From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.6 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8991BC31E40 for ; Fri, 9 Aug 2019 10:50:25 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 591A0217F4 for ; Fri, 9 Aug 2019 10:50:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565347825; bh=ufOUeu94naRit4fpOqWaOSOLQLBbQhYnAoy4JSnWZcE=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=Ouws8aY9dy4ILML4dQ9MhPnVkEHA5zznOv25AVEsapw8Wi1ouUrTtg1nn1qxVexRz /ghHJsTGhtRcw/DyeBA7RDOXUEdPXKRXH6wq5zJpclaSAP5Dy5hu9ZhQlqIX9q0zpJ YhjFbFN/QQ0eCc7HMVc5s800wEcvx+pHjVDy2q48= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726683AbfHIKuY (ORCPT ); Fri, 9 Aug 2019 06:50:24 -0400 Received: from mx2.suse.de ([195.135.220.15]:49822 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726140AbfHIKuX (ORCPT ); Fri, 9 Aug 2019 06:50:23 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id D802AB071; Fri, 9 Aug 2019 10:50:21 +0000 (UTC) Date: Fri, 9 Aug 2019 12:50:16 +0200 From: Michal Hocko To: ndrw Cc: Johannes Weiner , Suren Baghdasaryan , Vlastimil Babka , "Artem S. Tashkinov" , Andrew Morton , LKML , linux-mm Subject: Re: Let's talk about the elephant in the room - the Linux kernel's inability to gracefully handle low memory pressure Message-ID: <20190809105016.GP18351@dhcp22.suse.cz> References: <20190807075927.GO11812@dhcp22.suse.cz> <20190807205138.GA24222@cmpxchg.org> <20190808114826.GC18351@dhcp22.suse.cz> <806F5696-A8D6-481D-A82F-49DEC1F2B035@redhazel.co.uk> <20190808163228.GE18351@dhcp22.suse.cz> <5FBB0A26-0CFE-4B88-A4F2-6A42E3377EDB@redhazel.co.uk> <20190808185925.GH18351@dhcp22.suse.cz> <08e5d007-a41a-e322-5631-b89978b9cc20@redhazel.co.uk> <20190809085748.GN18351@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 09-08-19 11:09:33, ndrw wrote: > On 09/08/2019 09:57, Michal Hocko wrote: > > We already do have a reserve (min_free_kbytes). That gives kswapd some > > room to perform reclaim in the background without obvious latencies to > > allocating tasks (well CPU still be used so there is still some effect). > > I tried this option in the past. Unfortunately, I didn't prevent freezes. My > understanding is this option reserves some amount of memory to not be to not be used by normal allocations. It defines reclaim watermarks and that influences when the background and direct reclaim start to act. > swapped out but does not prevent the kernel from evicting all pages from > cache when more memory is needed. It doesn't have any say on the actual decision on what to reclaim. > > Kswapd tries to keep a balance and free memory low but still with some > > room to satisfy an immediate memory demand. Once kswapd doesn't catch up > > with the memory demand we dive into the direct reclaim and that is where > > people usually see latencies coming from. > > Reclaiming memory is fine, of course, but not all the way to 0 caches. No > caches means all executable pages, ro pages (e.g. fonts) are evicted from > memory and have to be constantly reloaded on every user action. All this > while competing with tasks that are using up all memory. This happens with > of without swap, although swap does spread this issue in time a bit. We try to protect low amount of cache. Have a look at get_scan_count function. But the exact amount of the cache to be protected is really hard to know wihtout a crystal ball or understanding of the workload. The kernel doesn't have neither of the two. > > The main problem here is that it is hard to tell from a single > > allocation latency that we have a bigger problem. As already said, the > > usual trashing scenario doesn't show problem during the reclaim because > > pages can be freed up very efficiently. The problem is that they are > > refaulted very quickly so we are effectively rotating working set like > > crazy. Compare that to a normal used-once streaming IO workload which is > > generating a lot of page cache that can be recycled in a similar pace > > but a working set doesn't get freed. Free memory figures will look very > > similar in both cases. > > Thank you for the explanation. It is indeed a difficult problem - some > cached pages (streaming IO) will likely not be needed again and should be > discarded asap, other (like mmapped executable/ro pages of UI utilities) > will cause thrashing when evicted under high memory pressure. Another aspect > is that PSI is probably not the best measure of detecting imminent > thrashing. However, if it can at least detect a freeze that has already > occurred and force the OOM killer that is still a lot better than a dead > system, which is the current user experience. We have been thinking about this problem for a long time and couldn't come up with anything much better than we have now. PSI is the most recent improvement in that area. If you have better ideas then patches are always welcome. > > Good that earlyoom works for you. > > I am giving it as an example of a heuristic that seems to work very well for > me. Something to look into. And yes, I wouldn't mind having such mechanism > built into the kernel. > > > All I am saying is that this is not > > generally applicable heuristic because we do care about a larger variety > > of workloads. I should probably emphasise that the OOM killer is there > > as a _last resort_ hand break when something goes terribly wrong. It > > operates at times when any user intervention would be really hard > > because there is a lack of resources to be actionable. > > It is indeed a last resort solution - without it the system is unusable. > Still, accuracy matters because killing a wrong task does not fix the > problem (a task hogging memory is still running) and may break the system > anyway if something important is killed instead. That is a completely orthogonal problem, I am afraid. So far we have been discussing _when_ to trigger OOM killer. This is _who_ to kill. I haven't heard any recent examples that the victim selection would be way off and killing something obviously incorrect. > [...] > > > This is a useful feedback! What was your workload? Which kernel version? > > I tested it by running a python script that processes a large amount of data > in memory (needs around 15GB of RAM). I normally run 2 instances of that > script in parallel but for testing I started 4 of them. I sometimes > experience the same issue when using multiple regular memory intensive > desktop applications in a manner described in the first post but that's > harder to reproduce because of the user input needed. Something that other people can play with to reproduce the issue would be more than welcome. -- Michal Hocko SUSE Labs