From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 06CD0FA373D for ; Mon, 31 Oct 2022 01:54:04 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 7F5ED6B0071; Sun, 30 Oct 2022 21:54:04 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 7A6436B0073; Sun, 30 Oct 2022 21:54:04 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 66CE56B0074; Sun, 30 Oct 2022 21:54:04 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 3BBA76B0071 for ; Sun, 30 Oct 2022 21:54:04 -0400 (EDT) Received: from smtpin15.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id DDBAF1C60CD for ; Mon, 31 Oct 2022 01:54:03 +0000 (UTC) X-FDA: 80079573966.15.6323B5C Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by imf13.hostedemail.com (Postfix) with ESMTP id 7423920007 for ; Mon, 31 Oct 2022 01:54:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1667181242; x=1698717242; h=from:to:cc:subject:references:date:in-reply-to: message-id:mime-version; bh=vKTxKFC2/vSuOxK8JQIPDsJlamPAXJJtp+Mi/KUNe1c=; b=ADL3vFYwsQLtc8IchwqDn46WO0azvkC0yPZ8jWTKaGvOjQ08aHeAhRgm PTBLQqPs4Nc1gf/Eb+Ci2a1LEE7jdr7isNGlI80h0Dy//G4L9aqPVEHyE Jr1tyjvrerl1mMyHomtPTNmBSukVoTCnAKwLajq+br5Jk7RGVgHbibEah pXDu61W2j9wNz4RD7gACJusITjKLLP7JOcVhl4+8SXuuGok0ddzoxRlKq r44WN3PL5xjbUCgnEFxBQtxXs31tasj6xZQwtgmeaOiXTKVgMB6adUzNY bs5ND+0XgjhRLEVThq6N2XQ9uqb+01TEmb5NXrGksiA+ONt+3X1/YSMir A==; X-IronPort-AV: E=McAfee;i="6500,9779,10516"; a="306416400" X-IronPort-AV: E=Sophos;i="5.95,227,1661842800"; d="scan'208";a="306416400" Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Oct 2022 18:54:01 -0700 X-IronPort-AV: E=McAfee;i="6500,9779,10516"; a="635886910" X-IronPort-AV: E=Sophos;i="5.95,227,1661842800"; d="scan'208";a="635886910" Received: from yhuang6-desk2.sh.intel.com (HELO yhuang6-desk2.ccr.corp.intel.com) ([10.238.208.55]) by fmsmga007-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Oct 2022 18:53:57 -0700 From: "Huang, Ying" To: Yang Shi Cc: Aneesh Kumar K V , Feng Tang , "Hocko, Michal" , Andrew Morton , Johannes Weiner , Tejun Heo , Zefan Li , Waiman Long , "linux-mm@kvack.org" , "cgroups@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "Hansen, Dave" , "Chen, Tim C" , "Yin, Fengwei" Subject: Re: [PATCH] mm/vmscan: respect cpuset policy during page demotion References: <20221026074343.6517-1-feng.tang@intel.com> <7b5f533d-4b2e-b45b-ee42-5e1cc3e8a279@linux.ibm.com> Date: Mon, 31 Oct 2022 09:53:18 +0800 In-Reply-To: (Yang Shi's message of "Fri, 28 Oct 2022 10:16:50 -0700") Message-ID: <87cza8ep2p.fsf@yhuang6-desk2.ccr.corp.intel.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=ascii ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1667181243; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=fpEVZkNgZ6R4vuSj+shUOSJ3l4Pondehh/DqLRhzy7E=; b=orQh26A8zh01PgGVekz26QK/wP7F1emQ69sJjSdvsohiXkD/He3+v01KHUNHgjxSwlNdlR 7zVH52CrewqblwZqZ2iMSynRwt0BVs2EmKlMcjPtiOI+o6A28IXp18l0bXKgN4vDk3ulk8 Kk07sAdfgkdMcX2NZtAC5YDRDO+gq4g= ARC-Authentication-Results: i=1; imf13.hostedemail.com; dkim=none ("invalid DKIM record") header.d=intel.com header.s=Intel header.b=ADL3vFYw; spf=pass (imf13.hostedemail.com: domain of ying.huang@intel.com designates 192.55.52.93 as permitted sender) smtp.mailfrom=ying.huang@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1667181243; a=rsa-sha256; cv=none; b=JvnakKNpj9FU69bvQt5ykQCRwI3Nt4/NAIluc9yWQ74o55qIchvIE2QcI0jk2tuGIoxCsB M1IqV30JivIDe4XHjlRFVq4qfQQC+h+I8synZU2SBXDWpGinst3HCLsD1CQPcIjccj3yfQ q6x9/p6wxosN4lpmyoD/kLXJsgUUKhQ= Authentication-Results: imf13.hostedemail.com; dkim=none ("invalid DKIM record") header.d=intel.com header.s=Intel header.b=ADL3vFYw; spf=pass (imf13.hostedemail.com: domain of ying.huang@intel.com designates 192.55.52.93 as permitted sender) smtp.mailfrom=ying.huang@intel.com; dmarc=pass (policy=none) header.from=intel.com X-Rspam-User: X-Rspamd-Queue-Id: 7423920007 X-Rspamd-Server: rspam03 X-Stat-Signature: ub8f7uka6w1p6htns53chz5eqhm1egpi X-HE-Tag: 1667181242-216620 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Yang Shi writes: > On Thu, Oct 27, 2022 at 10:09 PM Aneesh Kumar K V > wrote: >> >> On 10/27/22 11:25 PM, Yang Shi wrote: >> > On Thu, Oct 27, 2022 at 12:12 AM Feng Tang wrote: >> >> >> >> On Thu, Oct 27, 2022 at 01:57:52AM +0800, Yang Shi wrote: >> >>> On Wed, Oct 26, 2022 at 