Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp532307rdb; Thu, 30 Nov 2023 11:02:09 -0800 (PST) X-Google-Smtp-Source: AGHT+IFNTifjxiTaelW3mhIdfVbxrvnW+W7MYNUiMJUNU1mmqTP1dnVrH4llDKStZKdwZvVk+LLl X-Received: by 2002:a05:6870:fb8f:b0:1f9:8f15:3e4 with SMTP id kv15-20020a056870fb8f00b001f98f1503e4mr26404770oab.27.1701370929383; Thu, 30 Nov 2023 11:02:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701370929; cv=none; d=google.com; s=arc-20160816; b=jZUTEszDHN+9EQbTD8Jo2Ftth3TbR65iCcdq8rVYy3QcWuM8zTsOFRi0RQI9mQfD/d VSCVZ1HQXEu1YEo7hT84QmXLfSEzegmeZT2b+xxpp3o7RLFmEDQJ2QR/64VAKCU2PhB3 +IT/AtkJVK0rAmNBF5/GfPgo4G5ORn5IQpHTQXWLHy6HcGTZh8ZviV7x/xg5bg1SInEm ZfUInZcSz76Z7RjN50OKJO34j/Jr2p8Hx0xfcy8RMsM7Ns2/NMkvPw3DUY+WTmgeRjz5 JWqAAPT8QjpPRyDc4883WB5pRw3SKHzLhXGBU9RcvWGbhnjKCTyzwj5NWkk7ZR1uymNy 6ZtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:dkim-signature:date; bh=Wjwn+GK6+t6wHRxnzMCcBASuxxo0/IKSxDYD1mPq7Mk=; fh=CnjjQoUavq4gFEU8JZdkRfpCcUIKYGf6hF1xwDCn/2g=; b=LNCSuIv410bSlVZ1oE1/xFeL9vb7fUf8PUx2pPGQxHAMTbFQbOFom/td2YnTKg2TVt unM/pxOT9+BxRBpiSQ/zDmBRD544uNlCWqbFdo4m6GWhIf67bNGj2EL6/itsV5y/ZhZo yTN0RlzKbwrj7ymFWPTcS1ox9XXnzJXCJtOMPbLktmE0MLnk3rHt2lOTyTi7UFhAjLiI 381hubdgDWrEUvqz2zJJKOVwvYhj4QeRRgvoHmnrJOuFPW+5Rc5iUthy4lAs6e9j1TuL RSgvthIgtCr2PIHfZklU6ylzdIlz3yqwifu42fuwTi4r0RHb7ri3q8OvF9d555fPtErG wG2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=EKSS4CpU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from pete.vger.email (pete.vger.email. [2620:137:e000::3:6]) by mx.google.com with ESMTPS id x40-20020a056870332800b001d66918a314si630857oae.2.2023.11.30.11.02.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Nov 2023 11:02:09 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) client-ip=2620:137:e000::3:6; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=EKSS4CpU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id BCCD382CD634; Thu, 30 Nov 2023 11:02:05 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1376265AbjK3TB2 (ORCPT + 99 others); Thu, 30 Nov 2023 14:01:28 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45382 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1376269AbjK3TB0 (ORCPT ); Thu, 30 Nov 2023 14:01:26 -0500 Received: from out-188.mta1.migadu.com (out-188.mta1.migadu.com [IPv6:2001:41d0:203:375::bc]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CF40510EA for ; Thu, 30 Nov 2023 11:01:29 -0800 (PST) Date: Thu, 30 Nov 2023 11:01:23 -0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1701370887; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Wjwn+GK6+t6wHRxnzMCcBASuxxo0/IKSxDYD1mPq7Mk=; b=EKSS4CpU+3PlEbw2J5W6+TxNZqFWLJRQGEd1fVvrHDcrjv4YNRLFuww9WpM5h1n8IHofKu NkcFMFZHQyOyLbYq66cIkwXY4dvDrADd8RrJS/PYfJOavKpGwrSSbzqWaW6TDkQo+16c4S IhcbpUjwnx2jGQ1T9OcIWa7INtfxc7c= X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Roman Gushchin To: Kent Overstreet Cc: Qi Zheng , Michal Hocko , Muchun Song , Linux-MM , linux-kernel@vger.kernel.org, Andrew Morton , Dave Chinner Subject: Re: [PATCH 2/7] mm: shrinker: Add a .to_text() method for shrinkers Message-ID: References: <4caadff7-1df0-45cc-9d43-e616f9e4ddb3@bytedance.com> <20231125003009.tbaxuquny43uwei3@moria.home.lan> <76A1EE85-B62C-49B3-889C-80F9A2A88040@linux.dev> <20231128035345.5c7yc7jnautjpfoc@moria.home.lan> <20231129231147.7msiocerq7phxnyu@moria.home.lan> <04f63966-af72-43ef-a65c-ff927064a3e4@bytedance.com> <20231130032149.ynap4ai47dj62fy3@moria.home.lan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231130032149.ynap4ai47dj62fy3@moria.home.lan> X-Migadu-Flow: FLOW_OUT X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Thu, 30 Nov 2023 11:02:06 -0800 (PST) On Wed, Nov 29, 2023 at 10:21:49PM -0500, Kent Overstreet wrote: > On Thu, Nov 30, 2023 at 11:09:42AM +0800, Qi Zheng wrote: > > > > > > On 2023/11/30 07:11, Kent Overstreet wrote: > > > On Wed, Nov 29, 2023 at 10:14:54AM +0100, Michal Hocko wrote: > > > > On Tue 28-11-23 16:34:35, Roman Gushchin wrote: > > > > > On Tue, Nov 28, 2023 at 02:23:36PM +0800, Qi Zheng wrote: > > > > [...] > > > > > > Now I think adding this method might not be a good idea. If we allow > > > > > > shrinkers to report thier own private information, OOM logs may become > > > > > > cluttered. Most people only care about some general information when > > > > > > troubleshooting OOM problem, but not the private information of a > > > > > > shrinker. > > > > > > > > > > I agree with that. > > > > > > > > > > It seems that the feature is mostly useful for kernel