Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751509AbdFAIfN (ORCPT ); Thu, 1 Jun 2017 04:35:13 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:53448 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751448AbdFAIfL (ORCPT ); Thu, 1 Jun 2017 04:35:11 -0400 Date: Thu, 1 Jun 2017 11:35:02 +0300 From: Mike Rapoport To: Michal Hocko Cc: Andrea Arcangeli , Vlastimil Babka , "Kirill A. Shutemov" , Andrew Morton , Arnd Bergmann , "Kirill A. Shutemov" , Pavel Emelyanov , linux-mm , lkml , Linux API Subject: Re: [PATCH] mm: introduce MADV_CLR_HUGEPAGE References: <20170524103947.GC3063@rapoport-lnx> <20170524111800.GD14733@dhcp22.suse.cz> <20170524142735.GF3063@rapoport-lnx> <20170530074408.GA7969@dhcp22.suse.cz> <20170530101921.GA25738@rapoport-lnx> <20170530103930.GB7969@dhcp22.suse.cz> <20170530140456.GA8412@redhat.com> <20170530143941.GK7969@dhcp22.suse.cz> <20170601065302.GA30495@rapoport-lnx> <20170601080909.GD32677@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170601080909.GD32677@dhcp22.suse.cz> User-Agent: Mutt/1.5.24 (2015-08-30) X-TM-AS-GCONF: 00 x-cbid: 17060108-0016-0000-0000-000004B1C327 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17060108-0017-0000-0000-000027DE2D1A Message-Id: <20170601083501.GC30495@rapoport-lnx> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-06-01_02:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1703280000 definitions=main-1706010158 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1570 Lines: 41 On Thu, Jun 01, 2017 at 10:09:09AM +0200, Michal Hocko wrote: > On Thu 01-06-17 09:53:02, Mike Rapoport wrote: > > On Tue, May 30, 2017 at 04:39:41PM +0200, Michal Hocko wrote: > > > On Tue 30-05-17 16:04:56, Andrea Arcangeli wrote: > > > > > > > > UFFDIO_COPY while not being a major slowdown for sure, it's likely > > > > measurable at the microbenchmark level because it would add a > > > > enter/exit kernel to every 4k memcpy. It's not hard to imagine that as > > > > measurable. How that impacts the total precopy time I don't know, it > > > > would need to be benchmarked to be sure. > > > > > > Yes, please! > > > > I've run a simple test (below) that fills 1G of memory either with memcpy > > of ioctl(UFFDIO_COPY) in 4K chunks. > > The machine I used has two "Intel(R) Xeon(R) CPU E5-2680 0 @ 2.70GHz" and > > 128G of RAM. > > I've averaged elapsed time reported by /usr/bin/time over 100 runs and here > > what I've got: > > > > memcpy with THP on: 0.3278 sec > > memcpy with THP off: 0.5295 sec > > UFFDIO_COPY: 0.44 sec > > I assume that the standard deviation is small? Yes. > > That said, for the CRIU usecase UFFDIO_COPY seems faster that disabling THP > > and then doing memcpy. > > That is a bit surprising. I didn't think that the userfault syscall > (ioctl) can be faster than a regular #PF but considering that > __mcopy_atomic bypasses the page fault path and it can be optimized for > the anon case suggests that we can save some cycles for each page and so > the cumulative savings can be visible. > > -- > Michal Hocko > SUSE Labs >