From patchwork Mon Jun 3 05:36:51 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Minchan Kim X-Patchwork-Id: 10972321 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id B98A51398 for ; Mon, 3 Jun 2019 05:37:14 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 9CE2228650 for ; Mon, 3 Jun 2019 05:37:14 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 8AF5B288B6; Mon, 3 Jun 2019 05:37:14 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.7 required=2.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 9257D28650 for ; Mon, 3 Jun 2019 05:37:13 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 66E2F6B026A; Mon, 3 Jun 2019 01:37:12 -0400 (EDT) Delivered-To: linux-mm-outgoing@kvack.org Received: by kanga.kvack.org (Postfix, from userid 40) id 61E196B026B; Mon, 3 Jun 2019 01:37:12 -0400 (EDT) X-Original-To: int-list-linux-mm@kvack.org X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 50E3F6B026C; Mon, 3 Jun 2019 01:37:12 -0400 (EDT) X-Original-To: linux-mm@kvack.org X-Delivered-To: linux-mm@kvack.org Received: from mail-pl1-f197.google.com (mail-pl1-f197.google.com [209.85.214.197]) by kanga.kvack.org (Postfix) with ESMTP id 148D86B026A for ; Mon, 3 Jun 2019 01:37:12 -0400 (EDT) Received: by mail-pl1-f197.google.com with SMTP id s12so9345984plr.5 for ; Sun, 02 Jun 2019 22:37:12 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:dkim-signature:sender:from:to:cc:subject:date :message-id:mime-version:content-transfer-encoding; bh=o/al0jV2fNpBw9iZxp/tA/T1bdR3pFt2W6r+ioNY6xk=; b=n9pPPG657+06YUumTnmT4BCartT/M6hxolaAJM7eQ2J6AwH3CXd8ePrMKb9fzNLe3L RbnDJHJeShtAILtjH9Fh5VLJ6ONy6/EqVrxa/YkrbVCq4vzKbU9m2uDGAZtNNYEd9uQd nl9Bj63G8wlHjgWJ9t1LFwO55nt6b2+ZxZnSyxY+KhKgcIzfBQDYk0x9dRWF85//69en kSmpN6uLJ0rsi2FlczYHArA2eYtCare8CodsSk85qfjH34QraJ09ub3BQlh0sEJWyJSW yu07lr0yIy7TczRLfdFRiBJM5WvRHr9V48H2cvzhkj5jR5GjFr3PFOZbq3kFPjjsKQSY kuAg== X-Gm-Message-State: APjAAAUXPRwgza/t+jqRyDR7eDM69F9LqVfH9CFyNOC3SOOHzgemwsL8 xLP+WCuqg15Y/W2zSweuCxJnIN5E7NNKwcimCtHl9+X9kU2BYFoEjrDi5fVphyKz2LGyHKyIXKh h95CnhAZvTpcXnky/6bLs7imJ2OHxA5GBBWqoI4z8WY/PdHy/pQ5QQ4WoMFxmavI= X-Received: by 2002:a62:1c92:: with SMTP id c140mr28804180pfc.258.1559540231320; Sun, 02 Jun 2019 22:37:11 -0700 (PDT) X-Received: by 2002:a62:1c92:: with SMTP id c140mr28804097pfc.258.1559540229759; Sun, 02 Jun 2019 22:37:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559540229; cv=none; d=google.com; s=arc-20160816; b=tXnqX35e6Dxutc/kDAJWQ1KUXjq9mTAQUk7huSj2hHqX0rdHgx4oYKp3L0whk1Bfyg +Yj/A7uxZ1na5o/D5nrq13KS2vdOx/d6Y/ggfaFYjYH1XcixhXyJfMh0IZosrg07qFxv cO4LK7q+5TsbKXUf0o0DUGl9xi3kl1Buq2nZMKHd1PKXY38j8hVa1BAmUujWNAQMsInT fxTftsamy2e8phlWmAJBVtUz6R+m4pd1Y/WkHGmSkNVofnk1nq9MxnWtHJ3j50WUenL6 Ss8Q5+HTK4mjkj7oMHC2VvKdMEVO+VUlYC608EVhrWTWuguZfRw4iTovzuAJRavFEoh5 r0Qg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:sender:dkim-signature; bh=o/al0jV2fNpBw9iZxp/tA/T1bdR3pFt2W6r+ioNY6xk=; b=kvd+yDlxs1q7oebaPBk9Bzyl5KdeOtIq2t1HXODOsINnx7ImZlFAA6G+t6eUl/XOto vS4ZN1xXLtQv75lPrICgGjbxfEeiqUYfcXFW44tDwSpiuBMyzv67DcWr7x4qIG0lsZ0b Bn4JmyDDKuvCtVnuQtsD/xdsXZiXed/5Vw2WbJwdr94jKaX824kTOtDoNPqPkfm3ejGj HDrlFw2JmT/jsJ7J+3rYgQGs5qRfWShmE7PGoXaVMP0Q2UJBGRZ6oR0V5NP5Wo0rL4i7 gKI6lh+Q9ga+klW5ZIiEXjqn/IhGJU7qG6QFWYm22ti7g3NC7GWIoYRATCHxiFktihTj PhFA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=sAdoxVOA; spf=pass (google.com: domain of minchan.kim@gmail.com designates 209.85.220.65 as permitted sender) smtp.mailfrom=minchan.kim@gmail.com; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from mail-sor-f65.google.com (mail-sor-f65.google.com. [209.85.220.65]) by mx.google.com with SMTPS id j19sor6142954pfr.25.2019.06.02.22.37.09 for (Google