Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp7424871rdb; Wed, 3 Jan 2024 16:09:48 -0800 (PST) X-Google-Smtp-Source: AGHT+IHF5agrtvoQ6cPSA6iAQtJ/v7HCkfRz3fpkrulzdqFVbKsWYkC96E6ac8TBOyafiit9RF0m X-Received: by 2002:ae9:ea01:0:b0:781:9e1d:14f2 with SMTP id f1-20020ae9ea01000000b007819e1d14f2mr9796470qkg.8.1704326988380; Wed, 03 Jan 2024 16:09:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704326988; cv=none; d=google.com; s=arc-20160816; b=iqJd6rLeJgN91vj6Xogr1r/MN+eFUBneD/qUHQh/ZWj0aTY5yYNf3BnVHpNXYv0YI6 kRlUoZt+mzP01XbXWO79jrPuZBWvX+Z/gPTkj9lOBPb4YXCJ3gOn6z4o6msB3g5yL9aT Jsx38nLdw6Roz5mQpghUzCOuKen/LSLMhiIQbUdIfB95FS0KnoEMbHRNi1WYoOnWpc05 L11Y0GV9dkCGZiJKSgg6cPUMsmv4ome0E03kvPrOFgCF6ORk0clEeYvVQjdod7ZeLCA3 P+PMdFfeAUojMXDtntJpAMZlebnEMA3YemOcVn04y+zEYf+2wD5IqGAF4sH4G403rdLS kvSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:dkim-signature:date; bh=8frufT5RlWWzipG2q0mi58H0Swj/zq/wij+Dt0ONUuI=; fh=VdZFymx2W1JJJwNKZgHjeLR6mDiSFaRiR33A9dBsLZs=; b=RXRwx5EpGT7CHRYNR/XBLIzrosrk/1FKHwRoy8KXlIXSScsCQCZF2HZd5PUpXbqjp7 hbJ5vctWM9as2r2XpzuEEeZmh63NgSeHJ1ZGDBVgNzaKdn21AWEy+UD0Uv2KagqlW9WN MfRgKT60pxs0u3DCUqtln2YY+/prqB+mzbdwC21yyarukXl0vjFyPzBvVRDHbbmxO1PB wqquy3qPpxYa9zU0IWFfSqttzrahdevYPNaYSByX7nRqwi7pcLDgVbhVry6LU6kvOy+f qcT/R2+POPKSayomVnk6hXrK5EFvcdUPlTlWW6XDzPY2117B/dOZCUUMgsj6ty1Od+NN /QnQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=s6nyM+eB; spf=pass (google.com: domain of linux-kernel+bounces-16132-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-16132-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id t15-20020a05620a450f00b007777245a946si31680295qkp.41.2024.01.03.16.09.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 Jan 2024 16:09:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-16132-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=s6nyM+eB; spf=pass (google.com: domain of linux-kernel+bounces-16132-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-16132-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id C15621C24AA0 for ; Thu, 4 Jan 2024 00:09:47 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 5DA20652; Thu, 4 Jan 2024 00:09:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="s6nyM+eB" X-Original-To: linux-kernel@vger.kernel.org Received: from out-185.mta1.migadu.com (out-185.mta1.migadu.com [95.215.58.185]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D827B367 for ; Thu, 4 Jan 2024 00:09:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev Date: Thu, 4 Jan 2024 09:09:19 +0900 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1704326973; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=8frufT5RlWWzipG2q0mi58H0Swj/zq/wij+Dt0ONUuI=; b=s6nyM+eBQL+MMaQjupAHuVd5/ftHBHJXFro7qAhxPZqeIX+BLZ7WcEv26gW7HWhaNU1/vn XwTUKpD6l7C8Z8S0tRqBGqQBQQA45jREYc2LBmc95Bb7weaQ1VSs+OwjhitwWxje3q68sr xgUXsNh8C4JNGh7AU01JFPSiTKUUftM= X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Itaru Kitayama To: Ryan Roberts Cc: Andrew Morton , Matthew Wilcox , Yin Fengwei , David Hildenbrand , Yu Zhao , Catalin Marinas , Anshuman Khandual , Yang Shi , "Huang, Ying" , Zi Yan , Luis Chamberlain , Itaru Kitayama , "Kirill A. Shutemov" , John Hubbard , David Rientjes , Vlastimil Babka , Hugh Dickins , Kefeng Wang , Barry Song <21cnbao@gmail.com>, Alistair Popple , linux-mm@kvack.