Received: by 2002:a5d:925a:0:0:0:0:0 with SMTP id e26csp1636849iol; Fri, 10 Jun 2022 11:27:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxkDPObm74VlBGmSzmGp485DvJjBF/0tDG0StpUtbTMJqKVQCUqg67W7b4/QLThoJvYUuUU X-Received: by 2002:a17:907:6289:b0:6e0:eb0c:8ee7 with SMTP id nd9-20020a170907628900b006e0eb0c8ee7mr40017919ejc.245.1654885656698; Fri, 10 Jun 2022 11:27:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654885656; cv=none; d=google.com; s=arc-20160816; b=vtnn5BF+Xuwiuea0203DG81zHI50mxZtB02ADwvgvresedK+I6ywCI5rVl6anav9Qz F27sDOqpXlc99mrs+o1ifheIFl4SeIcTuj5FL4hx17AV0D/1RGNIq7A+NGchqD3mrWWR E4praQRt98Y2Yz9NGB/gzTUepZMbYqjnTl/zJR3dMl/5z673LYwRPE9CdXDHv1KOYsqD O/kk3Juckp8gg4M34oB4c2QQikMhOlgaxzGg/Fw3wQ9FvjS1XXgEN5/PLjT4QBseRDqa EObXnQ5ikpZPqNWZHq0EaOoGl7ZWGz89fPkQ5qrtDlAxYhSfFVGw+9Rux7z72EFn3KY3 hqTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=bE4fH6vahNgduyfLhrD++hZjkMCO9K98v5MCel9fwWM=; b=erXLP5/s73evErRA+KlCYDcYkCf/NDGCbmwR4iWBnOOEo7x8k5fTGg2LYJG10x3BhU FSCpsKV8cqtxcLjNjuBfC7I0jtsPwrJsiU/JhG7UGnd1MRDpSQIXSWfhlV7vplU2pKkT 89bv6Rp3hExh5UnU41r8eN/9Pwazx2pE9goSRc/dqPlJwg0jnTNUrUOxxON2uAmhudRg aj/Al0oDILsMcCBDBJ6Xwd/0x00CV9dE98HSIAQPODQE98/pjsD9V7kyL3sBW7cIF3/V eR6U6gb1bghBvRssYLw82PD89AHF2KhKTo5ZEEAVUAKTs23H/1IzMTgYMpIVSkoF6oyF 1aVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=HjbdpL+T; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hw9-20020a170907a0c900b0070c710a6dccsi10418633ejc.480.2022.06.10.11.27.11; Fri, 10 Jun 2022 11:27:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=HjbdpL+T; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345405AbiFJRYk (ORCPT + 99 others); Fri, 10 Jun 2022 13:24:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42822 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231149AbiFJRYi (ORCPT ); Fri, 10 Jun 2022 13:24:38 -0400 Received: from mail-pg1-x532.google.com (mail-pg1-x532.google.com [IPv6:2607:f8b0:4864:20::532]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 17D9E4EA38 for ; Fri, 10 Jun 2022 10:24:37 -0700 (PDT) Received: by mail-pg1-x532.google.com with SMTP id e66so25368732pgc.8 for ; Fri, 10 Jun 2022 10:24:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=bE4fH6vahNgduyfLhrD++hZjkMCO9K98v5MCel9fwWM=; b=HjbdpL+TD2R9+VL83qpnXgMUEBPa+80TijrGZjX7xpAXlkEm1gPtzgor9E+WcgzITt G16rJ3j3yMR6HOEaiQDOKu9aHQF09O71P6QEkuTUxo9Mr1aS+mWhyfIBopLwVfpre0n5 kpNDmhy6R8Dcs8Rc1qRQipwNxVhN7FtYaOpscAAe2VPuhWkj+rTNA0Rla92sc6ZYeD1A JNaxz63mr9ybul967fUav9SjsluPnX0UIi4eDI3ohd48TbWEPmqUlfMTGryHRG8MT7bp Jeko4bZL6LtQYEEm/56B9wl553FEBH0Ad985oViVUCK5MLVu+/aI0U8iIjzqL92I0f/Z et3g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=bE4fH6vahNgduyfLhrD++hZjkMCO9K98v5MCel9fwWM=; b=Of0Ui/ErdSyG01v5lJMf82oiOKnHck6mKOYFjeykUnrBOPER4dC3+nJXJH7hgURr1D kJk8c8fmPJKl+i8/TLkyXgn+I1GMgt/TWCIPbTDa4VZGu2ne3Y+hFmuR+QWu+xlNRM1C 9YyOCnEA7RkL0i8MsWW3wFWGOgFnqdV6zJDaXh3irj9aBdK/VVQ4PxFEZ3e90WllCkH4 reQxSYFNCa82AMwmd2oTiUMUI6tarCFNnUFIOj1GXk7EAzOmZIzozzgiJWwiHxl0yjWX OAbmsxC9atQTkDX0ZeTBNJ+4c0ayc2AViJi4ihdzsWGHo1fBOJJHWnfJTpyQoJ89yynh