Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp3495383ybl; Mon, 12 Aug 2019 01:12:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqy1PLRjR1CwH/SJhTVyK8//UBR3c0uI5YCPlAFuRD5I2k2C75RGljZAZDHO1D//EyYEn58r X-Received: by 2002:a17:90a:fc95:: with SMTP id ci21mr4889057pjb.52.1565597553598; Mon, 12 Aug 2019 01:12:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565597553; cv=none; d=google.com; s=arc-20160816; b=q0x98ObV/DvGfo6EciIJW269C7g+E2/47zeB+vQYT4eng9dYJJs8ZosRfhoslQa/nH nbS2ONC89WDqZepP7Pf+O7eTp60q2WbBtOq74/emJbFSmqrxDsG5L3428nEeoxH8ZZJ4 HOBSbD7Ah/lH3iqHEYqVWG/GS8Zh3lPSCI1d9Snx808wKevJIf5iIUcSiJ9wqCpJB7Qr Zd9GDz62oA2NVB5ClDqlW2p/A+MHippPsPXpaB5uvpYpUsh6IBRpo3gtOnEbbxtTXccB 2ZPUF1hz1zXEvSM+RdPZvF2yRNLeK9q9TPtQGP+uVHAegdjWoQCRBHBIfyy4kuT5lYEj gT3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=GtW54sHDM5NbiXAOl22alGHAxcznAVcewXlq4zLQu8E=; b=fydcen7b72izSCUfs4nSU3XztQm4WPgkwZVKAFjfDJ8RoGoUG3OfIKDsl9mQr8dJEQ v5S1Uj9ogMB73YdHWjLun/rocyJQJdBUmY+gcPtPsmjcclda/TqDXq/N1nqyz06thIo1 AMZx8nEsyMf/0ACyeTJVJ/pUpEHX+XSCQUeJV0+TDguILL7X0/YsEAWnWBUujNpX9qx7 2U9UIHSwYpO2AfoTV8jjLg+hVM1wWqlN6chZxq9ionLLRmwxWVe/tz5i6tSZGOK4wnMG 0arlh2Q/4C1P6/3KuItq6CKb8R+q1vDIy1qXk8QSueX6q6pgZd1hVHMZzlE6n2QrAqIJ VQkg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a29si4275690pfg.263.2019.08.12.01.12.17; Mon, 12 Aug 2019 01:12:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727063AbfHLIJ5 (ORCPT + 99 others); Mon, 12 Aug 2019 04:09:57 -0400 Received: from mx2.suse.de ([195.135.220.15]:42366 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726528AbfHLIJ4 (ORCPT ); Mon, 12 Aug 2019 04:09:56 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 1017FAF7E; Mon, 12 Aug 2019 08:09:54 +0000 (UTC) Date: Mon, 12 Aug 2019 10:09:47 +0200 From: Michal Hocko To: Johannes Weiner Cc: Minchan Kim , Andrew Morton , LKML , linux-mm , Miguel de Dios , Wei Wang , Mel Gorman , Nicholas Piggin Subject: Re: [RFC PATCH] mm: drop mark_page_access from the unmap path Message-ID: <20190812080947.GA5117@dhcp22.suse.cz> References: <20190729083515.GD9330@dhcp22.suse.cz> <20190730121110.GA184615@google.com> <20190730123237.GR9330@dhcp22.suse.cz> <20190730123935.GB184615@google.com> <20190730125751.GS9330@dhcp22.suse.cz> <20190731054447.GB155569@google.com> <20190731072101.GX9330@dhcp22.suse.cz> <20190806105509.GA94582@google.com> <20190809124305.GQ18351@dhcp22.suse.cz> <20190809183424.GA22347@cmpxchg.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190809183424.GA22347@cmpxchg.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 09-08-19 14:34:24, Johannes Weiner wrote: > On Fri, Aug 09, 2019 at 02:43:24PM +0200, Michal Hocko wrote: > > On Tue 06-08-19 19:55:09, Minchan Kim wrote: > > > On Wed, Jul 31, 2019 at 09:21:01AM +0200, Michal Hocko wrote: > > > > On Wed 31-07-19 14:44:47, Minchan Kim wrote: > > [...] > > > > > As Nick mentioned in the description, without mark_page_accessed in > > > > > zapping part, repeated mmap + touch + munmap never acticated the page > > > > > while several read(2) calls easily promote it. > > > > > > > > And is this really a problem? If we refault the same page then the > > > > refaults detection should catch it no? In other words is the above still > > > > a problem these days? > > > > > > I admit we have been not fair for them because read(2) syscall pages are > > > easily promoted regardless of zap timing unlike mmap-based pages. > > > > > > However, if we remove the mark_page_accessed in the zap_pte_range, it > > > would make them more unfair in that read(2)-accessed pages are easily > > > promoted while mmap-based page should go through refault to be promoted. > > > > I have really hard time to follow why an unmap special handling is > > making