From patchwork Mon Jun 10 11:12:47 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Minchan Kim X-Patchwork-Id: 10984683 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 22C046C5 for ; Mon, 10 Jun 2019 11:13:09 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 10B092873B for ; Mon, 10 Jun 2019 11:13:09 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 03A9A28741; Mon, 10 Jun 2019 11:13:09 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.7 required=2.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 0DC852873B for ; Mon, 10 Jun 2019 11:13:07 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 24FB26B026A; Mon, 10 Jun 2019 07:13:06 -0400 (EDT) Delivered-To: linux-mm-outgoing@kvack.org Received: by kanga.kvack.org (Postfix, from userid 40) id 1D9196B026B; Mon, 10 Jun 2019 07:13:06 -0400 (EDT) X-Original-To: int-list-linux-mm@kvack.org X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 07A716B026C; Mon, 10 Jun 2019 07:13:06 -0400 (EDT) X-Original-To: linux-mm@kvack.org X-Delivered-To: linux-mm@kvack.org Received: from mail-pf1-f199.google.com (mail-pf1-f199.google.com [209.85.210.199]) by kanga.kvack.org (Postfix) with ESMTP id BADA26B026A for ; Mon, 10 Jun 2019 07:13:05 -0400 (EDT) Received: by mail-pf1-f199.google.com with SMTP id a125so7010861pfa.13 for ; Mon, 10 Jun 2019 04:13:05 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:dkim-signature:sender:from:to:cc:subject:date :message-id:mime-version:content-transfer-encoding; bh=KEcxpcchfmx3DeSl4SE7keoC1yLycUh0ykqn8yd0rwk=; b=WT5t60ie0JPC0DfJWPV+w01taFefBiPKKZ3z8uYlulqT0lfPou0jX5ix9JvzZ3+nju kZ3rUVRPh2oibbP5OargG8CHEZ33CpHAJ4YZ+AFA3wDTYwkMRUdrt7yC2tRdmZjFdRzu fN87aozJ2uBUC+M+XCg5E+0ajESSjRW1fetR56Iw8xjO2cRkYUIt9E6QMhJLp4l0oehv INN2gWB6LCLAogZ7CTst57uyrQP1W2baf393M9yhz6Od35xWrdASWfPRQPfRBz+pAbWK YUojztNkXHTudcjidCB7D8ud1WaxWbHedlYAJeG5WqQ9L2JoD22TIpfrfv2xpS60XtXY rDQg== X-Gm-Message-State: APjAAAViB5WqeCXdJ3vCiazSlt6F9PIuJpI4Lr83mpt+8w2uQSDFn4tx teFkKiH1FKKIAasqI+NO9fM6BkO1UvlUvpPOVZ/fYrSwNBZmamkb8t8aeTjQayeObf7gvxQwjJw GuOvSm5b/jlmKcM4SJlmqxNy7ki7WLyTV3I7eMcCY/yvgSP7GB9dKZs25bhCkfOU= X-Received: by 2002:a63:f410:: with SMTP id g16mr14995661pgi.428.1560165185177; Mon, 10 Jun 2019 04:13:05 -0700 (PDT) X-Received: by 2002:a63:f410:: with SMTP id g16mr14995564pgi.428.1560165183620; Mon, 10 Jun 2019 04:13:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560165183; cv=none; d=google.com; s=arc-20160816; b=WzCMEH0NmDs1yN5KjA65ykFE2556yJ+ECVy1N3ZUE74b1T2FRR5kzT1037uoRTQQ3+ XnuQ19noTJc/PjT6H8BKwT+R6h9xW5WqeJLXvmiysNuRWkGZJFHjOSN9YNiZL1q2M19y 2fFArvsjknslzF0TR4f/DP06p1zqAbNP0EcSfaweKJ6OXZpZ+HVng1Armpg0Aiuftpf/ fjFE0RJK+8/RdDj1SEVPP67mIbLFHcq0DW8W096WVvI08GcjCALWK41d5R6b99e+lELg 8k1SoZ1ycR39aY2+QZraPr5LTfsOIrWgCMfkdoaklNMSzBfKUXJRZd6A8sQwjOStroIV urRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:sender:dkim-signature; bh=KEcxpcchfmx3DeSl4SE7keoC1yLycUh0ykqn8yd0rwk=; b=I9ONtqQJdHwser9N3vN3wzAHlh5ZjM2KvnOhFnZxMZeSeJnsZU/TOYoLzmov9Ai007 zMNmsEe3iyp0TRhvYfX6FeLo5zD7YEDXTl4pRUo4/YwnRgLI7JgiXK1SopbKRyflFAI7 pVmghe48PjV1ibTdno78Z6s89J4zALrLjyhzkLjzersH4COiGS1PMwBmFoCO+iS2g+cb ezddd8b0TKnWRrXKV5BJ5KOPzcPHV4+rH0iB8ZhSx9GWMHXNKMKE430xEL91O6qQUK+K TOAa4cKCYkfaDL/xYbxZn3ONSUum3u6c2AbYB7wqk+63DifUjZ0i/v7uSbal5UUXyulU wWCQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=oL9u2+gH; spf=pass (google.com: domain of minchan.kim@gmail.com designates 209.85.220.65 as permitted sender) smtp.mailfrom=minchan.kim@gmail.com; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from mail-sor-f65.google.com (mail-sor-f65.google.com. [209.85.220.65]) by mx.google.com with SMTPS id p7sor11314526pls.43.2019.06.10.04.13.03 for (Google Transport