From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.2 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS, USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id F2CC5C433DF for ; Mon, 6 Jul 2020 13:24:55 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id C0A312070C for ; Mon, 6 Jul 2020 13:24:55 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org C0A312070C Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=intel.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 2F39D6B000D; Mon, 6 Jul 2020 09:24:55 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 2A4F86B000E; Mon, 6 Jul 2020 09:24:55 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 193B56B0010; Mon, 6 Jul 2020 09:24:55 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0211.hostedemail.com [216.40.44.211]) by kanga.kvack.org (Postfix) with ESMTP id 0478A6B000D for ; Mon, 6 Jul 2020 09:24:54 -0400 (EDT) Received: from smtpin24.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id A9CF41EE6 for ; Mon, 6 Jul 2020 13:24:54 +0000 (UTC) X-FDA: 77007721308.24.sleet40_521159026eac Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin24.hostedemail.com (Postfix) with ESMTP id BCFF81A4B3 for ; Mon, 6 Jul 2020 13:24:52 +0000 (UTC) X-HE-Tag: sleet40_521159026eac X-Filterd-Recvd-Size: 7796 Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by imf20.hostedemail.com (Postfix) with ESMTP for ; Mon, 6 Jul 2020 13:24:51 +0000 (UTC) IronPort-SDR: 6HzHT520egz2bKhNK+GOI2IU1d2otPbexXBwPc44VOLV54CqdufKhvHZwcFVkzI0lGFOQ6lnU9 U3pxtl+eidAg== X-IronPort-AV: E=McAfee;i="6000,8403,9673"; a="146490881" X-IronPort-AV: E=Sophos;i="5.75,320,1589266800"; d="scan'208";a="146490881" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga003.jf.intel.com ([10.7.209.27]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Jul 2020 06:24:49 -0700 IronPort-SDR: VtAff5RJSenNvMwUXkuX67xorxffKXouwfSuKikUJp/5UWIiFsB3nu6KiKJLO/Y9lDucA5nFnE lIPcOPsGlaBg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,320,1589266800"; d="scan'208";a="279275212" Received: from shbuild999.sh.intel.com (HELO localhost) ([10.239.146.107]) by orsmga003.jf.intel.com with ESMTP; 06 Jul 2020 06:24:44 -0700 Date: Mon, 6 Jul 2020 21:24:43 +0800 From: Feng Tang To: Qian Cai , Andrew Morton , Dennis Zhou , Tejun Heo , Christoph Lameter Cc: kernel test robot , Michal Hocko , Johannes Weiner , Matthew Wilcox , Mel Gorman , Kees Cook , Luis Chamberlain , Iurii Zaikin , andi.kleen@intel.com, tim.c.chen@intel.com, dave.hansen@intel.com, ying.huang@intel.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, lkp@lists.01.org Subject: Re: [mm] 4e2c82a409: ltp.overcommit_memory01.fail Message-ID: <20200706132443.GA34488@shbuild999.sh.intel.com> References: <20200705044454.GA90533@shbuild999.sh.intel.com> <20200705125854.GA66252@shbuild999.sh.intel.com> <20200705155232.GA608@lca.pw> <20200706014313.GB66252@shbuild999.sh.intel.com> <20200706023614.GA1231@lca.pw> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200706023614.GA1231@lca.pw> User-Agent: Mutt/1.5.24 (2015-08-30) X-Rspamd-Queue-Id: BCFF81A4B3 X-Spamd-Result: default: False [0.00 / 100.00] X-Rspamd-Server: rspam05 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Hi All, Please help to review this fix patch, thanks! It is against today's linux-mm tree. For easy review, I put the fix into one patch, and I could split it to 2 parts for percpu-counter and mm/util.c if it's preferred. >From 593f9dc139181a7c3bb1705aacd1f625f400e458 Mon Sep 17 00:00:00 2001 From: Feng Tang Date: Mon, 6 Jul 2020 14:48:29 +0800 Subject: [PATCH] mm/util.c: sync vm_committed_as when changing memory policy to OVERCOMMIT_NEVER With the patch to improve scalability of vm_committed_as [1], 0day reported the ltp overcommit_memory test case could fail (fail rate is about 5/50) [2]. The root cause is when system is running with loose memory overcommit policy like OVERCOMMIT_GUESS/ALWAYS, the deviation of vm_committed_as could be big, and once the policy is runtime changed to OVERCOMMIT_NEVER, vm_committed_as's batch is decreased to 1/64 of original one, but the deviation is not compensated accordingly, and following __vm_enough_memory() check for vm overcommit