Received: by 2002:a05:7412:8d09:b0:fa:4c10:6cad with SMTP id bj9csp403069rdb; Tue, 16 Jan 2024 04:09:49 -0800 (PST) X-Google-Smtp-Source: AGHT+IF7K1JLuMj3/8y/NkkMq6ce7MKNNtk7IhkoKzg/E0qvfsXEmD4TkkH11XUXKohBtTTXnd8f X-Received: by 2002:a17:907:874e:b0:a2c:f566:2e90 with SMTP id qo14-20020a170907874e00b00a2cf5662e90mr2022024ejc.53.1705406989084; Tue, 16 Jan 2024 04:09:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1705406989; cv=none; d=google.com; s=arc-20160816; b=TlvSB2jQmnG2z2UstDUPKz+oaU436gVh5wjYKbWMWB3yb4MHx5TG4m41K4/+iZjPlY KLlliCyvXCFh2VNbQ81W6QRTbtCoqPfJxzKAeT17kkZkclGlFHlPJNqtP0S0w/HQczmd z/EYAGoDhMxsKT22vjJMRast2+IkO3jzrwEcBcc9+bdOyDCieC0SsGOJ3ShbdtVUCc9B r1ALWdvGeHortKr02Q1XPud/IyN027LTaH3+eYcNHl1gN8zpsNKQKtmsLjlZ2JtJc7nT SDfrWTLkdgjKBD5HiCX3rrNORRyHWNAYLsOeevmvvTOTOnO1DbvWelFvjJv5W5JYmMwJ oGSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:autocrypt:references:cc:to :from:content-language:subject:user-agent:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:date:message-id; bh=hGXJewiw59XAMvDFwR6jqOgJqi+EyE44/+IPiDuzAnc=; fh=KcM0W7PqrjGSrDaJLlLPw4j0CnoJDkLZRSroegSYUWM=; b=jiG95zlkjVwWrguw61tSGs8X3hs3mHQGAOx0FOIhnmSXyVUqaKQRkMwfOXIUSjoDZ3 U6EQiPV2m34JrmwPg7Y81zucU5wOqxAYYN0IzwKiDzk8Q5y4DuLfGofPk1/XBzqdpZRh MqGB32kgVvCyHBmmJynY+n/KbjjFAZSPCYvcxklA6hwwoKah21xzKFTqWraiPfN8wN4e 7mSrQtVr/peVY8TWSKM6uuULXpvPpBRKHRev5L/rw9Ykf0MpvOBrEPvxmsK4uaJMNrSB pqMAWpLT6G97lyQ2bCs8sUJfcU/MGIdC03kvLP0QVojD8fw2MPCLw0Sfm8faJQJtbUOH GemQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-27365-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-27365-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id m12-20020a1709060d8c00b00a26be3c1a23si4745858eji.870.2024.01.16.04.09.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Jan 2024 04:09:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-27365-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-27365-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-27365-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 9E18B1F23D33 for ; Tue, 16 Jan 2024 12:09:48 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 445371BC28; Tue, 16 Jan 2024 12:09:34 +0000 (UTC) Received: from mail-wm1-f49.google.com (mail-wm1-f49.google.com [209.85.128.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 42A761BC20 for ; Tue, 16 Jan 2024 12:09:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-wm1-f49.google.com with SMTP id 5b1f17b1804b1-40e86a76c11so1734105e9.2 for ; Tue, 16 Jan 2024 04:09:32 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1705406970; x=1706011770; h=content-transfer-encoding:in-reply-to:autocrypt:references:cc:to :from:content-language:subject:user-agent:mime-version:date :message-id:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=hGXJewiw59XAMvDFwR6jqOgJqi+EyE44/+IPiDuzAnc=; b=NjSP/EYAdArnugoZk1HnNkG4Aver6ap5/CKa6vTRkDT0163/1NhC85hBDztW9EvZcH