Security); Mon, 10 Jun 2019 04:13:03 -0700 (PDT) Received-SPF: pass (google.com: domain of minchan.kim@gmail.com designates 209.85.220.65 as permitted sender) client-ip=209.85.220.65; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=oL9u2+gH; spf=pass (google.com: domain of minchan.kim@gmail.com designates 209.85.220.65 as permitted sender) smtp.mailfrom=minchan.kim@gmail.com; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=KEcxpcchfmx3DeSl4SE7keoC1yLycUh0ykqn8yd0rwk=; b=oL9u2+gHlqR79qV/G4aZG3emQ9azwXU7KKBsWBdAiNE2mr3eur+5ojMNrNIXfD8UoZ Dkk2I0jJM6+KSasgZDMD3U3XvRPQWtPS5w/kpv0PRiddb8M+lLtulyGeM4c5Qy7QtTjo 2LMPgUrMEz4fo9cpioLVpG3g8nZxBIhQOWd5IUhp/zxsuq5tmeMn1k5A9UEuZRTqxWEz L0nMOD6Sv4UUYhEtpVy7nzag+fr4q3g39s/a5uenWYA/HYUiF3mvpHdKmfJMpnO+uTCi LG3pHbdMU4GMZ3SWTbsBrHChAV74dmaoy6wwVT9WrpVP7TyhveEhBzBBLXzjEkpAgxdH q6ng== X-Google-Smtp-Source: APXvYqz4RCrw53TUzBC/JI8+FC2OPckw9QjZdyZA8b5SG39B21wQ65zO9DVQCztTrtXU9I/cSwXiLw== X-Received: by 2002:a17:902:341:: with SMTP id 59mr16445691pld.20.1560165182978; Mon, 10 Jun 2019 04:13:02 -0700 (PDT) Received: from bbox-2.seo.corp.google.com ([2401:fa00:d:0:98f1:8b3d:1f37:3e8]) by smtp.gmail.com with ESMTPSA id h14sm9224633pgj.8.2019.06.10.04.12.57 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Mon, 10 Jun 2019 04:13:01 -0700 (PDT) From: Minchan Kim To: Andrew Morton Cc: linux-mm , LKML , linux-api@vger.kernel.org, Michal Hocko , Johannes Weiner , Tim Murray , Joel Fernandes , Suren Baghdasaryan , Daniel Colascione , Shakeel Butt , Sonny Rao , Brian Geffon , jannh@google.com, oleg@redhat.com, christian@brauner.io, oleksandr@redhat.com, hdanton@sina.com, lizeb@google.com, Minchan Kim Subject: [PATCH v2 0/5] Introduce MADV_COLD and MADV_PAGEOUT Date: Mon, 10 Jun 2019 20:12:47 +0900 Message-Id: <20190610111252.239156-1-minchan@kernel.org> X-Mailer: git-send-email 2.22.0.rc2.383.gf4fbbf30c2-goog MIME-Version: 1.0 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: X-Virus-Scanned: ClamAV using ClamSMTP This patch is part of previous series: https://lore.kernel.org/lkml/20190531064313.193437-1-minchan@kernel.org/T/#u Originally, it was created for external madvise hinting feature. https://lkml.org/lkml/2019/5/31/463 Michal wanted to separte the discussion from external hinting interface so this patchset includes only first part of my entire patchset - introduce MADV_COLD and MADV_PAGEOUT hint to madvise. However, I keep entire description for others for easier understanding why this kinds of hint was born. Thanks. This patchset is against on next-20190530. Below is description of previous entire patchset. ================= &< ===================== - Background The Android terminology used for forking a new process and starting an app from scratch is a cold start, while resuming an existing app is a hot start. While we continually try to improve the performance of cold starts, hot starts will always be significantly less power hungry as well as faster so we are trying to make hot start more likely than cold start. To increase hot start, Android userspace manages the order that apps should be killed in a process called ActivityManagerService. ActivityManagerService tracks every Android app or service that the user could be interacting with at any time and translates that into a ranked list for lmkd(low memory killer daemon). They are likely to be killed by lmkd if the system has to reclaim memory. In that sense they are similar to entries in any other cache. Those apps are kept alive for opportunistic performance improvements but those performance improvements will vary based on the memory requirements of individual workloads. - Problem Naturally, cached apps were dominant