Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp5742276ybi; Wed, 31 Jul 2019 02:37:21 -0700 (PDT) X-Google-Smtp-Source: APXvYqz9h5BoZdsva/zwACV0nSlHFF9Hd1m7NnOE8EW0uFWk9iGlmXxv5T3RZAR8VVyheSfdAysZ X-Received: by 2002:a62:1d8f:: with SMTP id d137mr47512123pfd.207.1564565841172; Wed, 31 Jul 2019 02:37:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564565841; cv=none; d=google.com; s=arc-20160816; b=F6x57tY0XYgzsVsm4TAnJVPe3DxE4g2tmt0ggWftlCgIxF+UU8bdj1rghA9qEC7V+p OprtvYNS9z6YU67JKmv8zMqbQ4z32oDTxdF4Tr8Wof5c3FnJ7Ulz8SRt6VdQMcAo07dq kAuwSlN1N1v4pw06cfUfd7JlGBlKjMMKRL+peuKe/C/1Ye9oQWemLERug5aX96BSjTG7 BVbd8vvbP/w0CKV0Q2SYatxnMWXB6XPeMhpIsWBEYgZEKxvKPRNcX6ItQVD3sNu/dncW ZHCsme51qsV35Ghq5w/54KGs4c82pdlf6mH1vlwRtbVMdtRY6SWDwAr1vq50dzeXyjUj sSUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=jhx6/Aw9oNPkMcp5yKnieVEF039ctGqu4bfl/yHqZbU=; b=ktuEGYDBU/qIsMhkS8A4550fHhEgAVEpXtlm/MotrAHRJkq/8i8R00HA2KjqiaoONE 3q+KxkLiqu762jNVrgy7XhbND8L+K680z++8IdXRhSmvoTXv6aDaRunwIpO4aQCYTWge xs41ai78Xnjl1kap68IlOB5157HicIUViNluRRYVirKmDHcrXaf8l58deZ6Vylq5GVqR 4CtCy7tO7vSNBFyRoYqTubmf0Bfi3ollUEP3RNNxsBtX38dH/6IKfoLlqny3y/QovHN7 dw5inZlB7v4i0fueQDcSOrNoZo9X7Qju27iIEclinNneXC11TF+M/UCqwRoWYha/D0m2 WBQw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3si29477453plr.131.2019.07.31.02.37.05; Wed, 31 Jul 2019 02:37:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727263AbfGaHVD (ORCPT + 99 others); Wed, 31 Jul 2019 03:21:03 -0400 Received: from mx2.suse.de ([195.135.220.15]:38478 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725913AbfGaHVD (ORCPT ); Wed, 31 Jul 2019 03:21:03 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id E663DAE52; Wed, 31 Jul 2019 07:21:01 +0000 (UTC) Date: Wed, 31 Jul 2019 09:21:01 +0200 From: Michal Hocko To: Minchan Kim Cc: Andrew Morton , LKML , linux-mm , Miguel de Dios , Wei Wang , Johannes Weiner , Mel Gorman , Nicholas Piggin Subject: Re: [PATCH] mm: release the spinlock on zap_pte_range Message-ID: <20190731072101.GX9330@dhcp22.suse.cz> References: <20190729071037.241581-1-minchan@kernel.org> <20190729074523.GC9330@dhcp22.suse.cz> <20190729082052.GA258885@google.com> <20190729083515.GD9330@dhcp22.suse.cz> <20190730121110.GA184615@google.com> <20190730123237.GR9330@dhcp22.suse.cz> <20190730123935.GB184615@google.com> <20190730125751.GS9330@dhcp22.suse.cz> <20190731054447.GB155569@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190731054447.GB155569@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 31-07-19 14:44:47, Minchan Kim wrote: > On Tue, Jul 30, 2019 at 02:57:51PM +0200, Michal Hocko wrote: > > [Cc Nick - the email thread starts http://lkml.kernel.org/r/20190729071037.241581-1-minchan@kernel.org > > A very brief summary is that mark_page_accessed seems to be quite > > expensive and the question is whether we still need it and why > > SetPageReferenced cannot be used instead. More below.] > > > > On Tue 30-07-19 21:39:35, Minchan Kim wrote: [...] > > > commit bf3f3bc5e73 > > > Author: Nick Piggin > > > Date: Tue Jan 6 14:38:55 2009 -0800 > > > > > > mm: don't mark_page_accessed in fault path > > > > > > Doing a mark_page_accessed at fault-time, then doing SetPageReferenced at > > > unmap-time if the pte is young has a number of problems. > > > > > > mark_page_accessed is supposed to be roughly the equivalent of a young pte > > > for unmapped references. Unfortunately it doesn't come with any context: > > > after being called, reclaim doesn't know who or why the page was touched. > > > > > > So calling mark_page_accessed not only adds extra lru or PG_referenced > > > manipulations for pages that are already going to have pte_young ptes anyway, > > > but it also adds these references which are difficult to work with from the > > > context of vma specific references (eg. MADV_SEQUENTIAL pte_young may not > > > wish to contribute to the page being referenced). > > > > > > Then, simply doing SetPageReferenced when zapping a pte and finding it is > > > young, is not a really good solution either. SetPageReferenced does not > > > correctly promote the page to the active list for example. So after removing > > > mark_page_accessed from the fault path, several mmap()+touch+munmap() would > > > have a very different result from several read(2) calls for example, which > > > is not really desirable. > > > > Well, I have to say that this is rather vague to me. Nick, could you be > > more specific about which workloads do benefit from this change? Let's > > say that the zapped pte is the only referenced one and then reclaim > > finds the page on inactive list. We would go and reclaim it. But does > > that matter so much? Hot pages would be referenced from multiple ptes > > very likely, no? > > As Nick mentioned in the description, without mark_page_accessed in > zapping part, repeated mmap + touch + munmap never acticated the page > while several read(2) calls easily promote it. And is this really a problem? If we refault the same page then the refaults detection should catch it no? In other words is the above still a problem these days? -- Michal Hocko SUSE Labs