext4 and ramdisk using will-it-scale[2] on a x86 physical machine. The data is the average change compared with the mainline after the patch is applied. The test results are within the range of fluctuation, and there is no obvious difference. The test results are as follows: processes processes_idle threads threads_idle ext4 private file write: -1.14% -0.08% -1.87% 0.13% ext4 shared file write: 0.14% -0.53% 2.88% -0.77% ext4 private file read: 0.03% -0.65% -0.51% -0.08% tmpfs private file write: -0.34% -0.11% 0.20% 0.15% tmpfs shared file write: 0.96% 0.10% 2.78% -0.34% ramdisk private file write: -1.21% -0.21% -1.12% 0.11% ramdisk private file read: 0.00% -0.68% -0.33% -0.02% [1] https://lore.kernel.org/linux-mm/9e62fd9a-bee0-52bf-50a7-498fa17434ee@huawei.com/ [2] https://github.com/antonblanchard/will-it-scale/ Suggested-by: "Huang, Ying" Suggested-by: Yin Fengwei Signed-off-by: ZhangPeng Signed-off-by: Kefeng Wang --- v1->v2: - Add more test results per Huang, Ying - Add more comments before check PTE per Huang, Ying, David Hildenbrand and Yin Fengwei - Change pte_offset_map_nolock to pte_offset_map as the ptl lock won't be used RFC->v1: - Add error handling when ptep == NULL per Huang, Ying and Matthew Wilcox - Check the PTE without acquiring PTL in filemap_fault(), suggested by Huang, Ying and Yin Fengwei - Add pmd_none() check before PTE map - Update commit message and add performance test information mm/filemap.c | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) diff --git a/mm/filemap.c b/mm/filemap.c index 142864338ca4..a2c1a98bc771 100644 --- a/mm/filemap.c +++ b/mm/filemap.c @@ -3238,6 +3238,40 @@ vm_fault_t filemap_fault(struct vm_fault *vmf) mapping_locked = true; } } else { + if (!pmd_none(*vmf->pmd)) { + pte_t *ptep; + + ptep = pte_offset_map(vmf->pmd, vmf->address); + if (unlikely(!ptep)) + return VM_FAULT_NOPAGE; + /* + * Recheck PTE as the PTE can be cleared temporarily + * during a read+clear/modify/write update of the PTE, + * eg, do_numa_page()/change_pte_range(). This will + * trigger a major fault, even if we use mlockall, + * which may affect performance. + * We don't hold PTL here as acquiring PTL hurts + * performance. So the check is still racy, but + * the race window seems small enough. + * + * If we lose the race during the check, the page_fault + * will be triggered. Butthe page table entry lock + * still make sure the correctness: + * - If the page cache is not reclaimed, the page_fault + * will work like the page fault was served already + * and bail out. + * - If the page cache is reclaimed, the major fault + * will be triggered, page cache is filled, + * page_fault also work like the page fault was + * served already and bail out. + */ + if (unlikely(!pte_none(ptep_get_lockless(ptep)))) + ret = VM_FAULT_NOPAGE; + pte_unmap(ptep); + if (unlikely(ret)) + return ret; + } + /* No page in the page cache at all */ count_vm_event(PGMAJFAULT); count_memcg_event_mm(vmf->vma->vm_mm, PGMAJFAULT);