consumers of memory on the system. However, they were not significant consumers of swap even though they are good candidate for swap. Under investigation, swapping out only begins once the low zone watermark is hit and kswapd wakes up, but the overall allocation rate in the system might trip lmkd thresholds and cause a cached process to be killed(we measured performance swapping out vs. zapping the memory by killing a process. Unsurprisingly, zapping is 10x times faster even though we use zram which is much faster than real storage) so kill from lmkd will often satisfy the high zone watermark, resulting in very few pages actually being moved to swap. - Approach The approach we chose was to use a new interface to allow userspace to proactively reclaim entire processes by leveraging platform information. This allowed us to bypass the inaccuracy of the kernel’s LRUs for pages that are known to be cold from userspace and to avoid races with lmkd by reclaiming apps as soon as they entered the cached state. Additionally, it could provide many chances for platform to use much information to optimize memory efficiency. To achieve the goal, the patchset introduce two new options for madvise. One is MADV_COLD which will deactivate activated pages and the other is MADV_PAGEOUT which will reclaim private pages instantly. These new options complement MADV_DONTNEED and MADV_FREE by adding non-destructive ways to gain some free memory space. MADV_PAGEOUT is similar to MADV_DONTNEED in a way that it hints the kernel that memory region is not currently needed and should be reclaimed immediately; MADV_COLD is similar to MADV_FREE in a way that it hints the kernel that memory region is not currently needed and should be reclaimed when memory pressure rises. This approach is similar in spirit to madvise(MADV_WONTNEED), but the information required to make the reclaim decision is not known to the app. Instead, it is known to a centralized userspace daemon, and that daemon must be able to initiate reclaim on its own without any app involvement. To solve the concern, this patch introduces new syscall - struct pr_madvise_param { int size; /* the size of this structure */ int cookie; /* reserved to support atomicity */ int nr_elem; /* count of below arrary fields */ int __user *hints; /* hints for each range */ /* to store result of each operation */ const struct iovec __user *results; /* input address ranges */ const struct iovec __user *ranges; }; int process_madvise(int pidfd, struct pr_madvise_param *u_param, unsigned long flags); The syscall get pidfd to give hints to external process and provides pair of result/ranges vector arguments so that it could give several hints to each address range all at once. It also has cookie variable to support atomicity of the API for address ranges operations. IOW, if target process changes address space since monitor process has parsed address ranges via map_files or maps, the API can detect the race so could cancel entire address space operation. It's not implemented yet. Daniel Colascione suggested a idea(Please read description in patch[6/6]) and this patchset adds cookie a variable for the future. - Experiment We did bunch of testing with several hundreds of real users, not artificial benchmark on android. We saw about 17% cold start decreasement without any significant battery/app startup latency issues. And with artificial benchmark which launches and switching apps, we saw average 7% app launching improvement, 18% less lmkd kill and good stat from vmstat. A is vanilla and B is process_madvise. A B delta ratio(%) allocstall_dma 0 0 0 0.00 allocstall_movable 1464 457 -1007 -69.00 