developers and it's easily > > > > > achievable by attaching a bpf program to the oom handler. If it requires a bit > > > > > of work on the bpf side, we can do that instead, but probably not. And this > > > > > solution can potentially provide way more information in a more flexible way. > > > > > > > > > > So I'm not convinced it's a good idea to make the generic oom handling code > > > > > more complicated and fragile for everybody, as well as making oom reports differ > > > > > more between kernel versions and configurations. > > > > > > > > Completely agreed! From my many years of experience of oom reports > > > > analysing from production systems I would conclude the following categories > > > > - clear runaways (and/or memory leaks) > > > > - userspace consumers - either shmem or anonymous memory > > > > predominantly consumes the memory, swap is either depleted > > > > or not configured. > > > > OOM report is usually useful to pinpoint those as we > > > > have required counters available > > > > - kernel memory consumers - if we are lucky they are > > > > using slab allocator and unreclaimable slab is a huge > > > > part of the memory consumption. If this is a page > > > > allocator user the oom repport only helps to deduce > > > > the fact by looking at how much user + slab + page > > > > table etc. form. But identifying the root cause is > > > > close to impossible without something like page_owner > > > > or a crash dump. > > > > - misbehaving memory reclaim > > > > - minority of issues and the oom report is usually > > > > insufficient to drill down to the root cause. If the > > > > problem is reproducible then collecting vmstat data > > > > can give a much better clue. > > > > - high number of slab reclaimable objects or free swap > > > > are good indicators. Shrinkers data could be > > > > potentially helpful in the slab case but I really have > > > > hard time to remember any such situation. > > > > On non-production systems the situation is quite different. I can see > > > > how it could be very beneficial to add a very specific debugging data > > > > for subsystem/shrinker which is developed and could cause the OOM. For > > > > that purpose the proposed scheme is rather inflexible AFAICS. > > > > > > Considering that you're an MM guy, and that shrinkers are pretty much > > > universally used by _filesystem_ people - I'm not sure your experience > > > is the most relevant here? > > > > > > The general attitude I've been seeing in this thread has been one of > > > dismissiveness towards filesystem people. Roman too; back when he was > > > > Oh, please don't say that, it seems like you are the only one causing > > the fight. We deeply respect the opinions of file system developers, so > > I invited Dave to this thread from the beginning. And you didn't CC > > linux-fsdevel@vger.kernel.org yourself. > > > > > working on his shrinker debug feature I reached out to him, explained > > > that I was working on my own, and asked about collaborating - got > > > crickets in response... > > > > > > Hmm.. > > > > > > Besides that, I haven't seen anything what-so-ever out of you guys to > > > make our lives easier, regarding OOM debugging, nor do you guys even > > > seem interested in the needs and perspectives of the filesytem people. > > > Roman, your feature didn't help one bit for OOM debuging - didn't even > > > come with documentation or hints as to what it's for. > > > > > > BPF? Please. > > > > (Disclaimer, no intention to start a fight, here are some objective > > views.) > > > > Why not? In addition to printk, there are many good debugging tools > > worth trying, such as BPF related tools, drgn, etc. > > > > For non-bcachefs developers, who knows what those statistics mean? > > > > You can use BPF or drgn to traverse in advance to get the address of the > > bcachefs shrinker structure, and then during OOM, find the bcachefs > > private structure through the shrinker->private_data member, and then > > dump the bcachefs private data. Is there any problem with this? > > No, BPF is not an excuse for improving our OOM/allocation failure > reports. BPF/tracing are secondary tools; whenever we're logging > information about a problem we should strive to log enough information > to debug the issue. Ok, a simple question then: why can't you dump /proc/slabinfo after the OOM? Unlike anon memory, slab memory (fs caches in particular) should not be heavily affected by killing some userspace task. Thanks.