Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp142897rdb; Thu, 30 Nov 2023 00:15:03 -0800 (PST) X-Google-Smtp-Source: AGHT+IGTwPnY5xt0Y2oRNziUmqB8necuHUnHj2EZKnBYYOSY8iF10fHuO6dOAIrRkw+gJCtU94Oz X-Received: by 2002:a9d:6f0a:0:b0:6d8:5517:2421 with SMTP id n10-20020a9d6f0a000000b006d855172421mr3563818otq.11.1701332103685; Thu, 30 Nov 2023 00:15:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701332103; cv=none; d=google.com; s=arc-20160816; b=wRWAKFKxp+qXhlykUobs8BT8HW6XkJckECGLx1t02sQgJLRa8FX8/H0Uk53g9G9nP4 f9FlR8pYsLPdvP8+NDtJA/S+8WgRtr6Vi9ya/iGNrAbO2qiI9tpm/FQnAkdxsdc9cLNy a6J+plc9NVX/hvi91iPPUfn/uv+AnApKc++q3IFNzeh2A+N3zVdeMvfCAOEeKqWUXy9B iLA6LB37GdMLkCog+jfjGJi4gt72ehxlzb1LNqHxZ8aXUk8iBap/UW+2Y9cX5YwLFwDO mUMhte0nUSqaQnEn+5SrwU1A0VS6V3C2lAGolciYmkk6E7TVJNQeIlYh2yRJ9LHm6FfR IuxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=tLcNagkjKoWDAXT9DfIt7WY731/gtynNv+fjSnpK9l8=; fh=DA+T9F8AovCHKpaTy2H/O7bcQeP85gT8yIWFSGUV5lI=; b=iu2Bh2mcQwhHdmKRskTriS35i0zmZ44c/ueXC/NbjjMLHnLKzCA1r4u0AyXErSoIpm /MlGzxigYIU74qJd4v/Ea79nxOSEEsJNp1VeME6WgreTpFMreQI3WNREeFG5VHu2VgWW k+Oj7alfZyHHnQGHea8x4nYQj8KETc1qX3ZyeLCzUiw0ietEvu8tmFSZbGiSqMeCLXw6 HJOmJgl00fplTZH1FQ6IjaqMYB8TftZFUXsp1WY1l5q1xHDLjFzMPxEfq9YoR6Rgc+MN UHt6iJj2OVpje/BxOFbjgfPAX9dvNsBQnR38vcuvCN3g34f3ZOjHeG9y+5R+48UuIYBT h3LA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Return-Path: Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id l4-20020a656804000000b005b99bfe3301si861175pgt.462.2023.11.30.00.15.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Nov 2023 00:15:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id D4ABA826E8CD; Thu, 30 Nov 2023 00:15:00 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344840AbjK3IOh (ORCPT + 99 others); Thu, 30 Nov 2023 03:14:37 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60604 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231714AbjK3IOg (ORCPT ); Thu, 30 Nov 2023 03:14:36 -0500 Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2a07:de40:b251:101:10:150:64:1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 25E80A3 for ; Thu, 30 Nov 2023 00:14:42 -0800 (PST) Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id B8D2F21AA3; Thu, 30 Nov 2023 08:14:40 +0000 (UTC) Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id 9A8E21342E; Thu, 30 Nov 2023 08:14:40 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id yeW3InBEaGUZaQAAD6G6ig (envelope-from ); Thu, 30 Nov 2023 08:14:40 +0000 Date: Thu, 30 Nov 2023 09:14:35 +0100 From: Michal Hocko To: Kent Overstreet Cc: Roman Gushchin , Qi Zheng , Muchun Song , Linux-MM , linux-kernel@vger.kernel.org, Andrew Morton , Dave Chinner Subject: Re: [PATCH 2/7] mm: shrinker: Add a .to_text() method for shrinkers Message-ID: References: <20231123212411.s6r5ekvkklvhwfra@moria.home.lan> <4caadff7-1df0-45cc-9d43-e616f9e4ddb3@bytedance.com> <20231125003009.tbaxuquny43uwei3@moria.home.lan> <76A1EE85-B62C-49B3-889C-80F9A2A88040@linux.dev> <20231128035345.5c7yc7jnautjpfoc@moria.home.lan> <20231129231147.7msiocerq7phxnyu@moria.home.lan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231129231147.7msiocerq7phxnyu@moria.home.lan> X-Spam-Level: Authentication-Results: smtp-out1.suse.de; none X-Rspamd-Server: rspamd2 X-Spamd-Result: default: False [-4.00 / 50.00]; REPLY(-4.00)[] X-Spam-Score: -4.00 X-Rspamd-Queue-Id: B8D2F21AA3 X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Thu, 30 Nov 2023 00:15:00 -0800 (PST) On Wed 29-11-23 18:11:47, Kent Overstreet wrote: > On Wed, Nov 29, 2023 at 10:14:54AM +0100, Michal Hocko wrote: > > On Tue 28-11-23 16:34:35, Roman Gushchin wrote: > > > On Tue, Nov 28, 2023 at 02:23:36PM +0800, Qi Zheng wrote: > > [...] > > > > Now I think adding this method might not be a good idea. If we allow > > > > shrinkers to report thier own private information, OOM logs may become > > > > cluttered. Most people only care about some general information when > > > > troubleshooting OOM problem, but not the private information of a > > > > shrinker. > > > > > > I agree with that. > > > > > > It seems that the feature is mostly useful for kernel developers and it's easily > > > achievable by attaching a bpf program to the oom handler. If it requires a bit > > > of work on the bpf side, we can do that instead, but probably not. And this > > > solution can potentially provide way more information in a more flexible way. > > > > > > So I'm not convinced it's a good idea to make the generic oom handling code > > > more complicated and fragile for everybody, as well as making oom reports differ > > > more between kernel versions and configurations. > > > > Completely agreed! From my many years of experience of oom reports > > analysing from production systems I would conclude the following categories > > - clear runaways (and/or memory leaks) > > - userspace