From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C40D1C2D0DB for ; Thu, 23 Jan 2020 18:33:40 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id A588921569 for ; Thu, 23 Jan 2020 18:33:40 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728901AbgAWSdj (ORCPT ); Thu, 23 Jan 2020 13:33:39 -0500 Received: from mga11.intel.com ([192.55.52.93]:12374 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726792AbgAWSdj (ORCPT ); Thu, 23 Jan 2020 13:33:39 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Jan 2020 10:33:38 -0800 X-IronPort-AV: E=Sophos;i="5.70,354,1574150400"; d="scan'208";a="220753681" Received: from ahduyck-desk1.jf.intel.com ([10.7.198.76]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Jan 2020 10:33:38 -0800 Message-ID: <3e24a8ad7afe7c2f6ec8ffe7260a3e31bbe41651.camel@linux.intel.com> Subject: Re: [PATCH v16.1 0/9] mm / virtio: Provide support for free page reporting From: Alexander Duyck To: Alexander Graf , Alexander Duyck , kvm@vger.kernel.org, mst@redhat.com, linux-kernel@vger.kernel.org, willy@infradead.org, mhocko@kernel.org, linux-mm@kvack.org, akpm@linux-foundation.org, mgorman@techsingularity.net, vbabka@suse.cz Cc: yang.zhang.wz@gmail.com, nitesh@redhat.com, konrad.wilk@oracle.com, david@redhat.com, pagupta@redhat.com, riel@surriel.com, lcapitulino@redhat.com, dave.hansen@intel.com, wei.w.wang@intel.com, aarcange@redhat.com, pbonzini@redhat.com, dan.j.williams@intel.com, osalvador@suse.de, "Paterson-Jones, Roland" , hannes@cmpxchg.org, hare@suse.com Date: Thu, 23 Jan 2020 10:33:37 -0800 In-Reply-To: References: <20200122173040.6142.39116.stgit@localhost.localdomain> <914aa4c3-c814-45e0-830b-02796b00b762@amazon.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.32.5 (3.32.5-1.fc30) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2020-01-23 at 17:54 +0100, Alexander Graf wrote: > > On 23.01.20 17:26, Alexander Duyck wrote: > > On Thu, 2020-01-23 at 11:20 +0100, Alexander Graf wrote: > > > Hi Alex, > > > > > > On 22.01.20 18:43, Alexander Duyck wrote: > [...] > > > > The overall guest size is kept fairly small to only a few GB while the test > > > > is running. If the host memory were oversubscribed this patch set should > > > > result in a performance improvement as swapping memory in the host can be > > > > avoided. > > > > > > I really like the approach overall. Voluntarily propagating free memory > > > from a guest to the host has been a sore point ever since KVM was > > > around. This solution looks like a very elegant way to do so. > > > > > > The big piece I'm missing is the page cache. Linux will by default try > > > to keep the free list as small as it can in favor of page cache, so most > > > of the benefit of this patch set will be void in real world scenarios. > > > > Agreed. This is a the next piece of this I plan to work on once this is > > accepted. For now the quick and dirty approach is to essentially make use > > of the /proc/sys/vm/drop_caches interface in the guest by either putting > > it in a cronjob somewhere or to have it after memory intensive workloads. > > > > > Traditionally, this was solved by creating pressure from the host > > > through virtio-balloon: Exactly the piece that this patch set gets away > > > with. I never liked "ballooning", because the host has very limited > > > visibility into the actual memory utility of its guests. So leaving the > > > decision on how much memory is actually needed at a given point in time > > > should ideally stay with the guest. > > > > > > What would keep us from applying the page hinting approach to inactive, > > > clean page cache pages? With writeback in place as well, we would slowly > > > propagate pages from > > > > > > dirty -> clean -> clean, inactive -> free -> host owned > > > > > > which gives a guest a natural path to give up "not important" memory. > > > > I considered something similar. Basically one thought I had was to > > essentially look at putting together some sort of epoch. When the host is > > under memory pressure it would need to somehow notify the guest and then > > the guest would start moving the epoch forward so that we start evicting > > pages out of the page cache when the host is under memory pressure. > > I think we want to consider an interface in which the host actively asks > guests to purge pages to be on the same line as swapping: The last line > of defense. I suppose. The only reason I was thinking that we may want to look at doing something like that was to avoid putting pressure on the guest when the host doesn't need us to. > In the normal mode of operation, you still want to shrink down > voluntarily, so that everyone cooperatively tries to make free for new > guests you could potentially run on the same host. > > If you start to apply pressure to guests to find out of they might have > some pages to spare, we're almost back to the old style ballooning approach. Thats true. In addition we avoid possible issues with us trying to flush out a bunch of memory from multiple guests as once since they would be proactively freeing the memory. I'm thinking the inactive state could be something similar to MADV_FREE in terms of behavior. If it sits in the queue for long enough we decide nobody is using it anymore so it is freed, but if it is accessed it is cheap for us to just put it back without much in the way of overhead. > Btw, have you ever looked at CMM2 [1]? With that, the host can > essentially just "steal" pages from the guest when it needs any, without > the need to execute the guest meanwhile. That means inside the host > swapping path, CMM2 can just evict guest page cache pages as easily as > we evict host page cache pages. To me, that's even more attractive in > the swap / emergency case than an interface which requires the guest to > proactively execute while we are in a low mem situation. > [1] https://www.kernel.org/doc/ols/2006/ols2006v2-pages-321-336.pdf I hadn't read through this before. If nothing else the verbiage is useful since what we are discussing is essentially how to deal with the "volatile" pages within the system, the "unused" pages are the ones we have reported to the host with the page reporting, and the "stable" pages are those pages that have been faulted back into the guest when it accessed them. I can see there would be some advantages to CMM2, however it seems like it is adding a significant amount of state to pages since it has to support a fairly significant number of states and then there is the added complexity for all the transitions in and out of stable from the various states depending on how things are being changed. Do you happen to know if anyone has done any research into how much overhead is added with CMM2 enabled? I'd be curious since it seems like the paper mentions having to track a signficant number of state transitions for the memory throughout the kernel. From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1AA90C33CB6 for ; Thu, 23 Jan 2020 18:41:02 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id E5F9F22464 for ; Thu, 23 Jan 2020 18:41:01 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org E5F9F22464 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.intel.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 84CF96B000A; Thu, 23 Jan 2020 13:41:01 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 7FD5E6B000C; Thu, 23 Jan 2020 13:41:01 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 739ED6B000D; Thu, 23 Jan 2020 13:41:01 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0220.hostedemail.com [216.40.44.220]) by kanga.kvack.org (Postfix) with ESMTP id 5CC026B000A for ; Thu, 23 Jan 2020 13:41:01 -0500 (EST) Received: from smtpin30.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with SMTP id 1275E4DB5 for ; Thu, 23 Jan 2020 18:41:01 +0000 (UTC) X-FDA: 76409765922.30.thing59_7d2c69a0aaf5b X-HE-Tag: thing59_7d2c69a0aaf5b X-Filterd-Recvd-Size: 7275 Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) by imf23.hostedemail.com (Postfix) with ESMTP for ; Thu, 23 Jan 2020 18:40:59 +0000 (UTC) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Jan 2020 10:33:38 -0800 X-IronPort-AV: E=Sophos;i="5.70,354,1574150400"; d="scan'208";a="220753681" Received: from ahduyck-desk1.jf.intel.com ([10.7.198.76]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Jan 2020 10:33:38 -0800 Message-ID: <3e24a8ad7afe7c2f6ec8ffe7260a3e31bbe41651.camel@linux.intel.com> Subject: Re: [PATCH v16.1 0/9] mm / virtio: Provide support for free page reporting From: Alexander Duyck To: Alexander Graf , Alexander Duyck , kvm@vger.kernel.org, mst@redhat.com, linux-kernel@vger.kernel.org, willy@infradead.org, mhocko@kernel.org, linux-mm@kvack.org, akpm@linux-foundation.org, mgorman@techsingularity.net, vbabka@suse.cz Cc: yang.zhang.wz@gmail.com, nitesh@redhat.com, konrad.wilk@oracle.com, david@redhat.com, pagupta@redhat.com, riel@surriel.com, lcapitulino@redhat.com, dave.hansen@intel.com, wei.w.wang@intel.com, aarcange@redhat.com, pbonzini@redhat.com, dan.j.williams@intel.com, osalvador@suse.de, "Paterson-Jones, Roland" , hannes@cmpxchg.org, hare@suse.com Date: Thu, 23 Jan 2020 10:33:37 -0800 In-Reply-To: References: <20200122173040.6142.39116.stgit@localhost.localdomain> <914aa4c3-c814-45e0-830b-02796b00b762@amazon.