could be wrong due to this deviation, which breaks the ltp overcommit_memory case. Fix it by forcing a sync for percpu counter vm_committed_as when overcommit policy is changed to OVERCOMMIT_NEVER (sysctl -w vm.overcommit_memory=2). The sync itself is not a fast operation, and is toleratable given user is not expected to frequently changing policy to OVERCOMMIT_NEVER. [1] https://lore.kernel.org/lkml/1592725000-73486-1-git-send-email-feng.tang@intel.com/ [2] https://marc.info/?l=linux-mm&m=159367156428286 (can't find a link in lore.kernel.org) Reported-by: kernel test robot Signed-off-by: Feng Tang --- include/linux/percpu_counter.h | 4 ++++ lib/percpu_counter.c | 14 ++++++++++++++ mm/util.c | 11 ++++++++++- 3 files changed, 28 insertions(+), 1 deletion(-) diff --git a/include/linux/percpu_counter.h b/include/linux/percpu_counter.h index 0a4f54d..01861ee 100644 --- a/include/linux/percpu_counter.h +++ b/include/linux/percpu_counter.h @@ -44,6 +44,7 @@ void percpu_counter_add_batch(struct percpu_counter *fbc, s64 amount, s32 batch); s64 __percpu_counter_sum(struct percpu_counter *fbc); int __percpu_counter_compare(struct percpu_counter *fbc, s64 rhs, s32 batch); +void percpu_counter_sync(struct percpu_counter *fbc); static inline int percpu_counter_compare(struct percpu_counter *fbc, s64 rhs) { @@ -172,6 +173,9 @@ static inline bool percpu_counter_initialized(struct percpu_counter *fbc) return true; } +static inline void percpu_counter_sync(struct percpu_counter *fbc) +{ +} #endif /* CONFIG_SMP */ static inline void percpu_counter_inc(struct percpu_counter *fbc) diff --git a/lib/percpu_counter.c b/lib/percpu_counter.c index a66595b..02d87fc 100644 --- a/lib/percpu_counter.c +++ b/lib/percpu_counter.c @@ -98,6 +98,20 @@ void percpu_counter_add_batch(struct percpu_counter *fbc, s64 amount, s32 batch) } EXPORT_SYMBOL(percpu_counter_add_batch); +void percpu_counter_sync(struct percpu_counter *fbc) +{ + unsigned long flags; + s64 count; + + raw_spin_lock_irqsave(&fbc->lock, flags); + count = __this_cpu_read(*fbc->counters); + fbc->count += count; + __this_cpu_sub(*fbc->counters, count); + raw_spin_unlock_irqrestore(&fbc->lock, flags); +} +EXPORT_SYMBOL(percpu_counter_sync); + + /* * Add up all the per-cpu counts, return the result. This is a more accurate * but much slower version of percpu_counter_read_positive() diff --git a/mm/util.c b/mm/util.c index 52ed9c1..5fb62c0 100644 --- a/mm/util.c +++ b/mm/util.c @@ -746,14 +746,23 @@ int overcommit_ratio_handler(struct ctl_table *table, int write, void *buffer, return ret; } +static void sync_overcommit_as(struct work_struct *dummy) +{ + percpu_counter_sync(&vm_committed_as); +} + int overcommit_policy_handler(struct ctl_table *table, int write, void *buffer, size_t *lenp, loff_t *ppos) { int ret; ret = proc_dointvec_minmax(table, write, buffer, lenp, ppos); - if (ret == 0 && write) + if (ret == 0 && write) { + if (sysctl_overcommit_memory == OVERCOMMIT_NEVER) + schedule_on_each_cpu(sync_overcommit_as); + mm_compute_batch(); + } return ret; } -- 2.7.4 On Sun, Jul 05, 2020 at 10:36:14PM -0400, Qian Cai wrote: > > In my last email, I was not saying OVERCOMMIT_NEVER is not a normal case, > > but I don't think user will too frequently runtime change the overcommit > > policy. And the fix patch of syncing 'vm_committed_as' is only called when > > user calls 'sysctl -w vm.overcommit_memory=2'. > > > > > The question is now if any of those regression fixes would now regress > > > performance of OVERCOMMIT_NEVER workloads or just in-par with the data > > > before the patchset? > > > > For the original patchset, it keeps vm_committed_as unchanged for > > OVERCOMMIT_NEVER policy and enlarge it for the other 2 loose policies > > OVERCOMMIT_ALWAYS and OVERCOMMIT_GUESS, and I don't expect the "OVERCOMMIT_NEVER > > workloads" performance will be impacted. If you have suggetions for this > > kind of benchmarks, I can test them to better verify the patchset, thanks! > > Then, please capture those information into a proper commit log when you > submit the regression fix on top of the patchset, and CC PER-CPU MEMORY > ALLOCATOR maintainers, so they might be able to review it properly.