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v9 09/10] selftests/mm/cow: Generalize do_run_with_thp() helper Message-ID: References: <20231207161211.2374093-1-ryan.roberts@arm.com> <20231207161211.2374093-10-ryan.roberts@arm.com> <7d07caae-ae22-4cda-a3d0-4f542f52817a@arm.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7d07caae-ae22-4cda-a3d0-4f542f52817a@arm.com> X-Migadu-Flow: FLOW_OUT On Wed, Jan 03, 2024 at 08:33:24AM +0000, Ryan Roberts wrote: > On 03/01/2024 06:21, Itaru Kitayama wrote: > > On Thu, Dec 07, 2023 at 04:12:10PM +0000, Ryan Roberts wrote: > >> do_run_with_thp() prepares (PMD-sized) THP memory into different states > >> before running tests. With the introduction of multi-size THP, we would > >> like to reuse this logic to also test those smaller THP sizes. So let's > >> add a thpsize parameter which tells the function what size THP it should > >> operate on. > >> > >> A separate commit will utilize this change to add new tests for > >> multi-size THP, where available. > >> > >> Reviewed-by: David Hildenbrand > >> Tested-by: Kefeng Wang > >> Tested-by: John Hubbard > >> Signed-off-by: Ryan Roberts > > > > Tested-by: Itaru Kitayama > > Thanks for testing! > > > > > I am replying to all this time; Ryan, do you think it's okay to run > > 700 of selftests/mm/cow tests? Even on FVP, they did not take longer > > though. > > What exactly is your concern, the amount of time it takes to run the tests? I've > found (at least on real HW) that the time it takes to run a test is dominated by > accessing the folio's memory. So adding all of the new tests that test sizes > between order-2 and PMD_ORDER-1 is ~equivalent to running the existing PMD_ORDER > tests twice. And the runtime of those is barely noticable compared to the > PUD_ORDER HugeTLB tests. So I don't think we are impacting runtime by much. > Sounds like your experience says that's also true for FVP? My primary concern was the time amount of time, but going back from mm-unstable/mm-stable, which contains your multi THP changes to Linus' master, I see what you were saying - the total number of tests for the "cow" program is the same. And I am convinced that the total time won't be changed much. On FVP EVP RevC, if those kselftests tests are not focusing on stress testing, tests are processed reasonably "fast". Lastly, as you tried to come up a series, the way mm kselftests executed is not so intuitive to me, as I am starting tests from the run_kselftest.sh script, I don't think mm tests are run using the -t (specific test) or -c (entire mm collection) options. Thanks, Itaru. > > > > >> --- > >> tools/testing/selftests/mm/cow.c | 121 +++++++++++++++++-------------- > >> 1 file changed, 67 insertions(+), 54 deletions(-) > >> > >> diff --git a/tools/testing/selftests/mm/cow.c b/tools/testing/selftests/mm/cow.c > >> index 7324ce5363c0..4d0b5a125d3c 100644 > >> --- a/tools/testing/selftests/mm/cow.c > >> +++ b/tools/testing/selftests/mm/cow.c > >> @@ -32,7 +32,7 @@ > >> > >> static size_t pagesize; > >> static int pagemap_fd; > >> -static size_t thpsize; > >> +static size_t pmdsize; > >> static int nr_hugetlbsizes; > >> static size_t hugetlbsizes[10]; > >> static int gup_fd; > >> @@ -734,7 +734,7 @@ enum thp_run { > >> THP_RUN_PARTIAL_SHARED, > >> }; > >> > >> -static void do_run_with_thp(test_fn fn, enum thp_run thp_run) > >> +static void do_run_with_thp(test_fn fn, enum thp_run thp_run, size_t thpsize) > >> { > >> char *mem, *mmap_mem, *tmp, *mremap_mem = MAP_FAILED; > >> size_t size, mmap_size, mremap_size; > >> @@ -759,11 +759,11 @@ static void do_run_with_thp(test_fn fn, enum thp_run thp_run) > >> } > >> > >> /* > >> - * Try to populate a THP. Touch the first sub-page and test if we get > >> - * another sub-page populated automatically. > >> + * Try to populate a THP. Touch the first sub-page and test if > >> + * we get the last sub-page populated automatically. > >> */ > >> mem[0] = 0; > >> - if (!pagemap_is_populated(pagemap_fd, mem + pagesize)) { > >> + if (!pagemap_is_populated(pagemap_fd, mem + thpsize - pagesize)) { > >> ksft_test_result_skip("Did not get a THP populated\n"); > >> goto munmap; > >> } > >> @@ -773,12 +773,14 @@ static void do_run_with_thp(test_fn fn, enum thp_run thp_run) > >> switch (thp_run) { > >> case THP_RUN_PMD: > >> case THP_RUN_PMD_SWAPOUT: > >> + assert(thpsize == pmdsize); > >> break; > >> case THP_RUN_PTE: > >> case THP_RUN_PTE_SWAPOUT: > >> /* > >> * Trigger PTE-mapping the THP by temporarily mapping a single > >> - * subpage R/O. > >> + * subpage R/O. This is a noop if the THP is not pmdsize (and > >> + * therefore already PTE-mapped). > >> */ > >> ret = mprotect(mem + pagesize, pagesize, PROT_READ); > >> if (ret) { > >> @@ -875,52 +877,60 @@ static void do_run_with_thp(test_fn fn, enum thp_run thp_run) > >> munmap(mremap_mem, mremap_size); > >> } > >> > >> -static void run_with_thp(test_fn fn, const char *desc) > >> +static void run_with_thp(test_fn fn, const char *desc, size_t size) > >> { > >> - ksft_print_msg("[RUN] %s ... with THP\n", desc); > >> - do_run_with_thp(fn, THP_RUN_PMD); > >> + ksft_print_msg("[RUN] %s ... with THP (%zu kB)\n", > >> + desc, size / 1024); > >> + do_run_with_thp(fn, THP_RUN_PMD, size); > >> } > >> > >> -static void run_with_thp_swap(test_fn fn, const char *desc) > >> +static void run_with_thp_swap(test_fn fn, const char *desc, size_t size) > >> { > >> - ksft_print_msg("[RUN] %s ... with swapped-out THP\n", desc); > >> - do_run_with_thp(fn, THP_RUN_PMD_SWAPOUT); > >> + ksft_print_msg("[RUN] %s ... with swapped-out THP (%zu kB)\n", > >> + desc, size / 1024); > >> + do_run_with_thp(fn, THP_RUN_PMD_SWAPOUT, size); > >> } > >> > >> -static void run_with_pte_mapped_thp(test_fn fn, const char *desc) > >> +static void run_with_pte_mapped_thp(test_fn fn, const char *desc, size_t size) > >> { > >> - ksft_print_msg("[RUN] %s ... with PTE-mapped THP\n", desc); > >> - do_run_with_thp(fn, THP_RUN_PTE); > >> + ksft_print_msg("[RUN] %s ... with PTE-mapped THP (%zu kB)\n", > >> + desc, size / 1024); > >> + do_run_with_thp(fn, THP_RUN_PTE, size); > >> } > >> > >> -static void run_with_pte_mapped_thp_swap(test_fn fn, const char *desc) > >> +static void run_with_pte_mapped_thp_swap(test_fn fn, const char *desc, size_t size) > >> { > >> - ksft_print_msg("[RUN] %s ... with swapped-out, PTE-mapped THP\n", desc); > >> - do_run_with_thp(fn, THP_RUN_PTE_SWAPOUT); > >> + ksft_print_msg("[RUN] %s ... with swapped-out, PTE-mapped THP (%zu kB)\n", > >> + desc, size / 1024); > >> + do_run_with_thp(fn, THP_RUN_PTE_SWAPOUT, size); > >> } > >> > >> -static void run_with_single_pte_of_thp(test_fn fn, const char *desc) > >> +static void run_with_single_pte_of_thp(test_fn fn, const char *desc, size_t size) > >> { > >> - ksft_print_msg("[RUN] %s ... with single PTE of THP\n", desc); > >> - do_run_with_thp(fn, THP_RUN_SINGLE_PTE); > >> + ksft_print_msg("[RUN] %s ... with single PTE of THP (%zu kB)\n", > >> + desc, size / 1024); > >> + do_run_with_thp(fn, THP_RUN_SINGLE_PTE, size); > >> } > >> > >> -static void run_with_single_pte_of_thp_swap(test_fn fn, const char *desc) > >> +static void run_with_single_pte_of_thp_swap(test_fn fn, const char *desc, size_t size) > >> { > >> - ksft_print_msg("[RUN] %s ... with single PTE of swapped-out THP\n", desc); > >> - do_run_with_thp(fn, THP_RUN_SINGLE_PTE_SWAPOUT); > >> + ksft_print_msg("[RUN] %s ... with single PTE of swapped-out THP (%zu kB)\n", > >> + desc, size / 1024); > >> + do_run_with_thp(fn, THP_RUN_SINGLE_PTE_SWAPOUT, size); > >> } > >> > >> -static void run_with_partial_mremap_thp(test_fn fn, const char *desc) > >> +static void run_with_partial_mremap_thp(test_fn fn, const char *desc, size_t size) > >> { > >> - ksft_print_msg("[RUN] %s ... with partially mremap()'ed THP\n", desc); > >> - do_run_with_thp(fn, THP_RUN_PARTIAL_MREMAP); > >> + ksft_print_msg("[RUN] %s ... with partially mremap()'ed THP (%zu kB)\n", > >> + desc, size / 1024); > >> + do_run_with_thp(fn, THP_RUN_PARTIAL_MREMAP, size); > >> } > >> > >> -static void run_with_partial_shared_thp(test_fn fn, const char *desc) > >> +static void run_with_partial_shared_thp(test_fn fn, const char *desc, size_t size) > >> { > >> - ksft_print_msg("[RUN] %s ... with partially shared THP\n", desc); > >> - do_run_with_thp(fn, THP_RUN_PARTIAL_SHARED); > >> + ksft_print_msg("[RUN] %s ... with partially shared THP (%zu kB)\n", > >> + desc, size / 1024); > >> + do_run_with_thp(fn, THP_RUN_PARTIAL_SHARED, size); > >> } > >> > >> static void run_with_hugetlb(test_fn fn, const char *desc, size_t hugetlbsize) > >> @@ -1091,15 +1101,15 @@ static void run_anon_test_case(struct test_case const *test_case) > >> > >> run_with_base_page(test_case->fn, test_case->desc); > >> run_with_base_page_swap(test_case->fn, test_case->desc); > >> - if (thpsize) { > >> - run_with_thp(test_case->fn, test_case->desc); > >> - run_with_thp_swap(test_case->fn, test_case->desc); > >> - run_with_pte_mapped_thp(test_case->fn, test_case->desc); > >> - run_with_pte_mapped_thp_swap(test_case->fn, test_case->desc); > >> - run_with_single_pte_of_thp(test_case->fn, test_case->desc); > >> - run_with_single_pte_of_thp_swap(test_case->fn, test_case->desc); > >> - run_with_partial_mremap_thp(test_case->fn, test_case->desc); > >> - run_with_partial_shared_thp(test_case->fn, test_case->desc); > >> + if (pmdsize) { > >> + run_with_thp(test_case->fn, test_case->desc, pmdsize); > >> + run_with_thp_swap(test_case->fn, test_case->desc, pmdsize); > >> + run_with_pte_mapped_thp(test_case->fn, test_case->desc, pmdsize); > >> + run_with_pte_mapped_thp_swap(test_case->fn, test_case->desc, pmdsize); > >> + run_with_single_pte_of_thp(test_case->fn, test_case->desc, pmdsize); > >> + run_with_single_pte_of_thp_swap(test_case->fn, test_case->desc, pmdsize); > >> + run_with_partial_mremap_thp(test_case->fn, test_case->desc, pmdsize); > >> + run_with_partial_shared_thp(test_case->fn, test_case->desc, pmdsize); > >> } > >> for (i = 0; i < nr_hugetlbsizes; i++) > >> run_with_hugetlb(test_case->fn, test_case->desc, > >> @@ -1120,7 +1130,7 @@ static int tests_per_anon_test_case(void) > >> { > >> int tests = 2 + nr_hugetlbsizes; > >> > >> - if (thpsize) > >> + if (pmdsize) > >> tests += 8; > >> return tests; > >> } > >> @@ -1329,7 +1339,7 @@ static void