Transport Security); Sun, 02 Jun 2019 22:37:09 -0700 (PDT) Received-SPF: pass (google.com: domain of minchan.kim@gmail.com designates 209.85.220.65 as permitted sender) client-ip=209.85.220.65; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=sAdoxVOA; spf=pass (google.com: domain of minchan.kim@gmail.com designates 209.85.220.65 as permitted sender) smtp.mailfrom=minchan.kim@gmail.com; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=o/al0jV2fNpBw9iZxp/tA/T1bdR3pFt2W6r+ioNY6xk=; b=sAdoxVOAOp+GO6YNZN5LtXGuCKiogZSjm0dPXOg/bQoYtWBeEr6reEPzdXFvrJ8ULw HiRDcRF07bdQYfEG4MDwgNLuvWOn/2NNLLcNiWZUrPpnWzlTqoPWAj59XDK8NhtqdBhs mIR4CGIdIr84m7jItjdCAZkFZ+bjSfNVN5yYGmWkQwmK/ceuTV6DQhVnhsPKIiLaBqnQ /Q1suhJhWA2KJ+DZeUZs2Z8oEJ25PTb6GYOCCgeJJEcIfQZUGYWgAIFuIJ7LMR0kkXXH pQrcTOfDwBkKM/e8hU/+vbB6ILgNbSuDjMkxzGYNY0D+o8GZXGpvT45dsZ+ig/91Y7fZ CCkw== X-Google-Smtp-Source: APXvYqxPIIdG0KZRWNRH9uWlnCDZJ8hRcsW34dm2JMfb1c75+Z6SSx9NsQrOYx3Q/qlfKjp/XbFm6g== X-Received: by 2002:a62:6241:: with SMTP id w62mr29405729pfb.226.1559540229171; Sun, 02 Jun 2019 22:37:09 -0700 (PDT) Received: from bbox-2.seo.corp.google.com ([2401:fa00:d:0:98f1:8b3d:1f37:3e8]) by smtp.gmail.com with ESMTPSA id a18sm5986222pjq.0.2019.06.02.22.37.03 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 02 Jun 2019 22:37:07 -0700 (PDT) From: Minchan Kim To: Andrew Morton Cc: linux-mm , LKML , linux-api@vger.kernel.org, Michal Hocko , Johannes Weiner , Tim Murray , Joel Fernandes , Suren Baghdasaryan , Daniel Colascione , Shakeel Butt , Sonny Rao , Brian Geffon , jannh@google.com, oleg@redhat.com, christian@brauner.io, oleksandr@redhat.com, hdanton@sina.com, Minchan Kim Subject: [PATCH v1 0/4] Introduce MADV_COLD and MADV_PAGEOUT Date: Mon, 3 Jun 2019 14:36:51 +0900 Message-Id: <20190603053655.127730-1-minchan@kernel.org> X-Mailer: git-send-email 2.22.0.rc1.311.g5d7573a151-goog MIME-Version: 1.0 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: X-Virus-Scanned: ClamAV using ClamSMTP This patch is part of previous series: https://lore.kernel.org/lkml/20190531064313.193437-1-minchan@kernel.org/T/#u Originally, it was created for external madvise hinting feature. https://lkml.org/lkml/2019/5/31/463 Michal wanted to separte the discussion from external hinting interface so this patchset includes only first part of my entire patchset - introduce MADV_COLD and MADV_PAGEOUT hint to madvise. However, I keep entire description for others for easier understanding why this kinds of hint was born. Thanks. This patchset is against on next-20190530. Below is description of previous entire patchset. ================= &< ===================== - Background The Android terminology used for forking a new process and starting an app from scratch is a cold start, while resuming an existing app is a hot start. While we continually try to improve the performance of cold starts, hot starts will always be significantly less power hungry as well as faster so we are trying to make hot start more likely than cold start. To increase hot start, Android userspace manages the order that apps should be killed in a process called ActivityManagerService. ActivityManagerService tracks every Android app or service that the user could be interacting with at any time and translates that into a ranked list for lmkd(low memory killer daemon). They are likely to be killed by lmkd if the system has to reclaim memory. In that sense they are similar to entries in any other cache. Those apps are kept alive for opportunistic performance improvements but those performance improvements will vary based on the memory requirements of individual workloads. - Problem Naturally, cached apps were