From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.3 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 119F9C433E0 for ; Sun, 31 Jan 2021 17:22:37 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 702B964E1F for ; Sun, 31 Jan 2021 17:22:36 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 702B964E1F Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 89A9B6B0006; Sun, 31 Jan 2021 12:22:35 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 7FF2A6B006C; Sun, 31 Jan 2021 12:22:35 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 7134F6B006E; Sun, 31 Jan 2021 12:22:35 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0212.hostedemail.com [216.40.44.212]) by kanga.kvack.org (Postfix) with ESMTP id 563E66B0006 for ; Sun, 31 Jan 2021 12:22:35 -0500 (EST) Received: from smtpin29.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay05.hostedemail.com (Postfix) with ESMTP id 1757C181AC1E9 for ; Sun, 31 Jan 2021 17:22:35 +0000 (UTC) X-FDA: 77766739470.29.straw79_2617bf7275bb Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin29.hostedemail.com (Postfix) with ESMTP id E705B180868C0 for ; Sun, 31 Jan 2021 17:22:34 +0000 (UTC) X-HE-Tag: straw79_2617bf7275bb X-Filterd-Recvd-Size: 6806 Received: from mail-wm1-f53.google.com (mail-wm1-f53.google.com [209.85.128.53]) by imf02.hostedemail.com (Postfix) with ESMTP for ; Sun, 31 Jan 2021 17:22:34 +0000 (UTC) Received: by mail-wm1-f53.google.com with SMTP id o10so10020321wmc.1 for ; Sun, 31 Jan 2021 09:22:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:from:to:cc:references:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=Q+6IGa1lvhVvHwaYJw2IbacWbpY59Fb+lhv0QG13A0k=; b=si+ecLL8RTob+OKJmPovE+xToqGcvfKP26EHjHywDn3QCIkrw0Hpi7O8Fwq8Z6zf2H 2oV2eP9jxNf6vh79wGmstozFVRexf0ZxuLaKFv1V7AgBzav0LJ7LmAAmHtmqdOxJjO7x fnLRRdLTQEYlnBW5QQa+fuJPdyYpPQnIajUrzWI104qB1OD4kfvKrIOMSpGV0hG31aBh czhVqDpi3dxzTbRraaGZ7ETFj2Pk6wO4OilNTHlcvURR+6puCBMcSCdQxtbSiATjcT/4 nNHN+CBvXa+LOs+1X+JZbdy566tJI7I7TVaK97+hQA4We9Uq0m+2CD5gShg/l5JIoGWT 2nQA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:from:to:cc:references:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=Q+6IGa1lvhVvHwaYJw2IbacWbpY59Fb+lhv0QG13A0k=; b=s+U2QtkI0EN/EC9bbWVqw9lVrzo4RtezGb+kh17IKm19PtAC8oOvywBO0j6oUermPk Z9InB5xQpMdnW+jUkS4OQa663FkUofS42rxyHofVyUlMuxGzCFfsaf8Z12c2cz2IHQiV 92mQcp7q/T4+SBz4eu2DR/b7tEZF6SGZEztOk3yQL6yiEEEQID4vh43McFeYdADJQO9J xALbgiLzfYPQ/poVs9EMVURJYC+W6zO9kXf4mVZA79s10lbvLeuwcIbysb3PBVe7xjE/ PolXrzvCLLoqoE37R45SF6PV8Aaf7xn+sTRL3gF1vfGhKKXfSx54OWkG4qmS9Z0gciB2 62Rw== X-Gm-Message-State: AOAM530P6s1vJaNICkHGB/UHrdcMdol0nxuyPBogtXRFaZM4Ih/DT6Sr bbD4zcq2wmLZAwO2FMhwCfE= X-Google-Smtp-Source: ABdhPJw65erEm9h5HmFHPpK0vjDJRlRiaM9t8lZRbCBk6UHsN0mVveCtUaPmxxMe01i8CkNyCLwwyA== X-Received: by 2002:a7b:c407:: with SMTP id k7mr11985884wmi.159.1612113753146; Sun, 31 Jan 2021 09:22:33 -0800 (PST) Received: from [192.168.2.27] (39.35.broadband4.iol.cz. [85.71.35.39]) by smtp.gmail.com with ESMTPSA id q20sm1498560wmc.14.2021.01.31.09.22.32 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 31 Jan 2021 09:22:32 -0800 (PST) Subject: Re: Very slow unlockall() From: Milan Broz To: linux-mm@kvack.org Cc: Linux Kernel Mailing List , Mikulas Patocka , Michal Hocko References: <70885d37-62b7-748b-29df-9e94f3291736@gmail.com> <20210108134140.GA9883@dhcp22.suse.cz> Message-ID: <36e72f8c-3e23-ec48-d8c5-402dc8cfb9c9@gmail.com> Date: