Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4585234ybi; Mon, 3 Jun 2019 13:35:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqztdi8UCA9/HicJofRWUUZ+IfnImfluCl4VLW7ResiumEh8CrzYSjBYIxZGlKqA9mNpQuhy X-Received: by 2002:a17:902:6b47:: with SMTP id g7mr15648715plt.105.1559594118723; Mon, 03 Jun 2019 13:35:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559594118; cv=none; d=google.com; s=arc-20160816; b=ZLIJU5R4OSEjrMYRYSt1EJrwXm0dOe/m5+5S0eXgLY7NviaoyEoPytaNCUsBr62yNp XFszmEOEMx+tzTRpeyn5lPNzn9/6YgwXfGiP/3jukFaiHERlqcltLggs2g8De/5HLkyd JjrNUi6UTEIj0gVPDyfjCAZXoSOKiG7TV1VTHyPJ1c79G1qdqZiOgbWBA/2t0vyJWyFd RwSESXoZ/Z7kAPKRfJ8NZ5T+pik4DGEsPVWmjjBBW+rjfdha8RlHALsgnNXRMpBhacI6 XRYzTLNtG1ySaTCJLw3AKZwsxWdhLNzWTs3kQFSEwHyo5C1ob8t8xLx66r33fQ45a5Kk IiKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=xZMXF1O3L2BCUBbSh1uUkb+W06NvGrlgRqLNll5Jgw4=; b=vklrn42gZ3+098OhAdnwPTJkD0d0p3723miFT/jBcOZOO8sZAgwhrzr+fF0NwUKHVL jGX7F5LbxBPkPHiOrRTnQ9NXEuesBuQnzoZMBiGEiqh8bZo+UkG1GRsG+xht9GSUEX38 YFy0fLqKvEJlkTlu1u9KxRz6yoCfYUnqGgXvQO4GKG4J5dxoc2Baz/uZMp6Moj3HFvcQ 3flptQQ2JC/lCrnmbCRYmGGbfQq8uD3bLEzfyH5mkTxF7U2MHMg+NVu9KeimWBs8n9Vv JwN+swpn7RSH0h/EtonKEdqHvPgpj2alUhE+3tqteo7VvW84Gcl6CKw7cqoGFf4XgbK8 mVNQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b12si21993019pfd.79.2019.06.03.13.35.02; Mon, 03 Jun 2019 13:35:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726682AbfFCUcg (ORCPT + 99 others); Mon, 3 Jun 2019 16:32:36 -0400 Received: from mx2.suse.de ([195.135.220.15]:35232 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726163AbfFCUcf (ORCPT ); Mon, 3 Jun 2019 16:32:35 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 633F7ACF8; Mon, 3 Jun 2019 20:32:33 +0000 (UTC) Date: Mon, 3 Jun 2019 22:32:30 +0200 From: Michal Hocko To: Johannes Weiner Cc: Minchan Kim , Andrew Morton , linux-mm , LKML , linux-api@vger.kernel.org, Tim Murray , Joel Fernandes , Suren Baghdasaryan , Daniel Colascione , Shakeel Butt , Sonny Rao , Brian Geffon , jannh@google.com, oleg@redhat.com, christian@brauner.io, oleksandr@redhat.com, hdanton@sina.com Subject: Re: [RFCv2 1/6] mm: introduce MADV_COLD Message-ID: <20190603203230.GB22799@dhcp22.suse.cz> References: <20190531064313.193437-1-minchan@kernel.org> <20190531064313.193437-2-minchan@kernel.org> <20190531084752.GI6896@dhcp22.suse.cz> <20190531133904.GC195463@google.com> <20190531140332.GT6896@dhcp22.suse.cz> <20190531143407.GB216592@google.com> <20190603071607.GB4531@dhcp22.suse.cz> <20190603172717.GA30363@cmpxchg.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190603172717.GA30363@cmpxchg.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 03-06-19 13:27:17, Johannes Weiner wrote: > On Mon, Jun 03, 2019 at 09:16:07AM +0200, Michal Hocko wrote: > > On Fri 31-05-19 23:34:07, Minchan Kim wrote: > > > On Fri, May 31, 2019 at 04:03:32PM +0200, Michal Hocko wrote: > > > > On Fri 31-05-19 22:39:04, Minchan Kim wrote: > > > > > On Fri, May 31, 2019 at 10:47:52AM +0200, Michal Hocko wrote: > > > > > > On Fri 31-05-19 15:43:08, Minchan Kim wrote: > > > > > > > When a process expects no accesses to a certain memory range, it could > > > > > > > give a hint to kernel that the pages can be reclaimed when memory pressure > > > > > > > happens but data should be preserved for future use. This could reduce > > > > > > > workingset eviction so it ends up increasing performance. > > > > > > > > > > > > > > This patch introduces the new MADV_COLD hint to madvise(2) syscall. > > > > > > > MADV_COLD can be used by a process to mark a memory range as not expected > > > > > > > to be used in the near future. The hint can help kernel in deciding which > > > > > > > pages to evict early during