dominant consumers of memory on the system. However, they were not significant consumers of swap even though they are good candidate for swap. Under investigation, swapping out only begins once the low zone watermark is hit and kswapd wakes up, but the overall allocation rate in the system might trip lmkd thresholds and cause a cached process to be killed(we measured performance swapping out vs. zapping the memory by killing a process. Unsurprisingly, zapping is 10x times faster even though we use zram which is much faster than real storage) so kill from lmkd will often satisfy the high zone watermark, resulting in very few pages actually being moved to swap. - Approach The approach we chose was to use a new interface to allow userspace to proactively reclaim entire processes by leveraging platform information. This allowed us to bypass the inaccuracy of the kernel’s LRUs for pages that are known to be cold from userspace and to avoid races with lmkd by reclaiming apps as soon as they entered the cached state. Additionally, it could provide many chances for platform to use much information to optimize memory efficiency. To achieve the goal, the patchset introduce two new options for madvise. One is MADV_COLD which will deactivate activated pages and the other is MADV_PAGEOUT which will reclaim private pages instantly. These new options complement MADV_DONTNEED and MADV_FREE by adding non-destructive ways to gain some free memory space. MADV_PAGEOUT is similar to MADV_DONTNEED in a way that it hints the kernel that memory region is not currently needed and should be reclaimed immediately; MADV_COLD is similar to MADV_FREE in a way that it hints the kernel that memory region is not currently needed and should be reclaimed when memory pressure rises. This approach is similar in spirit to madvise(MADV_WONTNEED), but the information required to make the reclaim decision is not known to the app. Instead, it is known to a centralized userspace daemon, and that daemon must be able to initiate reclaim on its own without any app involvement. To solve the concern, this patch introduces new syscall - struct pr_madvise_param { int size; /* the size of this structure */ int cookie; /* reserved to support atomicity */ int nr_elem; /* count of below arrary fields */ int __user *hints; /* hints for each range */ /* to store result of each operation */ const struct iovec __user *results; /* input address ranges */ const struct iovec __user *ranges; }; int process_madvise(int pidfd, struct pr_madvise_param *u_param, unsigned long flags); The syscall get pidfd to give hints to external process and provides pair of result/ranges vector arguments so that it could give several hints to each address range all at once. It also has cookie variable to support atomicity of the API for address ranges operations. IOW, if target process changes address space since monitor process has parsed address ranges via map_files or maps, the API can detect the race so could cancel entire address space operation. It's not implemented yet. Daniel Colascione suggested a idea(Please read description in patch[6/6]) and this patchset adds cookie a variable for the future. - Experiment We did bunch of testing with several hundreds of real users, not artificial benchmark on android. We saw about 17% cold start decreasement without any significant battery/app startup latency issues. And with artificial benchmark which launches and switching apps, we saw average 7% app launching improvement, 18% less lmkd kill and good stat from vmstat. A is vanilla and B is process_madvise. A B delta ratio(%) allocstall_dma 0 0 0 0.00 allocstall_movable 