Sun, 31 Jan 2021 18:22:31 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 08/01/2021 15:39, Milan Broz wrote: > On 08/01/2021 14:41, Michal Hocko wrote: >> On Wed 06-01-21 16:20:15, Milan Broz wrote: >>> Hi, >>> >>> we use mlockall(MCL_CURRENT | MCL_FUTURE) / munlockall() in cryptsetup code >>> and someone tried to use it with hardened memory allocator library. >>> >>> Execution time was increased to extreme (minutes) and as we found, the problem >>> is in munlockall(). >>> >>> Here is a plain reproducer for the core without any external code - it takes >>> unlocking on Fedora rawhide kernel more than 30 seconds! >>> I can reproduce it on 5.10 kernels and Linus' git. >>> >>> The reproducer below tries to mmap large amount memory with PROT_NONE (later never used). >>> The real code of course does something more useful but the problem is the same. >>> >>> #include >>> #include >>> #include >>> #include >>> >>> int main (int argc, char *argv[]) >>> { >>> void *p = mmap(NULL, 1UL << 41, PROT_NONE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); >>> >>> if (p == MAP_FAILED) return 1; >>> >>> if (mlockall(MCL_CURRENT | MCL_FUTURE)) return 1; >>> printf("locked\n"); >>> >>> if (munlockall()) return 1; >>> printf("unlocked\n"); >>> >>> return 0; >>> } >>> >>> In traceback I see that time is spent in munlock_vma_pages_range. >>> >>> [ 2962.006813] Call Trace: >>> [ 2962.006814] ? munlock_vma_pages_range+0xe7/0x4b0 >>> [ 2962.006814] ? vma_merge+0xf3/0x3c0 >>> [ 2962.006815] ? mlock_fixup+0x111/0x190 >>> [ 2962.006815] ? apply_mlockall_flags+0xa7/0x110 >>> [ 2962.006816] ? __do_sys_munlockall+0x2e/0x60 >>> [ 2962.006816] ? do_syscall_64+0x33/0x40 >>> ... >>> >>> Or with perf, I see >>> >>> # Overhead Command Shared Object Symbol >>> # ........ ....... ................. ..................................... >>> # >>> 48.18% lock [kernel.kallsyms] [k] lock_is_held_type >>> 11.67% lock [kernel.kallsyms] [k] ___might_sleep >>> 10.65% lock [kernel.kallsyms] [k] follow_page_mask >>> 9.17% lock [kernel.kallsyms] [k] debug_lockdep_rcu_enabled >>> 6.73% lock [kernel.kallsyms] [k] munlock_vma_pages_range >>> ... >>> >>> >>> Could please anyone check what's wrong here with the memory locking code? >>> Running it on my notebook I can effectively DoS the system :) >>> >>> Original report is https://gitlab.com/cryptsetup/cryptsetup/-/issues/617 >>> but this is apparently a kernel issue, just amplified by usage of munlockall(). >> >> Which kernel version do you see this with? Have older releases worked >> better? > > Hi, > > I tried 5.10 stable and randomly few kernels I have built on testing VM (5.3 was the oldest), > it seems to be very similar run time, so the problem is apparently old...(I can test some specific kernel version if it make any sense). > > For mainline (reproducer above): > > With 5.11.0-0.rc2.20210106git36bbbd0e234d.117.fc34.x86_64 (latest Fedora rawhide kernel build - many debug options are on) > > # time ./lock > locked > unlocked > > real 0m32.287s > user 0m0.001s > sys 0m32.126s > > > Today's Linus git - 5.11.0-rc2+ in my testing x86_64 VM (no extensive kernel debug options): > > # time ./lock > locked > unlocked > > real 0m4.172s > user 0m0.000s > sys 0m4.172s > > m. Hi, so because there is no response, is this expected behavior of memory management subsystem then? Thanks, Milan