From owner-freebsd-bugs@freebsd.org Wed Apr 11 01:43:42 2018 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6C3C9F885E6 for ; Wed, 11 Apr 2018 01:43:42 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id D838A7EF33 for ; Wed, 11 Apr 2018 01:43:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 92AEDF885E5; Wed, 11 Apr 2018 01:43:41 +0000 (UTC) Delivered-To: bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 58669F885E4 for ; Wed, 11 Apr 2018 01:43:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id DC2D97EEF9 for ; Wed, 11 Apr 2018 01:43:40 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 80F3317C33 for ; Wed, 11 Apr 2018 01:43:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id w3B1hdp6054498 for ; Wed, 11 Apr 2018 01:43:39 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id w3B1hdM5054497 for bugs@FreeBSD.org; Wed, 11 Apr 2018 01:43:39 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 227436] increasing kern.maxswzone does nothing Date: Wed, 11 Apr 2018 01:43:39 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.1-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: curtis@ipv6.occnc.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 11 Apr 2018 01:43:42 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D227436 Bug ID: 227436 Summary: increasing kern.maxswzone does nothing Product: Base System Version: 11.1-STABLE Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: curtis@ipv6.occnc.com Created attachment 192425 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D192425&action= =3Dedit patch to sys/vm/swap_pager.c (see comments for description) On current and on 11.1 when using a large amount of swap, increasing kern.maxswzone does not allow more swap to be used as it used to in 11.0. A patch is attached which has been tested on AMD64 and ARM64 kernels using = 11.1 stable and current. It does the following: 1. If maxswzone is set to less than the system guess (based on RAM), then reduce maxswzone as specified (current behaviour). 2. There is a conditional that could be removed that caps the increase in maxswzone to 8 times the guess based on RAM (lots of swap, but lots is need= ed for small ARM stuff that has 512MB or 1GB RAM. Also had to increase kern.maxswzone on some of my AMD64 servers with 8GB RAM). 3. An increase is made to the effective maxswzone value used (n in the cod= e) subject to the above conditional (which could be removed). 4. Change a printf statement to give swap sizes in pages and MB when kern.maxswzone is too small for the amount of swap. 5. Add printf indicating the minimum value of kern.maxswzone that will qui= et the warning (and presumably allow that amount of swap to be used). 6. Add a conditional that catches the case where the guess at the size of struct swblk in sys/i386/include/param.h is wrong. This code was removed in other architectures so affects i386 only. I added this code temporarily to amd64 to test. I've been using this patch with no adverse affect on multiple production servers and vm for a few weeks. Given that all it does is allow increase in kern.maxswzone to take effect, it should be safe and should go into 11.2, b= ut at least go into 12. --=20 You are receiving this mail because: You are the assignee for the bug.=