AlhXMcjErdMZQQI72ml1ejeqpNowfBb7uKturu+t0lMUQcklxECWpV4ul5a75kkcvBNZ xALp3vJlsQDI3pgWfi/T4WFVQk2ViBQZ1AuGTJiPiz5E45CDXu8hfRSe/yiTDIa+yoVd iUDjYWUGq0clmnbWiuQJGr+E4tKa3+G+B/AKpUHjZOZ6wizN7rHLsD3N+kkLBkY1JGGJ KmNtS+cLd80FeOqXs1nFZz8K5kvIynzCqV8ORZr3HbpDPWsJCdljx2yBsUFp3JE68ry0 69ww== X-Gm-Message-State: AOJu0Yyx6sEJbJoqCJ5ECjwEwppo74P6dEb2lA4PW6oWZrfTOAY3y1mZ r9R7U+yGs6YP+d3vZY5WxL0= X-Received: by 2002:a7b:cd0f:0:b0:40e:4a3d:83e with SMTP id f15-20020a7bcd0f000000b0040e4a3d083emr2478334wmj.22.1705406970374; Tue, 16 Jan 2024 04:09:30 -0800 (PST) Received: from ?IPV6:2a0b:e7c0:0:107::aaaa:59? ([2a0b:e7c0:0:107::aaaa:59]) by smtp.gmail.com with ESMTPSA id o8-20020a05600c510800b0040e624995f1sm17888703wms.8.2024.01.16.04.09.29 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 16 Jan 2024 04:09:30 -0800 (PST) Message-ID: <3193bf5b-4e22-412f-8c5b-68574942d9bc@kernel.org> Date: Tue, 16 Jan 2024 13:09:29 +0100 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v2] mm: align larger anonymous mappings on THP boundaries Content-Language: en-US From: Jiri Slaby To: Rik van Riel , Andrew Morton Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, kernel-team@fb.com, Matthew Wilcox , Yang Shi , Christoph Lameter References: <20220809142457.4751229f@imladris.surriel.com> Autocrypt: addr=jirislaby@kernel.org; keydata= xsFNBE6S54YBEACzzjLwDUbU5elY4GTg/NdotjA0jyyJtYI86wdKraekbNE0bC4zV+ryvH4j rrcDwGs6tFVrAHvdHeIdI07s1iIx5R/ndcHwt4fvI8CL5PzPmn5J+h0WERR5rFprRh6axhOk rSD5CwQl19fm4AJCS6A9GJtOoiLpWn2/IbogPc71jQVrupZYYx51rAaHZ0D2KYK/uhfc6neJ i0WqPlbtIlIrpvWxckucNu6ZwXjFY0f3qIRg3Vqh5QxPkojGsq9tXVFVLEkSVz6FoqCHrUTx wr+aw6qqQVgvT/McQtsI0S66uIkQjzPUrgAEtWUv76rM4ekqL9stHyvTGw0Fjsualwb0Gwdx ReTZzMgheAyoy/umIOKrSEpWouVoBt5FFSZUyjuDdlPPYyPav+hpI6ggmCTld3u2hyiHji2H cDpcLM2LMhlHBipu80s9anNeZhCANDhbC5E+NZmuwgzHBcan8WC7xsPXPaiZSIm7TKaVoOcL 9tE5aN3jQmIlrT7ZUX52Ff/hSdx/JKDP3YMNtt4B0cH6ejIjtqTd+Ge8sSttsnNM0CQUkXps w98jwz+Lxw/bKMr3NSnnFpUZaxwji3BC9vYyxKMAwNelBCHEgS/OAa3EJoTfuYOK6wT6nadm YqYjwYbZE5V/SwzMbpWu7Jwlvuwyfo5mh7w5iMfnZE+vHFwp/wARAQABzSFKaXJpIFNsYWJ5 IDxqaXJpc2xhYnlAa2VybmVsLm9yZz7CwXcEEwEIACEFAlW3RUwCGwMFCwkIBwIGFQgJCgsC BBYCAwECHgECF4AACgkQvSWxBAa0cEnVTg//TQpdIAr8Tn0VAeUjdVIH9XCFw+cPSU+zMSCH eCZoA/N6gitEcnvHoFVVM7b3hK2HgoFUNbmYC0RdcSc80pOF5gCnACSP9XWHGWzeKCARRcQR 4s5YD8I4VV5hqXcKo2DFAtIOVbHDW+0okOzcecdasCakUTr7s2fXz97uuoc2gIBB7bmHUGAH XQXHvdnCLjDjR+eJN+zrtbqZKYSfj89s/ZHn5Slug6w8qOPT1sVNGG+eWPlc5s7XYhT9z66E l5C0rG35JE4PhC+tl7BaE5IwjJlBMHf/cMJxNHAYoQ1hWQCKOfMDQ6bsEr++kGUCbHkrEFwD UVA72iLnnnlZCMevwE4hc0zVhseWhPc/KMYObU1sDGqaCesRLkE3tiE7X2cikmj/qH0CoMWe gjnwnQ2qVJcaPSzJ4QITvchEQ+tbuVAyvn9H+9MkdT7b7b2OaqYsUP8rn/2k1Td5zknUz7iF oJ0Z9wPTl6tDfF8phaMIPISYrhceVOIoL+rWfaikhBulZTIT5ihieY9nQOw6vhOfWkYvv0Dl