Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp4857220imm; Tue, 16 Oct 2018 00:47:11 -0700 (PDT) X-Google-Smtp-Source: ACcGV62GEcRqPX4DYGagQcAsdxq9MDSX5iEPOQvt8bdk/e2Pwe14ju0nwq5APrdpihz8bGx328By X-Received: by 2002:a63:69c9:: with SMTP id e192-v6mr19453507pgc.143.1539676031439; Tue, 16 Oct 2018 00:47:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539676031; cv=none; d=google.com; s=arc-20160816; b=tOZiQ5Zm/iBpuUUVNwxrTFKKjiApyHb6AGKb5IQCJSW85FS4GN0l5uixKfOi79kiEf qz8mW5pzsM1+a7Cyin0+tsN1HhpNQIXQqu1u7HzJUG8ZvOkAb0DFO50aIM3jGugTXPHo aR1DgyyzmCuTY6V4H1QipChoYu7gcd2XV0uSp+0XyvFFVER0J5QikjeHthfXcKRe/DYV uQXLUltsph30+TX+H4fQPE6ldKstAbvzL9xP+PEwy3YkrNl3oqQOFthZO3bHFKa0qCLm WKQKW5dPwe1dymYeGK0ofb05rXWX+3Id0FAp+OmRN+hikdKyvFjGwEJqEt6kuc1FylLA +RMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=bpVskb//HgMuL3ERW6fW/Ii/pXg4El1NbSCQ5+ESDZE=; b=T6T4IfgtgA6m5Cb+2HVquaTm9VwNGPjKuu8DLyGdXh/50dQu/FRTS/ToYF3dnH7RdI TJF3+9fgXlBsYRtsMrQ30WadF0StC3mc5VSZAOQt7UJZH8RxF/by3CtdQsaTvvcWyLRW P9aBD+n/7cEY/3SFTpkh89DuyBxgot2rjBfJsTPl6WQxuthpSAtLYVLERf6ycbJPyGiK FvEQBDydukbp4xoTxdGs1K1X70g1iouiAnFAfIt5g8jSF2iw9hC998fA0xzZTe3C48Ph KamaLOTGbHfhOz3dXsEFnVxGfZERsYLQ0Wfw7rIU/mxsWtU8kcbHzQRHgchxSZlcIfhl WslA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p20-v6si13045496pgm.192.2018.10.16.00.46.56; Tue, 16 Oct 2018 00:47:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727084AbeJPPfU (ORCPT + 99 others); Tue, 16 Oct 2018 11:35:20 -0400 Received: from mx2.suse.de ([195.135.220.15]:56844 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726729AbeJPPfU (ORCPT ); Tue, 16 Oct 2018 11:35:20 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id A7184AF43; Tue, 16 Oct 2018 07:46:09 +0000 (UTC) Date: Tue, 16 Oct 2018 08:46:06 +0100 From: Mel Gorman To: Andrew Morton Cc: David Rientjes , Andrea Arcangeli , Michal Hocko , Vlastimil Babka , Andrea Argangeli , Zi Yan , Stefan Priebe - Profihost AG , "Kirill A. Shutemov" , linux-mm@kvack.org, LKML , Stable tree Subject: Re: [PATCH 1/2] mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings Message-ID: <20181016074606.GH6931@suse.de> References: <20181005232155.GA2298@redhat.com> <20181009094825.GC6931@suse.de> <20181009122745.GN8528@dhcp22.suse.cz> <20181009130034.GD6931@suse.de> <20181009142510.GU8528@dhcp22.suse.cz> <20181009230352.GE9307@redhat.com> <20181015154459.e870c30df5c41966ffb4aed8@linux-foundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline In-Reply-To: <20181015154459.e870c30df5c41966ffb4aed8@linux-foundation.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 15, 2018 at 03:44:59PM -0700, Andrew Morton wrote: > On Mon, 15 Oct 2018 15:30:17 -0700 (PDT) David Rientjes wrote: > > > At the risk of beating a dead horse that has already been beaten, what are > > the plans for this patch when the merge window opens? > > I'll hold onto it until we've settled on something. Worst case, > Andrea's original is easily backportable. > I consider this to be an unfortunate outcome. On the one hand, we have a problem that three people can trivially reproduce with known test cases and a patch shown to resolve the problem. Two of those three people work on distributions that are exposed to a large number of users. On the other, we have a problem that requires the system to be in a specific state and an unknown workload that suffers badly from the remote access penalties with a patch that has review concerns and has not been proven to resolve the trivial cases. In the case of distributions, the first patch addresses concerns with a common workload where on the other hand we have an internal workload of a single company that is affected -- which indirectly affects many users admittedly but only one entity directly. At the absolute minimum, a test case for the "system fragmentation incurs access penalties for a workload" scenario that could both replicate the fragmentation and demonstrate the problem should have been available before the patch was rejected. With the test case, there would be a chance that others could analyse the problem and prototype some fixes. The test case was requested in the thread and never produced so even if someone were to prototype fixes, it would be dependant on a third party to test and produce data which is a time-consuming loop. Instead, we are more or less in limbo. -- Mel Gorman SUSE Labs