1464 457 -1007 -69.00 allocstall_normal 263210 190763 -72447 -28.00 allocstall_total 264674 191220 -73454 -28.00 compact_daemon_wake 26912 25294 -1618 -7.00 compact_fail 17885 14151 -3734 -21.00 compact_free_scanned 4204766409 3835994922 -368771487 -9.00 compact_isolated 3446484 2967618 -478866 -14.00 compact_migrate_scanned 1621336411 1324695710 -296640701 -19.00 compact_stall 19387 15343 -4044 -21.00 compact_success 1502 1192 -310 -21.00 kswapd_high_wmark_hit_quickly 234 184 -50 -22.00 kswapd_inodesteal 221635 233093 11458 5.00 kswapd_low_wmark_hit_quickly 66065 54009 -12056 -19.00 nr_dirtied 259934 296476 36542 14.00 nr_vmscan_immediate_reclaim 2587 2356 -231 -9.00 nr_vmscan_write 1274232 2661733 1387501 108.00 nr_written 1514060 2937560 1423500 94.00 pageoutrun 67561 55133 -12428 -19.00 pgactivate 2335060 1984882 -350178 -15.00 pgalloc_dma 13743011 14096463 353452 2.00 pgalloc_movable 0 0 0 0.00 pgalloc_normal 18742440 16802065 -1940375 -11.00 pgalloc_total 32485451 30898528 -1586923 -5.00 pgdeactivate 4262210 2930670 -1331540 -32.00 pgfault 30812334 31085065 272731 0.00 pgfree 33553970 31765164 -1788806 -6.00 pginodesteal 33411 15084 -18327 -55.00 pglazyfreed 0 0 0 0.00 pgmajfault 551312 1508299 956987 173.00 pgmigrate_fail 43927 29330 -14597 -34.00 pgmigrate_success 1399851 1203922 -195929 -14.00 pgpgin 24141776 19032156 -5109620 -22.00 pgpgout 959344 1103316 143972 15.00 pgpgoutclean 4639732 3765868 -873864 -19.00 pgrefill 4884560 3006938 -1877622 -39.00 pgrotated 37828 25897 -11931 -32.00 pgscan_direct 1456037 957567 -498470 -35.00 pgscan_direct_throttle 0 0 0 0.00 pgscan_kswapd 6667767 5047360 -1620407 -25.00 pgscan_total 8123804 6004927 -2118877 -27.00 pgskip_dma 0 0 0 0.00 pgskip_movable 0 0 0 0.00 pgskip_normal 14907 25382 10475 70.00 pgskip_total 14907 25382 10475 70.00 pgsteal_direct 1118986 690215 -428771 -39.00 pgsteal_kswapd 4750223 3657107 -1093116 -24.00 pgsteal_total 5869209 4347322 -1521887 -26.00 pswpin 417613 1392647 975034 233.00 pswpout 1274224 2661731 1387507 108.00 slabs_scanned 13686905 10807200 -2879705 -22.00 workingset_activate 668966 569444 -99522 -15.00 workingset_nodereclaim 38957 32621 -6336 -17.00 workingset_refault 2816795 2179782 -637013 -23.00 workingset_restore 294320 168601 -125719 -43.00 pgmajfault is increased by 173% because swapin is increased by 200% by process_madvise hint. However, swap read based on zram is much cheaper than file IO in performance point of view and app hot start by swapin is also cheaper than cold start from the beginning of app which needs many IO from storage and initialization steps. Brian Geffon in ChromeOS team had an experiment with process_madvise(2) Quote form him: "What I found is that by using process_madvise after a tab has been back grounded for more than 45 seconds reduced the average tab switch times by 25%! This is a huge result and very obvious validation that process_madvise hints works well for the ChromeOS use case." This patchset is against on next-20190530. Minchan Kim (4): mm: introduce MADV_COLD mm: change PAGEREF_RECLAIM_CLEAN with PAGE_REFRECLAIM mm: account nr_isolated_xxx in [isolate|putback]_lru_page mm: introduce MADV_PAGEOUT include/linux/page-flags.h | 1 + include/linux/page_idle.h | 15 ++ include/linux/swap.h | 2 + include/uapi/asm-generic/mman-common.h | 2 + mm/compaction.c | 2 - mm/gup.c | 7 +- mm/internal.h | 2 +- mm/khugepaged.c | 3 - mm/madvise.c | 241 ++++++++++++++++++++++++- mm/memory-failure.c | 3 - mm/memory_hotplug.c | 4 - mm/mempolicy.c | 6 +- mm/migrate.c | 37 +--- mm/oom_kill.c | 2 +- mm/swap.c | 43 +++++ mm/vmscan.c | 62 ++++++- 16 files changed, 367 insertions(+), 65 deletions(-)