MSrA== X-Gm-Message-State: AOAM5314STuSxoWIJfQdfyUHhEVlKrbHKOkBipCS7WBRk0OAezqNOEqB c+OduOpJqMLgrzD+ISgOjTz96u8sKd/uIF9SsrE= X-Received: by 2002:a05:6a00:1745:b0:51b:de90:aefb with SMTP id j5-20020a056a00174500b0051bde90aefbmr41125940pfc.11.1654881876512; Fri, 10 Jun 2022 10:24:36 -0700 (PDT) MIME-Version: 1.0 References: <20220606214414.736109-1-shy828301@gmail.com> <20220606214414.736109-7-shy828301@gmail.com> In-Reply-To: From: Yang Shi Date: Fri, 10 Jun 2022 10:24:23 -0700 Message-ID: Subject: Re: [v3 PATCH 6/7] mm: thp: kill __transhuge_page_enabled() To: "Zach O'Keefe" Cc: Vlastimil Babka , "Kirill A. Shutemov" , Matthew Wilcox , Andrew Morton , Linux MM , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 9, 2022 at 7:22 PM Zach O'Keefe wrote: > > On Mon, Jun 6, 2022 at 2:44 PM Yang Shi wrote: > > > > The page fault path checks THP eligibility with > > __transhuge_page_enabled() which does the similar thing as > > hugepage_vma_check(), so use hugepage_vma_check() instead. > > > > However page fault allows DAX and !anon_vma cases, so added a new flag, > > in_pf, to hugepage_vma_check() to make page fault work correctly. > > > > The in_pf flag is also used to skip shmem and file THP for page fault > > since shmem handles THP in its own shmem_fault() and file THP allocation > > on fault is not supported yet. > > > > Also remove hugepage_vma_enabled() since hugepage_vma_check() is the > > only caller now, it is not necessary to have a helper function. > > > > Signed-off-by: Yang Shi > > --- > > fs/proc/task_mmu.c | 2 +- > > include/linux/huge_mm.h | 57 ++------------------------------------ > > include/linux/khugepaged.h | 2 +- > > mm/huge_memory.c | 25 ++++++++++++----- > > mm/khugepaged.c | 8 +++--- > > mm/memory.c | 7 +++-- > > 6 files changed, 31 insertions(+), 70 deletions(-) > > > > diff --git a/fs/proc/task_mmu.c b/fs/proc/task_mmu.c > > index fd79566e204c..a0850303baec 100644 > > --- a/fs/proc/task_mmu.c > > +++ b/fs/proc/task_mmu.c > > @@ -860,7 +860,7 @@ static int show_smap(struct seq_file *m, void *v) > > __show_smap(m, &mss, false); > > > > seq_printf(m, "THPeligible: %d\n", > > - hugepage_vma_check(vma, vma->vm_flags, true)); > > + hugepage_vma_check(vma, vma->vm_flags, true, false)); > > > > if (arch_pkeys_enabled()) > > seq_printf(m, "ProtectionKey: %8u\n", vma_pkey(vma)); > > diff --git a/include/linux/huge_mm.h b/include/linux/huge_mm.h > > index f561c3e16def..d478e8875023 100644 > > --- a/include/linux/huge_mm.h > > +++ b/include/linux/huge_mm.h > > @@ -153,48 +153,6 @@ static inline bool transhuge_vma_suitable(struct vm_area_struct *vma, > > return true; > > } > > > > -static inline bool transhuge_vma_enabled(struct vm_area_struct *vma, > > - unsigned long vm_flags) > > -{ > > - /* Explicitly disabled through madvise. */ > > - if ((vm_flags & VM_NOHUGEPAGE) || > > - test_bit(MMF_DISABLE_THP, &vma->vm_mm->flags)) > > - return false; > > - return true; > > -} > > - > > -/* > > - * to be used on vmas which are known to support