the overall state more reasonable. > > > > Anyway, let me throw the patch for further discussion. Nick, Mel, > > Johannes what do you think? > > > > From 3821c2e66347a2141358cabdc6224d9990276fec Mon Sep 17 00:00:00 2001 > > From: Michal Hocko > > Date: Fri, 9 Aug 2019 14:29:59 +0200 > > Subject: [PATCH] mm: drop mark_page_access from the unmap path > > > > Minchan has noticed that mark_page_access can take quite some time > > during unmap: > > : I had a time to benchmark it via adding some trace_printk hooks between > > : pte_offset_map_lock and pte_unmap_unlock in zap_pte_range. The testing > > : device is 2018 premium mobile device. > > : > > : I can get 2ms delay rather easily to release 2M(ie, 512 pages) when the > > : task runs on little core even though it doesn't have any IPI and LRU > > : lock contention. It's already too heavy. > > : > > : If I remove activate_page, 35-40% overhead of zap_pte_range is gone > > : so most of overhead(about 0.7ms) comes from activate_page via > > : mark_page_accessed. Thus, if there are LRU contention, that 0.7ms could > > : accumulate up to several ms. > > > > bf3f3bc5e734 ("mm: don't mark_page_accessed in fault path") has replaced > > SetPageReferenced by mark_page_accessed arguing that the former is not > > sufficient when mark_page_accessed is removed from the fault path > > because it doesn't promote page to the active list. It is true that a > > page that is mapped by a single process might not get promoted even when > > referenced if the reclaim checks it after the unmap but does that matter > > that much? Can we cosider the page hot if there are no other > > users? Moreover we do have workingset detection in place since then and > > so a next refault would activate the page if it was really hot one. > > I do think the pages can be very hot. Think of short-lived executables > and their libraries. Like shell commands. When they run a few times or > periodically, they should be promoted to the active list and not have > to compete with streaming IO on the inactive list - the PG_referenced > doesn't really help them there, see page_check_references(). Yeah, I am aware of that. We do rely on more processes to map the page which I've tried to explain in the changelog. Btw. can we promote PageReferenced pages with zero mapcount? I am throwing that more as an idea because I haven't really thought that through yet. > Maybe the refaults will be fine - but latency expectations around > mapped page cache certainly are a lot higher than unmapped cache. > > So I'm a bit reluctant about this patch. If Minchan can be happy with > the lock batching, I'd prefer that. Yes, it seems that the regular lock drop&relock helps in Minchan's case but this is a kind of change that might have other subtle side effects. E.g. will-it-scale has noticed a regression [1], likely because the critical section is shorter and the overal throughput of the operation decreases. Now, the w-i-s is an artificial benchmark so I wouldn't lose much sleep over it normally but we have already seen real regressions when the locking pattern has changed in the past so I would by a bit cautious. As I've said, this RFC is mostly to open a discussion. I would really like to weigh the overhead of mark_page_accessed and potential scenario when refaults would be visible in practice. I can imagine that a short lived statically linked applications have higher chance of being the only user unlike libraries which are often being mapped via several ptes. But the main problem to evaluate this is that there are many other external factors to trigger the worst case. [1] http://lkml.kernel.org/r/20190806070547.GA10123@xsang-OptiPlex-9020 -- Michal Hocko SUSE Labs