Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp405070imm; Wed, 17 Oct 2018 02:02:47 -0700 (PDT) X-Google-Smtp-Source: ACcGV61KrzkRyK9xoUNBZ5QFT/QEJxNfXu8E1VF5b8Puex6aNum7nw2KsAUCE5GK9RJRJe1yeobC X-Received: by 2002:a63:541e:: with SMTP id i30-v6mr23789391pgb.413.1539766967086; Wed, 17 Oct 2018 02:02:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539766967; cv=none; d=google.com; s=arc-20160816; b=pm8MBx0RV5IHOxfVOYtdIU/OQgKvYru8z9UpXXnzA74H2rasPoMfiLJLpop58Ehx/B VtbN09zO+mPCqWvkfD7KCJvYVm5rQF6MPL934qBhXfyHZxrvLHHgV1ZGDu5Z8lQ6y2dq Tx1FEs84JQhAEg/jhVnhSuHzhObYE89wDDIuGjG1pEKNov7MCFhbbVPamndne4RZxPEt fnZWSy5EbB8+1gPQpiKUEcmSP2dJMG5KbxexZAsj2LDeVpyC4NOaz6a3i5Blyfg63hot b+UQ9zKBjavBy/6f8Y9Z/eMcAciZmOWhn94Ib7JFZ+87MKiEhwF5MMjp85I1TrEIEc+r wZ3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=fOZtyyEMN5rNNSfmakfDn/Y58CCxDVl2pyhUb1kocz8=; b=SYzOMA7jxNfSwNIP8S7aXUnPH+UYUrq/YSidOyi4ubG468jOTfB3CSQhbejH5MNI6a zPdWaH8gHN3NMEWq8s/I56lOPnMatqqggUnIACYo1GpfgjNDgxFtZDyKyxfC94voMbw8 7SfiqhCiVGUz00J09IAGuK29aW4hUvxoZcve/TH6PKol7j/UIxrOcNzCg8KHpK3UVwQF LHehfiv5KPnTsS4l+Dpf4pn7PVpSywzWhz/g9Lc0qM2FV9PblI+y7Ois+eAFuSXqZZKz LSYHXCsoylsndN5SvGNAn90F6VU+KBRgIliXh9HWvy3W7U9PPIQAvk4I19WVc9VxXqYq ph7w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q13-v6si229431pgs.181.2018.10.17.02.02.30; Wed, 17 Oct 2018 02:02:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727103AbeJQQzF (ORCPT + 99 others); Wed, 17 Oct 2018 12:55:05 -0400 Received: from mx2.suse.de ([195.135.220.15]:50406 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726691AbeJQQzF (ORCPT ); Wed, 17 Oct 2018 12:55:05 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id BAA89AEFF; Wed, 17 Oct 2018 09:00:20 +0000 (UTC) Date: Wed, 17 Oct 2018 10:00:15 +0100 From: Mel Gorman To: Andrew Morton Cc: David Rientjes , Andrea Arcangeli , Michal Hocko , Vlastimil Babka , Andrea Argangeli , Zi Yan , Stefan Priebe - Profihost AG , "Kirill A. Shutemov" , linux-mm@kvack.org, LKML , Stable tree Subject: Re: [PATCH 1/2] mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings Message-ID: <20181017090015.GI6931@suse.de> References: <20181009094825.GC6931@suse.de> <20181009122745.GN8528@dhcp22.suse.cz> <20181009130034.GD6931@suse.de> <20181009142510.GU8528@dhcp22.suse.cz> <20181009230352.GE9307@redhat.com> <20181015154459.e870c30df5c41966ffb4aed8@linux-foundation.org> <20181016074606.GH6931@suse.de> <20181016153715.b40478ff2eebe8d6cf1aead5@linux-foundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline In-Reply-To: <20181016153715.b40478ff2eebe8d6cf1aead5@linux-foundation.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 16, 2018 at 03:37:15PM -0700, Andrew Morton wrote: > On Tue, 16 Oct 2018 08:46:06 +0100 Mel Gorman wrote: > > I consider this to be an unfortunate outcome. On the one hand, we have a > > problem that three people can trivially reproduce with known test cases > > and a patch shown to resolve the problem. Two of those three people work > > on distributions that are exposed to a large number of users. On the > > other, we have a problem that requires the system to be in a specific > > state and an unknown workload that suffers badly from the remote access > > penalties with a patch that has review concerns and has not been proven > > to resolve the trivial cases. In the case of distributions, the first > > patch addresses concerns with a common workload where on the other hand > > we have an internal workload of a single company that is affected -- > > which indirectly affects many users admittedly but only one entity directly. > > > > At the absolute minimum, a test case for the "system fragmentation incurs > > access penalties for a workload" scenario that could both replicate the > > fragmentation and demonstrate the problem should have been available before > > the patch was rejected. With the test case, there would be a chance that > > others could analyse the problem and prototype some fixes. The test case > > was requested in the thread and never produced so even if someone were to > > prototype fixes, it would be dependant on a third party to test and produce > > data which is a time-consuming loop. Instead, we are more or less in limbo. > > > > OK, thanks. > > But we're OK holding off for a few weeks, yes? If we do that > we'll still make it into 4.19.1. Am reluctant to merge this while > discussion, testing and possibly more development are ongoing. > Without a test case that reproduces the Google case, we are a bit stuck. Previous experience indicates that just fragmenting memory is not enough to give a reliable case as unless the unmovable/reclaimable pages are "sticky", the normal reclaim can handle it. Similarly, the access pattern of the target workload is important as it would need to be something larger than L3 cache to constantly hit the access penalty. We do not know what the exact characteristics of the Google workload are but we know that a fix for three cases is not equivalent for the Google case. The discussion has circled around wish-list items such as better fragmentation control, node-aware compaction, improved compact deferred logic and lower latencies with little in the way of actual specifics of implementation or patches. Improving fragmentation control would benefit from a workload that actually fragments so the extfrag events can be monitored as well as maybe a dump of pageblocks with mixed pages. On node-aware compaction, that was not implemented initially simply because HighMem was common and that needs to be treated as a corner case -- we cannot safely migrate pages from zone normal to highmem. That one is relatively trivial to measure as it's a functional issue. However, backing off compaction properly to maximise allocation success rates while minimising allocation latency and access latency needs a live workload that is representative. Trivial cases like the java workloads, nas or usemem won't do as they either exhibit special locality or are streaming readers/writers. Memcache might work but the driver in that case is critical to ensure the access penalties are incurred. Again, a modern example is missing. As for why this took so long to discover, it is highly likely that it's due to VM's being sized such as they typically fit in a NUMA node so it would have avoided the worst case scenarios. Furthermore, a machine dedicated to VM's has fewer concerns with respect to slab allocations and unmovable allocations fragmenting memory long-term. Finally, the worst case scenarios are encountered when there is a mix of different workloads of variable duration which may be common in a Google-like setup with different jobs being dispatched across a large network but less so in other setups where a service tends to be persistent. We already know that some of the worst performance problems take years to discover. -- Mel Gorman SUSE Labs