THP. > > - * Use transparent_hugepage_active otherwise > > - */ > > -static inline bool __transparent_hugepage_enabled(struct vm_area_struct *vma) > > -{ > > - > > - /* > > - * If the hardware/firmware marked hugepage support disabled. > > - */ > > - if (transparent_hugepage_flags & (1 << TRANSPARENT_HUGEPAGE_NEVER_DAX)) > > - return false; > > - > > - if (!transhuge_vma_enabled(vma, vma->vm_flags)) > > - return false; > > - > > - if (vma_is_temporary_stack(vma)) > > - return false; > > - > > - if (transparent_hugepage_flags & (1 << TRANSPARENT_HUGEPAGE_FLAG)) > > - return true; > > - > > - if (vma_is_dax(vma)) > > - return true; > > - > > - if (transparent_hugepage_flags & > > - (1 << TRANSPARENT_HUGEPAGE_REQ_MADV_FLAG)) > > - return !!(vma->vm_flags & VM_HUGEPAGE); > > - > > - return false; > > -} > > - > > static inline bool file_thp_enabled(struct vm_area_struct *vma) > > { > > struct inode *inode; > > @@ -211,7 +169,7 @@ static inline bool file_thp_enabled(struct vm_area_struct *vma) > > > > bool hugepage_vma_check(struct vm_area_struct *vma, > > unsigned long vm_flags, > > - bool smaps); > > + bool smaps, bool in_pf); > > > > #define transparent_hugepage_use_zero_page() \ > > (transparent_hugepage_flags & \ > > @@ -355,11 +313,6 @@ static inline bool folio_test_pmd_mappable(struct folio *folio) > > return false; > > } > > > > -static inline bool __transparent_hugepage_enabled(struct vm_area_struct *vma) > > -{ > > - return false; > > -} > > - > > static inline bool transhuge_vma_size_ok(struct vm_area_struct *vma) > > { > > return false; > > @@ -371,15 +324,9 @@ static inline bool transhuge_vma_suitable(struct vm_area_struct *vma, > > return false; > > } > > > > -static inline bool transhuge_vma_enabled(struct vm_area_struct *vma, > > - unsigned long vm_flags) > > -{ > > - return false; > > -} > > - > > static inline bool hugepage_vma_check(struct vm_area_struct *vma, > > unsigned long vm_flags, > > - bool smaps) > > + bool smaps, bool in_pf) > > { > > return false; > > } > > diff --git a/include/linux/khugepaged.h b/include/linux/khugepaged.h > > index 8a6452e089ca..e047be601268 100644 > > --- a/include/linux/khugepaged.h > > +++ b/include/linux/khugepaged.h > > @@ -55,7 +55,7 @@ static inline void khugepaged_enter(struct vm_area_struct *vma, > > { > > if (!test_bit(MMF_VM_HUGEPAGE, &vma->vm_mm->flags) && > > khugepaged_enabled()) { > > - if (hugepage_vma_check(vma, vm_flags, false)) > > + if (hugepage_vma_check(vma, vm_flags, false, false)) > > __khugepaged_enter(vma->vm_mm); > > } > > } > > diff --git a/mm/huge_memory.c b/mm/huge_memory.c > > index bc8370856e85..b95786ada466 100644 > > --- a/mm/huge_memory.c > > +++ b/mm/huge_memory.c > > @@ -71,17 +71,25 @@ unsigned long huge_zero_pfn __read_mostly = ~0UL; > > > > bool hugepage_vma_check(struct vm_area_struct *vma, > > unsigned long vm_flags, > > - bool smaps) > > + bool smaps, bool in_pf) > > { > > - if (!transhuge_vma_enabled(vma, vm_flags)) > > + /* Explicitly disabled through madvise or prctl. */ > > Or