Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp4026625imw; Mon, 18 Jul 2022 20:22:20 -0700 (PDT) X-Google-Smtp-Source: AGRyM1slRccFayF7LZjBIg9YhKarNGjovfFiirxY0Q6g28KgBV3yr27jnPm/utxvGBjPpEMZ5LXI X-Received: by 2002:a05:6808:bd6:b0:337:92db:df12 with SMTP id o22-20020a0568080bd600b0033792dbdf12mr14811758oik.135.1658200939773; Mon, 18 Jul 2022 20:22:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658200939; cv=none; d=google.com; s=arc-20160816; b=lxxr/v65gvEb1Ve4yR5/8eQ+CWQu5Db0kfXhmq3fj68MFiQDjRuXsVZu/r4wN1df2n kGVuEmklejPjQfatHo4YUDqJpICC72W1bnvID/GF1L3UW+RGWpqOeDUffJQ5qBGwF/Zb 8wIoiwcfILYs2hcykGjbQwCwr1eihF5wRPcbefBtrmrE8o9vNIIj9lMNNbdtt/X/Dyx6 U1Z1nEBB+3JgepGEGMjhF+N5SEUlXFUsITSs3XMR++9rx9k+tJe5J/X6JhFK8dJq9oah acmF1gj3AxK6LkqC5XM/LokAzE32ELWbA1MOMq/umLFYm90XirewEutd2k8yWiTVui7H ROWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=gKT8VME58sy6r7sgexeE88RDTWXo2iTF0uHn6DvCYOE=; b=NBpWwrD+jhkWwjFD1nryr/Db6aTBZ4qaFwn8O2Xew8KlOtZ5bxAPBXy31Fw16AWTQW /BrVVPp015JoBppDv/kTG1UQMGk1kuI72AI2E6G/obU6b2EHlJ6qIpquDjLvwBxvPgS+ Og3eVqIEaH/V7g55ZARlv8hbBoChdhRNyvhiB/yC+bzJuDL8RJPbwrJ8vHqEtlmKZd+5 O7n4UrJLf/Eh+5ABbcrvxDZvtm2CD/jI86lGp4tvJg65qfwLP6JRZbIdfPxxelgRkYUA 7F/uex+/3ft6Haneefh+PoqlGKpcpR3jAKp0SjWCI1FtS8aYtBQ8xggdWHaDB3yx0Eos aQAQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x97-20020a9d20ea000000b0061c6abb20a7si12185489ota.90.2022.07.18.20.22.07; Mon, 18 Jul 2022 20:22:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235218AbiGSDIW (ORCPT + 99 others); Mon, 18 Jul 2022 23:08:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51660 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229793AbiGSDIU (ORCPT ); Mon, 18 Jul 2022 23:08:20 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5B50C252A2 for ; Mon, 18 Jul 2022 20:08:19 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7625C1042; Mon, 18 Jul 2022 20:08:19 -0700 (PDT) Received: from [10.162.41.8] (unknown [10.162.41.8]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 60D713F766; Mon, 18 Jul 2022 20:08:13 -0700 (PDT) Message-ID: Date: Tue, 19 Jul 2022 08:38:10 +0530 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.9.1 Subject: Re: [RESEND PATCH v3] arm64: enable THP_SWAP for arm64 Content-Language: en-US To: Barry Song <21cnbao@gmail.com>, "Huang, Ying" Cc: Andrew Morton , Catalin Marinas , LAK , Linux-MM , Steven Price , Will Deacon , Andrea Arcangeli , =?UTF-8?B?6YOt5YGl?= , hanchuanhua , Johannes Weiner , Hugh Dickins , LKML , Minchan Kim , Yang Shi , Barry Song , =?UTF-8?B?5byg6K+X5piOKFNpbW9uIFpoYW5nKQ==?= References: <20220718090050.2261-1-21cnbao@gmail.com> <87mtd62apo.fsf@yhuang6-desk2.ccr.corp.intel.com> From: Anshuman Khandual In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/19/22 06:53, Barry Song wrote: > On Tue, Jul 19, 2022 at 12:44 PM Huang, Ying wrote: >> >> Barry Song <21cnbao@gmail.com> writes: >> >>> From: Barry Song >>> >>> THP_SWAP has been proven to improve the swap throughput significantly >>> on x86_64 according to commit bd4c82c22c367e ("mm, THP, swap: delay >>> splitting THP after swapped out"). >>> As long as arm64 uses 4K page size, it is quite similar with x86_64 >>> by having 2MB PMD THP. THP_SWAP is architecture-independent, thus, >>> enabling it on arm64 will benefit arm64 as well. >>> A corner case is that MTE has an assumption that only base pages >>> can be swapped. We won't enable THP_SWAP for ARM64 hardware with >>> MTE support until MTE is reworked to coexist with THP_SWAP. >>> >>> A micro-benchmark is written to measure thp swapout throughput as >>> below, >>> >>> unsigned long long tv_to_ms(struct timeval tv) >>> { >>> return tv.tv_sec * 1000 + tv.tv_usec / 1000; >>> } >>> >>> main() >>> { >>> struct timeval tv_b, tv_e;; >>> #define SIZE 400*1024*1024 >>> volatile void *p = mmap(NULL, SIZE, PROT_READ | PROT_WRITE, >>> MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); >>> if (!p) { >>> perror("fail to get memory"); >>> exit(-1); >>> } >>> >>> madvise(p, SIZE, MADV_HUGEPAGE); >>> memset(p, 0x11, SIZE); /* write to get mem */ >>> >>> gettimeofday(&tv_b, NULL); >>> madvise(p, SIZE, MADV_PAGEOUT); >>> gettimeofday(&tv_e, NULL); >>> >>> printf("swp out bandwidth: %ld bytes/ms\n", >>> SIZE/(tv_to_ms(tv_e) - tv_to_ms(tv_b))); >>> } >>> >>> Testing is done on rk3568 64bit quad core processor Quad Core >>> Cortex-A55 platform - ROCK 3A. >>> thp swp throughput w/o patch: 2734bytes/ms (mean of 10 tests) >>> thp swp throughput w/ patch: 3331bytes/ms (mean of 10 tests) >>> >>> Cc: "Huang, Ying" >>> Cc: Minchan Kim >>> Cc: Johannes Weiner >>> Cc: Hugh Dickins >>> Cc: Andrea Arcangeli >>> Cc: Anshuman Khandual >>> Cc: Steven Price >>> Cc: Yang Shi >>> Signed-off-by: Barry Song >>> --- >>> -v3: >>> * refine the commit log; >>> * add a benchmark result; >>> * refine the macro of arch_thp_swp_supported >>> Thanks to the comments of Anshuman, Andrew, Steven >>> >>> arch/arm64/Kconfig | 1 + >>> arch/arm64/include/asm/pgtable.h | 6 ++++++ >>> include/linux/huge_mm.h | 12 ++++++++++++ >>> mm/swap_slots.c | 2 +- >>> 4 files changed, 20 insertions(+), 1 deletion(-) >>> >>> diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig >>> index 1652a9800ebe..e1c540e80eec 100644 >>> --- a/arch/arm64/Kconfig >>> +++ b/arch/arm64/Kconfig >>> @@ -101,6 +101,7 @@ config ARM64 >>> select ARCH_WANT_HUGETLB_PAGE_OPTIMIZE_VMEMMAP >>> select ARCH_WANT_LD_ORPHAN_WARN >>> select ARCH_WANTS_NO_INSTR >>> + select ARCH_WANTS_THP_SWAP if ARM64_4K_PAGES >>> select ARCH_HAS_UBSAN_SANITIZE_ALL >>> select ARM_AMBA >>> select ARM_ARCH_TIMER >>> diff --git a/arch/arm64/include/asm/pgtable.h b/arch/arm64/include/asm/pgtable.h >>> index 0b6632f18364..78d6f6014bfb 100644 >>> --- a/arch/arm64/include/asm/pgtable.h >>> +++ b/arch/arm64/include/asm/pgtable.h >>> @@ -45,6 +45,12 @@ >>> __flush_tlb_range(vma, addr, end, PUD_SIZE, false, 1) >>> #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ >>> >>> +static inline bool arch_thp_swp_supported(void) >>> +{ >>> + return !system_supports_mte(); >>> +} >>> +#define arch_thp_swp_supported arch_thp_swp_supported >>> + >>> /* >>> * Outside of a few very special situations (e.g. hibernation), we always >>> * use broadcast TLB invalidation instructions, therefore a spurious page >>> diff --git a/include/linux/huge_mm.h b/include/linux/huge_mm.h >>> index de29821231c9..4ddaf6ad73ef 100644 >>> --- a/include/linux/huge_mm.h >>> +++ b/include/linux/huge_mm.h >>> @@ -461,4 +461,16 @@ static inline int split_folio_to_list(struct folio *folio, >>> return split_huge_page_to_list(&folio->page, list); >>> } >>> >>> +/* >>> + * archs that select ARCH_WANTS_THP_SWAP but don't support THP_SWP due to >>> + * limitations in the implementation like arm64 MTE can override this to >>> + * false >>> + */ >>> +#ifndef arch_thp_swp_supported >>> +static inline bool arch_thp_swp_supported(void) >>> +{ >>> + return true; >>> +} >> >> How about the following? >> >> static inline bool arch_wants_thp_swap(void) >> { >> return IS_ENABLED(ARCH_WANTS_THP_SWAP); >> } > > This looks good. then i'll need to change arm64 to > > +static inline bool arch_thp_swp_supported(void) > +{ > + return IS_ENABLED(ARCH_WANTS_THP_SWAP) && !system_supports_mte(); > +} Why ? CONFIG_THP_SWAP depends on ARCH_WANTS_THP_SWAP. In folio_alloc_swap(), IS_ENABLED(CONFIG_THP_SWAP) enabled, will also imply ARCH_WANTS_THP_SWAP too is enabled. Hence checking for ARCH_WANTS_THP_SWAP again does not make sense either in the generic fallback stub, or in arm64 platform override. Because without ARCH_WANTS_THP_SWAP enabled, arch_thp_swp_supported() should never be called in the first place. > >> >> Best Regards, >> Huang, Ying >> >>> +#endif >>> + >>> #endif /* _LINUX_HUGE_MM_H */ >>> diff --git a/mm/swap_slots.c b/mm/swap_slots.c >>> index 2a65a89b5b4d..10b94d64cc25 100644 >>> --- a/mm/swap_slots.c >>> +++ b/mm/swap_slots.c >>> @@ -307,7 +307,7 @@ swp_entry_t folio_alloc_swap(struct folio *folio) >>> entry.val = 0; >>> >>> if (folio_test_large(folio)) { >>> - if (IS_ENABLED(CONFIG_THP_SWAP)) >>> + if (IS_ENABLED(CONFIG_THP_SWAP) && arch_thp_swp_supported()) >>> get_swap_pages(1, &entry, folio_nr_pages(folio)); >>> goto out; >>> } > > Thanks > Barry >