Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp3722755ybv; Tue, 25 Feb 2020 06:16:04 -0800 (PST) X-Google-Smtp-Source: APXvYqz99bY3XVfdzcbfCJy2hb39B6WI+UnMGiw9Qzbsm8ZZ0Dsv6LqE9K3q2EQoDFv9069TECwT X-Received: by 2002:a9d:7d9a:: with SMTP id j26mr42574148otn.21.1582640164265; Tue, 25 Feb 2020 06:16:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582640164; cv=none; d=google.com; s=arc-20160816; b=z8tznJ11yabTdVBo1P9WS6e8BD7DJqg1Lp1LAVLA3lTCSLbZw1QEKf7WkNf+Znc5m/ TQ4XFbadzq4T6kmxrt2XZfMDynLljKuQy6uO7NLFIEcJvTIitSvIQRUhp9/PtgT8JAdE L/WvFmECA5rG4xn4I1eIivTYWXaOmxsjbR5sIouE0Ej2eAFkT/rMf4kUv5ILqHC3Fv04 LmcwVdXP0ekA0oc37XApk7VnB1XK4jmuon6UNjHDdUn3NQxn/Xagfp1+Uglm/bfAnjMS 0iuN8YIgsZ/JbKZWYIJm0zvtX6ESSTwmXcswffsMCIq7P+HN8Jya28lD5obhxlnX0yNR gDAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=ZYjUbdQfGM2LnysHiFkwDSVymaBuIwDi+xwJT4wUWqw=; b=bQpw7bkty5Eem1LWU8Y5AEbOBw7YitpO5NfRGTm5oo3tvfJNxkikXjfd9wfess80zV hQhSm7w41F50umIN3vJeQbi5F3zKbtyl+zDCDW03Kx7d3tMM5WJrrn7aGe8iD3quHO8S vUWlQICp6UYNDibEjDMenqu5WVxbuBc6RUbnL+zhQaqkVKuMZoCsY+z2flNShMpDyxCi VpRsjkLLN/qZ7pu5/fd8NMw/n7LJ3J3WSrg7m9xTu3ltT7fARTkG2x8gLnpzxMfQPsB9 mZTNYCRGyumUg9rrCqjDa6kH5HiV6xWEn4n6tgttN/xxdqQSBD0aJ9jaZKZkHRutHnsP SdRg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v1si7982415otp.91.2020.02.25.06.15.48; Tue, 25 Feb 2020 06:16:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730575AbgBYOPi (ORCPT + 99 others); Tue, 25 Feb 2020 09:15:38 -0500 Received: from outbound-smtp09.blacknight.com ([46.22.139.14]:33927 "EHLO outbound-smtp09.blacknight.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729065AbgBYOPh (ORCPT ); Tue, 25 Feb 2020 09:15:37 -0500 Received: from mail.blacknight.com (pemlinmail05.blacknight.ie [81.17.254.26]) by outbound-smtp09.blacknight.com (Postfix) with ESMTPS id EA0691C35F1 for ; Tue, 25 Feb 2020 14:15:35 +0000 (GMT) Received: (qmail 1851 invoked from network); 25 Feb 2020 14:15:35 -0000 Received: from unknown (HELO stampy.112glenside.lan) (mgorman@techsingularity.net@[84.203.18.57]) by 81.17.254.9 with ESMTPA; 25 Feb 2020 14:15:35 -0000 From: Mel Gorman To: Andrew Morton Cc: Michal Hocko , Vlastimil Babka , Ivan Babrou , Rik van Riel , Linux-MM , Linux Kernel Mailing List , Mel Gorman Subject: [PATCH 0/3] Limit runaway reclaim due to watermark boosting Date: Tue, 25 Feb 2020 14:15:31 +0000 Message-Id: <20200225141534.5044-1-mgorman@techsingularity.net> X-Mailer: git-send-email 2.16.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Ivan Babrou reported the following Commit 1c30844d2dfe ("mm: reclaim small amounts of memory when an external fragmentation event occurs") introduced undesired effects in our environment. * NUMA with 2 x CPU * 128GB of RAM * THP disabled * Upgraded from 4.19 to 5.4 Before we saw free memory hover at around 1.4GB with no spikes. After the upgrade we saw some machines decide that they need a lot more than that, with frequent spikes above 10GB, often only on a single numa node. There have been a few reports recently that might be watermark boost related. Unfortunately, finding someone that can reproduce the problem and test a patch has been problematic. This series intends to limit potential damage only. Patch 1 disables boosting on small memory systems. Patch 2 disables boosting by default if THP is disabled on the kernel command line on the basis that boosting primarily helps THP allocation latency. It is not touched at runtime to avoid overriding an explicit user request Patch 3 disables boosting if kswapd priority is elevateed to avoid excessive reclaim. mm/huge_memory.c | 1 + mm/internal.h | 6 +++++- mm/page_alloc.c | 6 ++++-- mm/vmscan.c | 46 +++++++++++++++++++++++++++++++--------------- 4 files changed, 41 insertions(+), 18 deletions(-) -- 2.16.4