s390 kvm (not that this has to be exhaustively maintained). > > > + if ((vm_flags & VM_NOHUGEPAGE) || > > + test_bit(MMF_DISABLE_THP, &vma->vm_mm->flags)) > > + return false; > > + /* > > + * If the hardware/firmware marked hugepage support disabled. > > + */ > > + if (transparent_hugepage_flags & (1 << TRANSPARENT_HUGEPAGE_NEVER_DAX)) > > return false; > > This introduces an extra check for khugepaged path. I don't know > enough about TRANSPARENT_HUGEPAGE_NEVER_DAX, but I assume this is ok? > What would have happened previously if khugepaged tried to collapse > this memory? Please refer to commit bae849538157 ("mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled") for why this flag was introduced. It is set if hardware doesn't support hugepages, and khugepaged doesn't collapse since khugepaged won't be started at all. But this flag needs to be checked in the page fault path. > > > + /* Special VMA and hugetlb VMA */ > > if (vm_flags & VM_NO_KHUGEPAGED) > > return false; > > This adds an extra check along the fault path. Is it also safe to add? I think it is safe since hugepage_vma_check() is just used by THP. Hugetlb has its own page fault handler. > > > - /* Don't run khugepaged against DAX vma */ > > + /* khugepaged doesn't collapse DAX vma, but page fault is fine. */ > > if (vma_is_dax(vma)) > > - return false; > > + return in_pf; > > I assume vma_is_temporary_stack() and vma_is_dax() is mutually exclusive. I think so. > > > if (vma->vm_file && !IS_ALIGNED((vma->vm_start >> PAGE_SHIFT) - > > vma->vm_pgoff, HPAGE_PMD_NR)) > > @@ -91,7 +99,7 @@ bool hugepage_vma_check(struct vm_area_struct *vma, > > return false; > > > > /* Enabled via shmem mount options or sysfs settings. */ > > - if (shmem_file(vma->vm_file)) > > + if (!in_pf && shmem_file(vma->vm_file)) > > return shmem_huge_enabled(vma); > > Will shmem_file() ever be true in the fault path? Or is this just an > optimization? It could be true. But shmem has its own implementation for huge page fault and doesn't implement huge_fault() in its vm_operations, so it will fallback even though "in_pf" is not checked. But xfs does have huge_fault() implemented, so it may try to allocate THP for non-DAX xfs files. So the "in_pf" flag is introduced to handle this. Since we need this flag anyway, why not use it to return earlier for shmem instead of relying on fallback. Anyway this is all because __transparent_huge_enabled() is replaced by hugepage_vma_check(). > > if (!khugepaged_enabled()) > > @@ -102,7 +110,7 @@ bool hugepage_vma_check(struct vm_area_struct *vma, > > return false; > > > > /* Only regular file is valid */ > > - if (file_thp_enabled(vma)) > > + if (!in_pf && file_thp_enabled(vma)) > > return true; > > Likewise for file_thp_enabled() Yes, same as the above. > > > if (!vma_is_anonymous(vma)) > > @@ -114,9 +122,12 @@ bool hugepage_vma_check(struct vm_area_struct *vma, > > /* > > * THPeligible bit of smaps should show 1 for proper VMAs even > > * though anon_vma is not initialized yet. > > + * > > + * Allow