run_anon_thp_test_cases(void) > >> { > >> int i; > >> > >> - if (!thpsize) > >> + if (!pmdsize) > >> return; > >> > >> ksft_print_msg("[INFO] Anonymous THP tests\n"); > >> @@ -1338,13 +1348,13 @@ static void run_anon_thp_test_cases(void) > >> struct test_case const *test_case = &anon_thp_test_cases[i]; > >> > >> ksft_print_msg("[RUN] %s\n", test_case->desc); > >> - do_run_with_thp(test_case->fn, THP_RUN_PMD); > >> + do_run_with_thp(test_case->fn, THP_RUN_PMD, pmdsize); > >> } > >> } > >> > >> static int tests_per_anon_thp_test_case(void) > >> { > >> - return thpsize ? 1 : 0; > >> + return pmdsize ? 1 : 0; > >> } > >> > >> typedef void (*non_anon_test_fn)(char *mem, const char *smem, size_t size); > >> @@ -1419,7 +1429,7 @@ static void run_with_huge_zeropage(non_anon_test_fn fn, const char *desc) > >> } > >> > >> /* For alignment purposes, we need twice the thp size. */ > >> - mmap_size = 2 * thpsize; > >> + mmap_size = 2 * pmdsize; > >> mmap_mem = mmap(NULL, mmap_size, PROT_READ | PROT_WRITE, > >> MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); > >> if (mmap_mem == MAP_FAILED) { > >> @@ -1434,11 +1444,11 @@ static void run_with_huge_zeropage(non_anon_test_fn fn, const char *desc) > >> } > >> > >> /* We need a THP-aligned memory area. */ > >> - mem = (char *)(((uintptr_t)mmap_mem + thpsize) & ~(thpsize - 1)); > >> - smem = (char *)(((uintptr_t)mmap_smem + thpsize) & ~(thpsize - 1)); > >> + mem = (char *)(((uintptr_t)mmap_mem + pmdsize) & ~(pmdsize - 1)); > >> + smem = (char *)(((uintptr_t)mmap_smem + pmdsize) & ~(pmdsize - 1)); > >> > >> - ret = madvise(mem, thpsize, MADV_HUGEPAGE); > >> - ret |= madvise(smem, thpsize, MADV_HUGEPAGE); > >> + ret = madvise(mem, pmdsize, MADV_HUGEPAGE); > >> + ret |= madvise(smem, pmdsize, MADV_HUGEPAGE); > >> if (ret) { > >> ksft_test_result_fail("MADV_HUGEPAGE failed\n"); > >> goto munmap; > >> @@ -1457,7 +1467,7 @@ static void run_with_huge_zeropage(non_anon_test_fn fn, const char *desc) > >> goto munmap; > >> } > >> > >> - fn(mem, smem, thpsize); > >> + fn(mem, smem, pmdsize); > >> munmap: > >> munmap(mmap_mem, mmap_size); > >> if (mmap_smem != MAP_FAILED) > >> @@ -1650,7 +1660,7 @@ static void run_non_anon_test_case(struct non_anon_test_case const *test_case) > >> run_with_zeropage(test_case->fn, test_case->desc); > >> run_with_memfd(test_case->fn, test_case->desc); > >> run_with_tmpfile(test_case->fn, test_case->desc); > >> - if (thpsize) > >> + if (pmdsize) > >> run_with_huge_zeropage(test_case->fn, test_case->desc); > >> for (i = 0; i < nr_hugetlbsizes; i++) > >> run_with_memfd_hugetlb(test_case->fn, test_case->desc, > >> @@ -1671,7 +1681,7 @@ static int tests_per_non_anon_test_case(void) > >> { > >> int tests = 3 + nr_hugetlbsizes; > >> > >> - if (thpsize) > >> + if (pmdsize) > >> tests += 1; > >> return tests; > >> } > >> @@ -1681,10 +1691,13 @@ int main(int argc, char **argv) > >> int err; > >> > >> pagesize = getpagesize(); > >> - thpsize = read_pmd_pagesize(); > >> - if (thpsize) > >> + pmdsize = read_pmd_pagesize(); > >> + if (pmdsize) { > >> + ksft_print_msg("[INFO] detected PMD size: %zu KiB\n", > >> + pmdsize / 1024); > >> ksft_print_msg("[INFO] detected THP size: %zu KiB\n", > >> - thpsize / 1024); > >> + pmdsize / 1024); > >> + } > >> nr_hugetlbsizes = detect_hugetlb_page_sizes(hugetlbsizes, > >> ARRAY_SIZE(hugetlbsizes)); > >> detect_huge_zeropage(); > >> -- > >> 2.25.1 > >> >