consumers - either shmem or anonymous memory > > predominantly consumes the memory, swap is either depleted > > or not configured. > > OOM report is usually useful to pinpoint those as we > > have required counters available > > - kernel memory consumers - if we are lucky they are > > using slab allocator and unreclaimable slab is a huge > > part of the memory consumption. If this is a page > > allocator user the oom repport only helps to deduce > > the fact by looking at how much user + slab + page > > table etc. form. But identifying the root cause is > > close to impossible without something like page_owner > > or a crash dump. > > - misbehaving memory reclaim > > - minority of issues and the oom report is usually > > insufficient to drill down to the root cause. If the > > problem is reproducible then collecting vmstat data > > can give a much better clue. > > - high number of slab reclaimable objects or free swap > > are good indicators. Shrinkers data could be > > potentially helpful in the slab case but I really have > > hard time to remember any such situation. > > On non-production systems the situation is quite different. I can see > > how it could be very beneficial to add a very specific debugging data > > for subsystem/shrinker which is developed and could cause the OOM. For > > that purpose the proposed scheme is rather inflexible AFAICS. > > Considering that you're an MM guy, and that shrinkers are pretty much > universally used by _filesystem_ people - I'm not sure your experience > is the most relevant here? I really do not understand where you have concluded that. In those years of analysis I was not debugging my _own_ code. I was dealing with customer reports and I would not really blame them to specifically trigger any class of OOM reports. > The general attitude I've been seeing in this thread has been one of > dismissiveness towards filesystem people. Roman too; back when he was > working on his shrinker debug feature I reached out to him, explained > that I was working on my own, and asked about collaborating - got > crickets in response... This is completely off and it makes me _really_ think whether discussions like this on is really worth time. You have been presented arguments, you seem to be convinced that every disagreement is against you. Not the first time this is happening. Stop it please! As a matter of fact, you are proposeing a very specific form of debugging without showing that this is generally useful thing to do or even giving us couple of examples where that was useful in a production environment. This is where you should have started at and then we could help out to form an acceptable solution. Throwing "this does what we need, take it or leave" attitude is usualy not the best way to get your work merged. > Hmm.. > > Besides that, I haven't seen anything what-so-ever out of you guys to > make our lives easier, regarding OOM debugging, nor do you guys even > seem interested in the needs and perspectives of the filesytem people. > Roman, your feature didn't help one bit for OOM debuging - didn't even > come with documentation or hints as to what it's for. > > BPF? Please. > > Anyways. > > Regarding log spam: that's something this patchset already starts to > address. I don't think we needed to be dumping every single slab in the > system, for ~2 pages worth of logs; hence this patchset changes that to > just print the top 10. Increasing the threshold for slabs to be printed is something I wouldn't mind at all. > The same approach is taken with shrinkers: more targeted, less spammy > output. > > So now that that concern has been addressed, perhaps some actual meat: > > For one, the patchset adds tracking for when a shrinker was last asked > to free something, vs. when it was actually freed. So right there, we > can finally see at a glance when a shrinker has gotten stuck and which > one. The primary problem I have with this is how to decide whether to dump shrinker data and/or which shrinkers to mention. How do you know that it is the specific shrinker which has contributed to the OOM state? Printing that data unconditionally will very likely be just additional balast in most production situations. Sure if you are doing a filesystem development and you are tuning your specific shrinker then this might be a really important information to have. But then it is a debugging devel tool rather than something we want or need to have in a generic oom report. All that being said, I am with you on the fact that the oom report in its current form could see improvements. But please when adding more information please always focus on general usefulness. We have a very rich tracing capabilities which could be used for ad-hoc or very specific purposes as it is much more flexible. -- Michal Hocko SUSE Labs