page fault since anon_vma may be not initialized until > > + * the first page fault. > > */ > > if (!vma->anon_vma) > > - return smaps; > > + return (smaps || in_pf); > > > > return true; > > } > > diff --git a/mm/khugepaged.c b/mm/khugepaged.c > > index aa0769e3b0d9..ab6183c5489f 100644 > > --- a/mm/khugepaged.c > > +++ b/mm/khugepaged.c > > @@ -473,7 +473,7 @@ void khugepaged_enter_vma(struct vm_area_struct *vma, > > { > > if (!test_bit(MMF_VM_HUGEPAGE, &vma->vm_mm->flags) && > > khugepaged_enabled()) { > > - if (hugepage_vma_check(vma, vm_flags, false)) > > + if (hugepage_vma_check(vma, vm_flags, false, false)) > > __khugepaged_enter(vma->vm_mm); > > } > > } > > @@ -918,7 +918,7 @@ static int hugepage_vma_revalidate(struct mm_struct *mm, unsigned long address, > > > > if (!transhuge_vma_suitable(vma, address)) > > return SCAN_ADDRESS_RANGE; > > - if (!hugepage_vma_check(vma, vma->vm_flags, false)) > > + if (!hugepage_vma_check(vma, vma->vm_flags, false, false)) > > return SCAN_VMA_CHECK; > > return 0; > > } > > @@ -1399,7 +1399,7 @@ void collapse_pte_mapped_thp(struct mm_struct *mm, unsigned long addr) > > * the valid THP. Add extra VM_HUGEPAGE so hugepage_vma_check() > > * will not fail the vma for missing VM_HUGEPAGE > > */ > > - if (!hugepage_vma_check(vma, vma->vm_flags | VM_HUGEPAGE, false)) > > + if (!hugepage_vma_check(vma, vma->vm_flags | VM_HUGEPAGE, false, false)) > > return; > > > > /* Keep pmd pgtable for uffd-wp; see comment in retract_page_tables() */ > > @@ -2089,7 +2089,7 @@ static unsigned int khugepaged_scan_mm_slot(unsigned int pages, > > progress++; > > break; > > } > > - if (!hugepage_vma_check(vma, vma->vm_flags, false)) { > > + if (!hugepage_vma_check(vma, vma->vm_flags, false, false)) { > > skip: > > progress++; > > continue; > > diff --git a/mm/memory.c b/mm/memory.c > > index bc5d40eec5d5..673f7561a30a 100644 > > --- a/mm/memory.c > > +++ b/mm/memory.c > > @@ -4962,6 +4962,7 @@ static vm_fault_t __handle_mm_fault(struct vm_area_struct *vma, > > .gfp_mask = __get_fault_gfp_mask(vma), > > }; > > struct mm_struct *mm = vma->vm_mm; > > + unsigned long vm_flags = vma->vm_flags; > > pgd_t *pgd; > > p4d_t *p4d; > > vm_fault_t ret; > > @@ -4975,7 +4976,8 @@ static vm_fault_t __handle_mm_fault(struct vm_area_struct *vma, > > if (!vmf.pud) > > return VM_FAULT_OOM; > > retry_pud: > > - if (pud_none(*vmf.pud) && __transparent_hugepage_enabled(vma)) { > > + if (pud_none(*vmf.pud) && > > + hugepage_vma_check(vma, vm_flags, false, true)) { > > ret = create_huge_pud(&vmf); > > if (!(ret & VM_FAULT_FALLBACK)) > > return ret; > > @@ -5008,7 +5010,8 @@ static vm_fault_t __handle_mm_fault(struct vm_area_struct *vma, > > if (pud_trans_unstable(vmf.pud)) > > goto retry_pud; > > > > - if (pmd_none(*vmf.pmd) && __transparent_hugepage_enabled(vma)) { > > + if (pmd_none(*vmf.pmd) && > > + hugepage_vma_check(vma, vm_flags, false, true)) { > > ret = create_huge_pmd(&vmf); > > if (!(ret & VM_FAULT_FALLBACK)) > > return ret; > > -- > > 2.26.3 > > > >