memory pressure. > > > > > > > > > > > > > > Internally, it works via deactivating pages from active list to inactive's > > > > > > > head if the page is private because inactive list could be full of > > > > > > > used-once pages which are first candidate for the reclaiming and that's a > > > > > > > reason why MADV_FREE move pages to head of inactive LRU list. Therefore, > > > > > > > if the memory pressure happens, they will be reclaimed earlier than other > > > > > > > active pages unless there is no access until the time. > > > > > > > > > > > > [I am intentionally not looking at the implementation because below > > > > > > points should be clear from the changelog - sorry about nagging ;)] > > > > > > > > > > > > What kind of pages can be deactivated? Anonymous/File backed. > > > > > > Private/shared? If shared, are there any restrictions? > > > > > > > > > > Both file and private pages could be deactived from each active LRU > > > > > to each inactive LRU if the page has one map_count. In other words, > > > > > > > > > > if (page_mapcount(page) <= 1) > > > > > deactivate_page(page); > > > > > > > > Why do we restrict to pages that are single mapped? > > > > > > Because page table in one of process shared the page would have access bit > > > so finally we couldn't reclaim the page. The more process it is shared, > > > the more fail to reclaim. > > > > So what? In other words why should it be restricted solely based on the > > map count. I can see a reason to restrict based on the access > > permissions because we do not want to simplify all sorts of side channel > > attacks but memory reclaim is capable of reclaiming shared pages and so > > far I haven't heard any sound argument why madvise should skip those. > > Again if there are any reasons, then document them in the changelog. > > I think it makes sense. It could be explained, but it also follows > established madvise semantics, and I'm not sure it's necessarily > Minchan's job to re-iterate those. > > Sharing isn't exactly transparent to userspace. The kernel does COW, > ksm etc. When you madvise, you can really only speak for your own > reference to that memory - "*I* am not using this." > > This is in line with other madvise calls: MADV_DONTNEED clears the > local page table entries and drops the corresponding references, so > shared pages won't get freed. MADV_FREE clears the pte dirty bit and > also has explicit mapcount checks before clearing PG_dirty, so again > shared pages don't get freed. Right, being consistent with other madvise syscalls is certainly a way to go. And I am not pushing one way or another, I just want this to be documented with a reasoning behind. Consistency is certainly an argument to use. On the other hand these non-destructive madvise operations are quite different and the shared policy might differ as a result as well. We are aging objects rather than destroying them after all. Being able to age a pagecache with a sufficient privileges sounds like a useful usecase to me. In other words you are able to cause the same effect indirectly without the madvise operation so it kinda makes sense to allow it in a more sophisticated way. That being said, madvise is just a _hint_ and the kernel will be always free to ignore it so the future implementation might change so we can start simple and consistent with existing MADV_$FOO operations now and extend later on. But let's document the intention in the changelog and make the decision clear. I am sorry to be so anal about this but I have seen so many ad-hoc policies that were undocumented and it was so hard to guess when revisiting later on and make some sense of it. -- Michal Hocko SUSE Labs