Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1763345imu; Wed, 21 Nov 2018 01:22:41 -0800 (PST) X-Google-Smtp-Source: AJdET5c8Xkdf7aa+okhv3GqSFqlw1xcev4flF9u8aNrHDgYeyDRCfLt0/I3izBOroiub1boVYHkn X-Received: by 2002:a62:528e:: with SMTP id g136mr6238116pfb.111.1542792161512; Wed, 21 Nov 2018 01:22:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542792161; cv=none; d=google.com; s=arc-20160816; b=YUDu62dP7RCz8sbgVj34UfkoQUn2ewwY912icRdb/xCjcHT28LcF2idMzqYLLuTmrC JvHRgbClQx5e5Yx0HGEeJ+AhGTzBJVJW+/igG4GsBtbSo/29Wm7epsHEN0dgK6KfEb1E qsxL55DHQzQJvNDXpk+DE0/cqh4/Sek5Fr5scM2cGHk/IKJhjfeaZ30q1GuYvQgJqD4C /4YPt5vt4P7cRiu673c7LdvYeIXhRY0wBb1WgTeoJ5aerg/A7CL+g6gN+18i9A09Fyjo u4BXP2X+PrlVbiJmf8qcu6uCpdp9CHQlNZkGERpR/pTjGyYWofmEnxgWaf2DYGtGOFw/ OwYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=FqEmlfcADko7Pl6LhABUKpFfpocp/JV+eKKbspx1Yp8=; b=tTrlxky/zvR0ygw6OBUCqVOiv+Qbkr1MO8NPfBt5fKUEbSdFlMxRmHCbjYBsxlzUwf jGYIHfkoD9z5wf7Swy5o9LvLPt93gHRjp7vGqM9wjdFXU82LRm0BFQ9LaR+Nwzs3Y35t BbnuxrfmN6NwjkLeHKaY9aU++4U7Pc9ZRDfhN8V7W605hNg7AMLRe4H/+BUwO4dvao+W dMei2VD1kJBT2e53ymFV8LTBz7BYtOo50FfT6Dn2rVHBT0nXUAy1E2ixdmnjlLfEwtum tmcv06Zu5eXS4iyri6n4FKxlzMnHXbwZ5v4K/mbyvt1yiVCZlG9oq6A5fOZssIHNvtH3 zxsg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z126-v6si50968348pfb.280.2018.11.21.01.22.25; Wed, 21 Nov 2018 01:22:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728444AbeKUSc7 (ORCPT + 99 others); Wed, 21 Nov 2018 13:32:59 -0500 Received: from mx2.suse.de ([195.135.220.15]:35298 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725999AbeKUSc7 (ORCPT ); Wed, 21 Nov 2018 13:32:59 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 6BE09AC5E; Wed, 21 Nov 2018 07:59:29 +0000 (UTC) Date: Wed, 21 Nov 2018 08:59:28 +0100 From: Michal Hocko To: David Rientjes Cc: Greg Kroah-Hartman , linux-kernel@vger.kernel.org, stable@vger.kernel.org, Andrea Arcangeli , Stefan Priebe , Alex Williamson , Mel Gorman , Zi Yan , Vlastimil Babka , "Kirill A. Shutemov" , Andrew Morton , Linus Torvalds Subject: Re: [PATCH 4.4 131/160] mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings Message-ID: <20181121075928.GJ12932@dhcp22.suse.cz> References: <20181119162630.031306128@linuxfoundation.org> <20181119162643.032920932@linuxfoundation.org> <20181120074447.GZ22247@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 20-11-18 15:53:10, David Rientjes wrote: > On Tue, 20 Nov 2018, Michal Hocko wrote: > > > On Mon 19-11-18 14:16:24, David Rientjes wrote: > > > On Mon, 19 Nov 2018, Greg Kroah-Hartman wrote: > > > > > > > 4.4-stable review patch. If anyone has any objections, please let me know. > > > > > > > > > > As I noted when this patch was originally proposed and when I nacked it[*] > > > because it causes a 13.9% increase in remote memory access latency and up > > > to 40% increase in remote memory allocation latency on much of our > > > software stack that uses MADV_HUGEPAGE after mremapping the text segment > > > to memory backed by hugepages, I don't think this is stable material. > > > > There was a wider consensus that this is the most minimal fix for users > > who see a regression introduced by 5265047ac301 ("mm, thp: really > > limit transparent hugepage allocation to local node"). As it has been > > discussed extensively there is no universal win but we should always opt > > for the safer side which this patch is accomplishing. The changelog goes > > in length explaining them along with numbers. I am not happy that your > > particular workload is suffering but this area certainly requires much > > more changes to satisfy wider range of users. > > > > > The 4.4 kernel is almost three years old and this changes the NUMA > > > locality of any user of MADV_HUGEPAGE. > > > > Yes and we have seen bug reports as we adopted this older kernel only > > now. > > I think the responsible thing to do would be allow users to remain on > their stable kernel that they know works, whether that's 4.4 or any of the > others this is proposed for, and downgrade from any current kernel release > that causes their workloads to have such severe regressions once they try > a kernel with this commit. But we do know that there are people affected on 4.4 kernel. Besides that we can revert in the stable tree as soon as we see bug reports on new stable tree releases. Really, there is no single proper behavior. It was a mistake to merge 5265047ac301. Since then we are in an unfortunate situation that some workload might have started to depend on the new behavior. But rather than repeating the previous long discussion I would call for a new one which actually deals with fallouts. AFAIR there is a patch series to reduce the fragmentation issues by Mel with a zero feedback so far. I also think we should start discussing a new memory policy to establish the semantic you are after. -- Michal Hocko SUSE Labs