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.32.5 (3.32.5-1.fc30) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Thu, 2020-01-23 at 17:54 +0100, Alexander Graf wrote: > > On 23.01.20 17:26, Alexander Duyck wrote: > > On Thu, 2020-01-23 at 11:20 +0100, Alexander Graf wrote: > > > Hi Alex, > > > > > > On 22.01.20 18:43, Alexander Duyck wrote: > [...] > > > > The overall guest size is kept fairly small to only a few GB while the test > > > > is running. If the host memory were oversubscribed this patch set should > > > > result in a performance improvement as swapping memory in the host can be > > > > avoided. > > > > > > I really like the approach overall. Voluntarily propagating free memory > > > from a guest to the host has been a sore point ever since KVM was > > > around. This solution looks like a very elegant way to do so. > > > > > > The big piece I'm missing is the page cache. Linux will by default try > > > to keep the free list as small as it can in favor of page cache, so most > > > of the benefit of this patch set will be void in real world scenarios. > > > > Agreed. This is a the next piece of this I plan to work on once this is > > accepted. For now the quick and dirty approach is to essentially make use > > of the /proc/sys/vm/drop_caches interface in the guest by either putting > > it in a cronjob somewhere or to have it after memory intensive workloads. > > > > > Traditionally, this was solved by creating pressure from the host > > > through virtio-balloon: Exactly the piece that this patch set gets away > > > with. I never liked "ballooning", because the host has very limited > > > visibility into the actual memory utility of its guests. So leaving the > > > decision on how much memory is actually needed at a given point in time > > > should ideally stay with the guest. > > > > > > What would keep us from applying the page hinting approach to inactive, > > > clean page cache pages? With writeback in place as well, we would slowly > > > propagate pages from > > > > > > dirty -> clean -> clean, inactive -> free -> host owned > > > > > > which gives a guest a natural path to give up "not important" memory. > > > > I considered something similar. Basically one thought I had was to > > essentially look at putting together some sort of epoch. When the host is > > under memory pressure it would need to somehow notify the guest and then > > the guest would start moving the epoch forward so that we start evicting > > pages out of the page cache when the host is under memory pressure. > > I think we want to consider an interface in which the host actively asks > guests to purge pages to be on the same line as swapping: The last line > of defense. I suppose. The only reason I was thinking that we may want to look at doing something like that was to avoid putting pressure on the guest when the host doesn't need us to. > In the normal mode of operation, you still want to shrink down > voluntarily, so that everyone cooperatively tries to make free for new > guests you could potentially run on the same host. > > If you start to apply pressure to guests to find out of they might have > some pages to spare, we're almost back to the old style ballooning approach. Thats true. In addition we avoid possible issues with us trying to flush out a bunch of memory from multiple guests as once since they would be proactively freeing the memory. I'm thinking the inactive state could be something similar to MADV_FREE in terms of behavior. If it sits in the queue for long enough we decide nobody is using it anymore so it is freed, but if it is accessed it is cheap for us to just put it back without much in the way of overhead. > Btw, have you ever looked at CMM2 [1]? With that, the host can > essentially just "steal" pages from the guest when it needs any, without > the need to execute the guest meanwhile. That means inside the host > swapping path, CMM2 can just evict guest page cache pages as easily as > we evict host page cache pages. To me, that's even more attractive in > the swap / emergency case than an interface which requires the guest to > proactively execute while we are in a low mem situation. > [1] https://www.kernel.org/doc/ols/2006/ols2006v2-pages-321-336.pdf I hadn't read through this before. If nothing else the verbiage is useful since what we are discussing is essentially how to deal with the "volatile" pages within the system, the "unused" pages are the ones we have reported to the host with the page reporting, and the "stable" pages are those pages that have been faulted back into the guest when it accessed them. I can see there would be some advantages to CMM2, however it seems like it is adding a significant amount of state to pages since it has to support a fairly significant number of states and then there is the added complexity for all the transitions in and out of stable from the various states depending on how things are being changed. Do you happen to know if anyone has done any research into how much overhead is added with CMM2 enabled? I'd be curious since it seems like the paper mentions having to track a signficant number of state transitions for the memory throughout the kernel.