8:59 AM Michal Hocko wrote: >> >> [...] >> >>>>>> This all can get quite expensive so the primary question is, does the >> >>>>>> existing behavior generates any real issues or is this more of an >> >>>>>> correctness exercise? I mean it certainly is not great to demote to an >> >>>>>> incompatible numa node but are there any reasonable configurations when >> >>>>>> the demotion target node is explicitly excluded from memory >> >>>>>> policy/cpuset? >> >>>>> >> >>>>> We haven't got customer report on this, but there are quite some customers >> >>>>> use cpuset to bind some specific memory nodes to a docker (You've helped >> >>>>> us solve a OOM issue in such cases), so I think it's practical to respect >> >>>>> the cpuset semantics as much as we can. >> >>>> >> >>>> Yes, it is definitely better to respect cpusets and all local memory >> >>>> policies. There is no dispute there. The thing is whether this is really >> >>>> worth it. How often would cpusets (or policies in general) go actively >> >>>> against demotion nodes (i.e. exclude those nodes from their allowes node >> >>>> mask)? >> >>>> >> >>>> I can imagine workloads which wouldn't like to get their memory demoted >> >>>> for some reason but wouldn't it be more practical to tell that >> >>>> explicitly (e.g. via prctl) rather than configuring cpusets/memory >> >>>> policies explicitly? >> >>>> >> >>>>> Your concern about the expensive cost makes sense! Some raw ideas are: >> >>>>> * if the shrink_folio_list is called by kswapd, the folios come from >> >>>>> the same per-memcg lruvec, so only one check is enough >> >>>>> * if not from kswapd, like called form madvise or DAMON code, we can >> >>>>> save a memcg cache, and if the next folio's memcg is same as the >> >>>>> cache, we reuse its result. And due to the locality, the real >> >>>>> check is rarely performed. >> >>>> >> >>>> memcg is not the expensive part of the thing. You need to get from page >> >>>> -> all vmas::vm_policy -> mm -> task::mempolicy >> >>> >> >>> Yeah, on the same page with Michal. Figuring out mempolicy from page >> >>> seems quite expensive and the correctness can't be guranteed since the >> >>> mempolicy could be set per-thread and the mm->task depends on >> >>> CONFIG_MEMCG so it doesn't work for !CONFIG_MEMCG. >> >> >> >> Yes, you are right. Our "working" psudo code for mem policy looks like >> >> what Michal mentioned, and it can't work for all cases, but try to >> >> enforce it whenever possible: >> >> >> >> static bool __check_mpol_demotion(struct folio *folio, struct vm_area_struct *vma, >> >> unsigned long addr, void *arg) >> >> { >> >> bool *skip_demotion = arg; >> >> struct mempolicy *mpol; >> >> int nid, dnid; >> >> bool ret = true; >> >> >> >> mpol = __get_vma_policy(vma, addr); >> >> if (!mpol) { >> >> struct task_struct *task; >> >> if (vma->vm_mm) >> >> task = vma->vm_mm->owner; >> > >> > But this task may not be the task you want IIUC. For example, the >> > process has two threads, A and B. They have different mempolicy. The >> > vmscan is trying to demote a page belonging to thread A, but the task >> > may point to thread B, so you actually get the wrong mempolicy IIUC. >> > >> >> But if we swap out this page and fault back in via thread B the page would >> get allocated as per thread B mempolicy. So if we demote based on thread B >> policy are we breaking anything? > > If the page is demoted by following thread B's mempolicy, didn't it > already break thread A's mempolicy in the first place if you care > about it? If thread A and thread B have the same mempolicy, then it is > not a problem. > > Actually there is another problem for shared page. If a page is shared > by two processes, P1 and P2, when you do rmap walk to find the task, > you may find two contradict mempolicy, what mempolicy would you like > to obey? Do you have to save all the intermediate mempolicy results > somewhere or you just bail out once the first mempolicy is found? Yes. There's no perfect solution for this. I suggest to avoid demoting if any VMA (or task) prevent it. Because allowing demoting is the default policy. And we will not promote the page back if it becomes hot later by default because promotion only works for default memory policy by default. Best Regards, Huang, Ying