Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp263716ybl; Fri, 9 Aug 2019 05:46:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqzHhC7JeMVkXwHDw91egghPD1IOKIWZYHXMnzisoDo3cX41ufha0c8mQcFC75MeOkl/V3R4 X-Received: by 2002:a17:902:2884:: with SMTP id f4mr18561986plb.286.1565354796128; Fri, 09 Aug 2019 05:46:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565354796; cv=none; d=google.com; s=arc-20160816; b=WqPVOa7RyWfbl/gAZ7m1q278R/5R+3/4lIxHuACszcS0yb9dpvZwjTuGd8qYFpQuhk 3+SqADJk8CrZErQeTMQK2Kk3FtsIH9qXBzjtlGRqNs0DIVLfJX/yv+WF6CxcPpfVWCJg wvrVjGpT7lvH4Ver0Hlcej4fgQhc22Evy5HnEspoXBB7DITJHh4Xh08RdXY682X/kH0+ Dn4tXqGmQ8aiAZRUSbkf8yKyUPVmkDlUAGdymVlMR/eEXaKY17oeDtZZRtLxSrHckLlJ rLv5eYNaBLLFE8dddzmz98IOndmiIq5B3FZkjymgF/rk1Pi1nEqVYB4R/eYgf2MwEcPp 66gw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=qihvdteIfLvHRWEnF/5fPjtUVrcw+kHezCMiuZJhEco=; b=nFQVEy0mANydv1EC5CK/5P9T3u9hEiWM+FVnQkbFX0wa20PuzSkA3Rvm4ywcwIebAz OU8KyY+tgbqd8dn3Tpo2ZWifwfzSTuuFc7W36x/VYMlUO4U5MpQ+WAfn0n1u0UkQBK75 gEwqp6SNHbfSWp0Voynbuj9sWXWQhHyY/YAZPYytna0kgNSGlqsvGdOKdpr8QRBREQ6h ESw4OhB3ADmNIKpGJmpIu1Fu91h287rsUfuyzzAr1S+HWqRysDC3O7y1ic9msLTc9o97 4+BrvEWU+76h514VUq2kQzKkUx+Pm/C0Tp0ItaXP6bEtoyYhJdFD1DHBUpv4F/ZwLtZh f91w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y3si4402945pjv.50.2019.08.09.05.46.20; Fri, 09 Aug 2019 05:46:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2406854AbfHIMn2 (ORCPT + 99 others); Fri, 9 Aug 2019 08:43:28 -0400 Received: from mx2.suse.de ([195.135.220.15]:38074 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2406516AbfHIMn1 (ORCPT ); Fri, 9 Aug 2019 08:43:27 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 7472BAF10; Fri, 9 Aug 2019 12:43:25 +0000 (UTC) Date: Fri, 9 Aug 2019 14:43:24 +0200 From: Michal Hocko To: Minchan Kim Cc: Andrew Morton , LKML , linux-mm , Miguel de Dios , Wei Wang , Johannes Weiner , Mel Gorman , Nicholas Piggin Subject: [RFC PATCH] mm: drop mark_page_access from the unmap path Message-ID: <20190809124305.GQ18351@dhcp22.suse.cz> References: <20190729074523.GC9330@dhcp22.suse.cz> <20190729082052.GA258885@google.com> <20190729083515.GD9330@dhcp22.suse.cz> <20190730121110.GA184615@google.com> <20190730123237.GR9330@dhcp22.suse.cz> <20190730123935.GB184615@google.com> <20190730125751.GS9330@dhcp22.suse.cz> <20190731054447.GB155569@google.com> <20190731072101.GX9330@dhcp22.suse.cz> <20190806105509.GA94582@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190806105509.GA94582@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 06-08-19 19:55:09, Minchan Kim wrote: > On Wed, Jul 31, 2019 at 09:21:01AM +0200, Michal Hocko wrote: > > On Wed 31-07-19 14:44:47, Minchan Kim wrote: [...] > > > As Nick mentioned in the description, without mark_page_accessed in > > > zapping part, repeated mmap + touch + munmap never acticated the page > > > while several read(2) calls easily promote it. > > > > And is this really a problem? If we refault the same page then the > > refaults detection should catch it no? In other words is the above still > > a problem these days? > > I admit we have been not fair for them because read(2) syscall pages are > easily promoted regardless of zap timing unlike mmap-based pages. > > However, if we remove the mark_page_accessed in the zap_pte_range, it > would make them more unfair in that read(2)-accessed pages are easily > promoted while mmap-based page should go through refault to be promoted. I have really hard time to follow why an unmap special handling is making the overall state more reasonable. Anyway, let me throw the patch for further discussion. Nick, Mel, Johannes what do you think? From 3821c2e66347a2141358cabdc6224d9990276fec Mon Sep 17 00:00:00 2001 From: Michal Hocko Date: Fri, 9 Aug 2019 14:29:59 +0200 Subject: [PATCH] mm: drop mark_page_access from the unmap path Minchan has noticed that mark_page_access can take quite some time during unmap: : I had a time to benchmark it via adding some trace_printk hooks between : pte_offset_map_lock and pte_unmap_unlock in zap_pte_range. The testing : device is 2018 premium mobile device. : : I can get 2ms delay rather easily to release 2M(ie, 512 pages) when the : task runs on little core even though it doesn't have any IPI and LRU : lock contention. It's already too heavy. : : If I remove activate_page, 35-40% overhead of zap_pte_range is gone : so most of overhead(about 0.7ms) comes from activate_page via : mark_page_accessed. Thus, if there are LRU contention, that 0.7ms could : accumulate up to several ms. bf3f3bc5e734 ("mm: don't mark_page_accessed in fault path") has replaced SetPageReferenced by mark_page_accessed arguing that the former is not sufficient when mark_page_accessed is removed from the fault path because it doesn't promote page to the active list. It is true that a page that is mapped by a single process might not get promoted even when referenced if the reclaim checks it after the unmap but does that matter that much? Can we cosider the page hot if there are no other users? Moreover we do have workingset detection in place since then and so a next refault would activate the page if it was really hot one. Drop the expensive mark_page_accessed and restore SetPageReferenced to transfer the reference information into the struct page for now to reduce the unmap overhead. Should we find workloads that noticeably depend on this behavior we should find a way to make mark_page_accessed less expensive. Signed-off-by: Michal Hocko --- mm/memory.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mm/memory.c b/mm/memory.c index e2bb51b6242e..ced521df8ee7 100644 --- a/mm/memory.c +++ b/mm/memory.c @@ -1053,7 +1053,7 @@ static unsigned long zap_pte_range(struct mmu_gather *tlb, } if (pte_young(ptent) && likely(!(vma->vm_flags & VM_SEQ_READ))) - mark_page_accessed(page); + SetPageReferenced(page); } rss[mm_counter(page)]--; page_remove_rmap(page, false); -- 2.20.1 -- Michal Hocko SUSE Labs