Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2918840yba; Sun, 28 Apr 2019 12:14:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqyaOaCJ+8zqIN+57mk/RofHa4Q97Nz6D9roDEEh57fLV+HuvPfrCN3bVM2bGXWrMvZzgWEj X-Received: by 2002:a17:902:9a48:: with SMTP id x8mr10890694plv.133.1556478873381; Sun, 28 Apr 2019 12:14:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556478873; cv=none; d=google.com; s=arc-20160816; b=qFu1T3/ev421xG5gNcBHL85RUOyCABrfN5qympektkHxMt9o41AiOh39Hj3CxkHTOp FC/OC7xLIx874T0kXmiEN0T8y7NWBrlO27cObvg/x0ARI5+LNPtS0DQXreRb+hCIrNW+ Ob/8WKEIZpTO3Py0+zT0axWCEJwRNbKBB1h4tklv/OFDjsbq2P1jSPcDWtM3N8f1GkyV lpAI9ex+zE7lVIU8LGw4JRrus7+2dgkL+ylYxkqm+j5FQ99DPyXJADEMvcfvBwFiyhwE B6B7XehyHDnIAEKxLNXcO5GEA2ENzvX2+eIbrEJtjlh3RpGp3Ok/rLGTPk9Uvl/KL5yM 35yA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=7oDL1Q58c45Slrr69XVQq9J2VKpYJhoNDNfb9g4j1/0=; b=0c5LrgO1t0q+kizG7Lo5ZHmzq145Nv3f3mr2NjZapdpbHAXbXnwPXp4skgXWugnEss JdeUanlmQ4J302v3zLgFz0VCYgD746MDo+wLrOHDsqDysoIbx91dFxlExlQiQf8CxFUz /JTBlbl5uq5fP0IXf/ecarNqHB4W+PEEzX/bZoWvmRJNdcaIcdLNpfvGy40P21Qhs1Np 4S3NSvZySBcBLCrrpo109Z6bzfeSgGQXPsjhd5KUoYGUlXSjhaJ6uwbC2lmkDWMQk49I tAD0H67iOdeH7EPHU5Kjgzl9xJP53CF17Q1gl8v+GentK4Mwn4SdLBkosixTE1qpf+1z sbxQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l68si32411809pfb.248.2019.04.28.12.14.18; Sun, 28 Apr 2019 12:14:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727152AbfD1TNU (ORCPT + 99 others); Sun, 28 Apr 2019 15:13:20 -0400 Received: from out30-54.freemail.mail.aliyun.com ([115.124.30.54]:37564 "EHLO out30-54.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726418AbfD1TNT (ORCPT ); Sun, 28 Apr 2019 15:13:19 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R111e4;CH=green;DM=||false|;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04426;MF=yang.shi@linux.alibaba.com;NM=1;PH=DS;RN=8;SR=0;TI=SMTPD_---0TQSMxWA_1556478793; Received: from US-143344MP.local(mailfrom:yang.shi@linux.alibaba.com fp:SMTPD_---0TQSMxWA_1556478793) by smtp.aliyun-inc.com(127.0.0.1); Mon, 29 Apr 2019 03:13:15 +0800 Subject: Re: [v2 PATCH] mm: thp: fix false negative of shmem vma's THP eligibility To: Michal Hocko , "Kirill A. Shutemov" Cc: vbabka@suse.cz, rientjes@google.com, kirill@shutemov.name, akpm@linux-foundation.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org References: <1556037781-57869-1-git-send-email-yang.shi@linux.alibaba.com> <20190423175252.GP25106@dhcp22.suse.cz> From: Yang Shi Message-ID: <5a571d64-bfce-aa04-312a-8e3547e0459a@linux.alibaba.com> Date: Sun, 28 Apr 2019 12:13:07 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <20190423175252.GP25106@dhcp22.suse.cz> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/23/19 10:52 AM, Michal Hocko wrote: > On Wed 24-04-19 00:43:01, Yang Shi wrote: >> The commit 7635d9cbe832 ("mm, thp, proc: report THP eligibility for each >> vma") introduced THPeligible bit for processes' smaps. But, when checking >> the eligibility for shmem vma, __transparent_hugepage_enabled() is >> called to override the result from shmem_huge_enabled(). It may result >> in the anonymous vma's THP flag override shmem's. For example, running a >> simple test which create THP for shmem, but with anonymous THP disabled, >> when reading the process's smaps, it may show: >> >> 7fc92ec00000-7fc92f000000 rw-s 00000000 00:14 27764 /dev/shm/test >> Size: 4096 kB >> ... >> [snip] >> ... >> ShmemPmdMapped: 4096 kB >> ... >> [snip] >> ... >> THPeligible: 0 >> >> And, /proc/meminfo does show THP allocated and PMD mapped too: >> >> ShmemHugePages: 4096 kB >> ShmemPmdMapped: 4096 kB >> >> This doesn't make too much sense. The anonymous THP flag should not >> intervene shmem THP. Calling shmem_huge_enabled() with checking >> MMF_DISABLE_THP sounds good enough. And, we could skip stack and >> dax vma check since we already checked if the vma is shmem already. > Kirill, can we get a confirmation that this is really intended behavior > rather than an omission please? Is this documented? What is a global > knob to simply disable THP system wise? Hi Kirill, Ping. Any comment? Thanks, Yang > > I have to say that the THP tuning API is one giant mess :/ > > Btw. this patch also seem to fix khugepaged behavior because it previously > ignored both VM_NOHUGEPAGE and MMF_DISABLE_THP. > >> Fixes: 7635d9cbe832 ("mm, thp, proc: report THP eligibility for each vma") >> Cc: Michal Hocko >> Cc: Vlastimil Babka >> Cc: David Rientjes >> Cc: Kirill A. Shutemov >> Signed-off-by: Yang Shi >> --- >> v2: Check VM_NOHUGEPAGE per Michal Hocko >> >> mm/huge_memory.c | 4 ++-- >> mm/shmem.c | 3 +++ >> 2 files changed, 5 insertions(+), 2 deletions(-) >> >> diff --git a/mm/huge_memory.c b/mm/huge_memory.c >> index 165ea46..5881e82 100644 >> --- a/mm/huge_memory.c >> +++ b/mm/huge_memory.c >> @@ -67,8 +67,8 @@ bool transparent_hugepage_enabled(struct vm_area_struct *vma) >> { >> if (vma_is_anonymous(vma)) >> return __transparent_hugepage_enabled(vma); >> - if (vma_is_shmem(vma) && shmem_huge_enabled(vma)) >> - return __transparent_hugepage_enabled(vma); >> + if (vma_is_shmem(vma)) >> + return shmem_huge_enabled(vma); >> >> return false; >> } >> diff --git a/mm/shmem.c b/mm/shmem.c >> index 2275a0f..6f09a31 100644 >> --- a/mm/shmem.c >> +++ b/mm/shmem.c >> @@ -3873,6 +3873,9 @@ bool shmem_huge_enabled(struct vm_area_struct *vma) >> loff_t i_size; >> pgoff_t off; >> >> + if ((vma->vm_flags & VM_NOHUGEPAGE) || >> + test_bit(MMF_DISABLE_THP, &vma->vm_mm->flags)) >> + return false; >> if (shmem_huge == SHMEM_HUGE_FORCE) >> return true; >> if (shmem_huge == SHMEM_HUGE_DENY) >> -- >> 1.8.3.1 >>