allocstall_normal 263210 190763 -72447 -28.00 allocstall_total 264674 191220 -73454 -28.00 compact_daemon_wake 26912 25294 -1618 -7.00 compact_fail 17885 14151 -3734 -21.00 compact_free_scanned 4204766409 3835994922 -368771487 -9.00 compact_isolated 3446484 2967618 -478866 -14.00 compact_migrate_scanned 1621336411 1324695710 -296640701 -19.00 compact_stall 19387 15343 -4044 -21.00 compact_success 1502 1192 -310 -21.00 kswapd_high_wmark_hit_quickly 234 184 -50 -22.00 kswapd_inodesteal 221635 233093 11458 5.00 kswapd_low_wmark_hit_quickly 66065 54009 -12056 -19.00 nr_dirtied 259934 296476 36542 14.00 nr_vmscan_immediate_reclaim 2587 2356 -231 -9.00 nr_vmscan_write 1274232 2661733 1387501 108.00 nr_written 1514060 2937560 1423500 94.00 pageoutrun 67561 55133 -12428 -19.00 pgactivate 2335060 1984882 -350178 -15.00 pgalloc_dma 13743011 14096463 353452 2.00 pgalloc_movable 0 0 0 0.00 pgalloc_normal 18742440 16802065 -1940375 -11.00 pgalloc_total 32485451 30898528 -1586923 -5.00 pgdeactivate 4262210 2930670 -1331540 -32.00 pgfault 30812334 31085065 272731 0.00 pgfree 33553970 31765164 -1788806 -6.00 pginodesteal 33411 15084 -18327 -55.00 pglazyfreed 0 0 0 0.00 pgmajfault 551312 1508299 956987 173.00 pgmigrate_fail 43927 29330 -14597 -34.00 pgmigrate_success 1399851 1203922 -195929 -14.00 pgpgin 24141776 19032156 -5109620 -22.00 pgpgout 959344 1103316 143972 15.00 pgpgoutclean 4639732 3765868 -873864 -19.00 pgrefill 4884560 3006938 -1877622 -39.00 pgrotated 37828 25897 -11931 -32.00 pgscan_direct 1456037 957567 -498470 -35.00 pgscan_direct_throttle 0 0 0 0.00 pgscan_kswapd 6667767 5047360 -1620407 -25.00 pgscan_total 8123804 6004927 -2118877 -27.00 pgskip_dma 0 0 0 0.00 pgskip_movable 0 0 0 0.00 pgskip_normal 14907 25382 10475 70.00 pgskip_total 14907 25382 10475 70.00 pgsteal_direct 1118986 690215 -428771 -39.00 pgsteal_kswapd 4750223 3657107 -1093116 -24.00 pgsteal_total 5869209 4347322 -1521887 -26.00 pswpin 417613 1392647 975034 233.00 pswpout 1274224 2661731 1387507 108.00 slabs_scanned 13686905 10807200 -2879705 -22.00 workingset_activate 668966 569444 -99522 -15.00 workingset_nodereclaim 38957 32621 -6336 -17.00 workingset_refault 2816795 2179782 -637013 -23.00 workingset_restore 294320 168601 -125719 -43.00 pgmajfault is increased by 173% because swapin is increased by 200% by process_madvise hint. However, swap read based on zram is much cheaper than file IO in performance point of view and app hot start by swapin is also cheaper than cold start from the beginning of app which needs many IO from storage and initialization steps. Brian Geffon in ChromeOS team had an experiment with process_madvise(2) Quote form him: "What I found is that by using process_madvise after a tab has been back grounded for more than 45 seconds reduced the average tab switch times by 25%! This is a huge result and very obvious validation that process_madvise hints works well for the ChromeOS use case." This patchset is against on next-20190607. Minchan Kim (5): mm: introduce MADV_COLD mm: change PAGEREF_RECLAIM_CLEAN with PAGE_REFRECLAIM mm: account nr_isolated_xxx in [isolate|putback]_lru_page mm: introduce MADV_PAGEOUT mm: factor out pmd young/dirty bit handling and THP split include/linux/huge_mm.h | 3 - include/linux/swap.h | 2 + include/uapi/asm-generic/mman-common.h | 2 + mm/compaction.c | 2 - mm/gup.c | 7 +- mm/huge_memory.c | 74 ----- mm/internal.h | 2 +- mm/khugepaged.c | 3 - mm/madvise.c | 358 ++++++++++++++++++++++++- mm/memory-failure.c | 3 - mm/memory_hotplug.c | 4 - mm/mempolicy.c | 6 +- mm/migrate.c | 37 +-- mm/oom_kill.c | 2 +- mm/swap.c | 42 +++ mm/vmscan.c | 86 +++++- 16 files changed, 486 insertions(+), 147 deletions(-)