Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp382117imu; Tue, 20 Nov 2018 00:26:37 -0800 (PST) X-Google-Smtp-Source: AJdET5dVg+o8AOTC1SZsOHa2oCn2wnpq+/e23IQ3ufNi305BfDbGanbIezPjA9jU8pH0hMvOZaxp X-Received: by 2002:a62:7504:: with SMTP id q4mr1215294pfc.180.1542702397583; Tue, 20 Nov 2018 00:26:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542702397; cv=none; d=google.com; s=arc-20160816; b=KoHN+9j48wdxDaPPDUr38Dr8TVo7S9icr/2f6rXrjwiWbW7CJYz9Ryy+xL72PFdO42 Hah2MTocyM7B9W10umv0nvY2+mkUxoEHyiQ6Vge1ADhFszOe2Unz/hRZgQbuXjDjYvGk 6xwGgMzxEz062skb3Ad5XCtGeMQkOzbUDlUqx0UdPFJRaahRyw2vWJ0K/dxR5bHGx0RC GYSPW9BBtavHzwa26jJuVFcU9DFEXvlZG2NC75ydIWjSVzA4HjJw+pqLEoVHkZHr147q TyWoU/eeHpz7zGjubOXs6QhR1b7HPPyEj6hY9ixtWLe4AU/qipsvwBc/4FnaUTq4AZHR R98g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=NARYvBY7Fdit4rjnwVQMPyqLUBYxq99igD1IFsnQeqQ=; b=v+Yci14p+JWSHrXxqtYhXebGgCOfFLTAvlEmnnO/UP3MYz00J42SdS1zdOkPrDkcnd NKj7biDy0Zbr23pB48iVSaSb01G6AWpSkvndNM2DVaDyDQcTiuMkdIMqIhm2NPOpzNoO 1p9XI9qc7kryswb3iruquj7U4hqRcwUdG5MxPfbN1UOhl+N5zcmdGxfu6nQcW5ntg4GD A7Cb+u1nY8G5A7OM7FVhY5AvWd48FkDsyiGcqf650lxV4+Wt8OJb5CvIVlPjb6DoOlS2 vpkPwbHy36cKHrU7k43iPUbNWtl96tqU6L1PCBoOsXrPIGoqm1NDnNv4BuwmeLQJM8kT p/Dg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e89si2318084plb.401.2018.11.20.00.26.22; Tue, 20 Nov 2018 00:26:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725876AbeKTSMe (ORCPT + 99 others); Tue, 20 Nov 2018 13:12:34 -0500 Received: from mx2.suse.de ([195.135.220.15]:46536 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725770AbeKTSMe (ORCPT ); Tue, 20 Nov 2018 13:12:34 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 6D08EAC9F; Tue, 20 Nov 2018 07:44:49 +0000 (UTC) Date: Tue, 20 Nov 2018 08:44:47 +0100 From: Michal Hocko To: David Rientjes Cc: Greg Kroah-Hartman , linux-kernel@vger.kernel.org, stable@vger.kernel.org, Andrea Arcangeli , Stefan Priebe , Alex Williamson , Mel Gorman , Zi Yan , Vlastimil Babka , "Kirill A. Shutemov" , Andrew Morton , Linus Torvalds Subject: Re: [PATCH 4.4 131/160] mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings Message-ID: <20181120074447.GZ22247@dhcp22.suse.cz> References: <20181119162630.031306128@linuxfoundation.org> <20181119162643.032920932@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 19-11-18 14:16:24, David Rientjes wrote: > On Mon, 19 Nov 2018, Greg Kroah-Hartman wrote: > > > 4.4-stable review patch. If anyone has any objections, please let me know. > > > > As I noted when this patch was originally proposed and when I nacked it[*] > because it causes a 13.9% increase in remote memory access latency and up > to 40% increase in remote memory allocation latency on much of our > software stack that uses MADV_HUGEPAGE after mremapping the text segment > to memory backed by hugepages, I don't think this is stable material. There was a wider consensus that this is the most minimal fix for users who see a regression introduced by 5265047ac301 ("mm, thp: really limit transparent hugepage allocation to local node"). As it has been discussed extensively there is no universal win but we should always opt for the safer side which this patch is accomplishing. The changelog goes in length explaining them along with numbers. I am not happy that your particular workload is suffering but this area certainly requires much more changes to satisfy wider range of users. > The 4.4 kernel is almost three years old and this changes the NUMA > locality of any user of MADV_HUGEPAGE. Yes and we have seen bug reports as we adopted this older kernel only now. -- Michal Hocko SUSE Labs