o4GRnb2ybPQpfEs7WtetOsUgiUbfljTgILFw3CsPW8JESOGQc0Pv8ieznIighqPPFz9g+zSu Ss/rpcsqag5n9rQp/H3WW5zKUpeYcKGaPDp/vSUovMcjp8USIhzBBrmI7UWAtuedG9prjqfO wU0ETpLnhgEQAM+cDWLL+Wvc9cLhA2OXZ/gMmu7NbYKjfth1UyOuBd5emIO+d4RfFM02XFTI t4MxwhAryhsKQQcA4iQNldkbyeviYrPKWjLTjRXT5cD2lpWzr+Jx7mX7InV5JOz1Qq+P+nJW YIBjUKhI03ux89p58CYil24Zpyn2F5cX7U+inY8lJIBwLPBnc9Z0An/DVnUOD+0wIcYVnZAK DiIXODkGqTg3fhZwbbi+KAhtHPFM2fGw2VTUf62IHzV+eBSnamzPOBc1XsJYKRo3FHNeLuS8 f4wUe7bWb9O66PPFK/RkeqNX6akkFBf9VfrZ1rTEKAyJ2uqf1EI1olYnENk4+00IBa+BavGQ 8UW9dGW3nbPrfuOV5UUvbnsSQwj67pSdrBQqilr5N/5H9z7VCDQ0dhuJNtvDSlTf2iUFBqgk 3smln31PUYiVPrMP0V4ja0i9qtO/TB01rTfTyXTRtqz53qO5dGsYiliJO5aUmh8swVpotgK4 /57h3zGsaXO9PGgnnAdqeKVITaFTLY1ISg+Ptb4KoliiOjrBMmQUSJVtkUXMrCMCeuPDGHo7 39Xc75lcHlGuM3yEB//htKjyprbLeLf1y4xPyTeeF5zg/0ztRZNKZicgEmxyUNBHHnBKHQxz 1j+mzH0HjZZtXjGu2KLJ18G07q0fpz2ZPk2D53Ww39VNI/J9ABEBAAHCwV8EGAECAAkFAk6S 54YCGwwACgkQvSWxBAa0cEk3tRAAgO+DFpbyIa4RlnfpcW17AfnpZi9VR5+zr496n2jH/1ld wRO/S+QNSA8qdABqMb9WI4BNaoANgcg0AS429Mq0taaWKkAjkkGAT7mD1Q5PiLr06Y/+Kzdr 90eUVneqM2TUQQbK+Kh7JwmGVrRGNqQrDk+gRNvKnGwFNeTkTKtJ0P8jYd7P1gZb9Fwj9YLx jhn/sVIhNmEBLBoI7PL+9fbILqJPHgAwW35rpnq4f/EYTykbk1sa13Tav6btJ+4QOgbcezWI wZ5w/JVfEJW9JXp3BFAVzRQ5nVrrLDAJZ8Y5ioWcm99JtSIIxXxt9FJaGc1Bgsi5K/+dyTKL wLMJgiBzbVx8G+fCJJ9YtlNOPWhbKPlrQ8+AY52Aagi9WNhe6XfJdh5g6ptiOILm330mkR4g W6nEgZVyIyTq3ekOuruftWL99qpP5zi+eNrMmLRQx9iecDNgFr342R9bTDlb1TLuRb+/tJ98 f/bIWIr0cqQmqQ33FgRhrG1+Xml6UXyJ2jExmlO8JljuOGeXYh6ZkIEyzqzffzBLXZCujlYQ DFXpyMNVJ2ZwPmX2mWEoYuaBU0JN7wM+/zWgOf2zRwhEuD3A2cO2PxoiIfyUEfB9SSmffaK/ S4xXoB6wvGENZ85Hg37C7WDNdaAt6Xh2uQIly5grkgvWppkNy4ZHxE+jeNsU7tg= In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit On 16. 01. 24, 12:53, Jiri Slaby wrote: > Hi, > > On 09. 08. 22, 20:24, Rik van Riel wrote: >> Align larger anonymous memory mappings on THP boundaries by >> going through thp_get_unmapped_area if THPs are enabled for >> the current process. >> >> With this patch, larger anonymous mappings are now THP aligned. >> When a malloc library allocates a 2MB or larger arena, that >> arena can now be mapped with THPs right from the start, which >> can result in better TLB hit rates and execution time. > > This appears to break 32bit processes on x86_64 (at least). In > particular, 32bit kernel or firefox builds in our build system. > > Reverting this on top of 6.7 makes it work again. > > Downstream report: >  https://bugzilla.suse.com/show_bug.cgi?id=1218841 > > So running: > pahole -J --btf_gen_floats -j --lang_exclude=rust > --skip_encoding_btf_inconsistent_proto --btf_gen_optimized .tmp_vmlinux.btf > > crashes or errors out with some random errors: > [182671] STRUCT idr's field 'idr_next' offset=128 bit_size=0 type=181346 > Error emitting field > > strace shows mmap() fails with ENOMEM right before the errors: > 1223  mmap2(NULL, 5783552, PROT_READ|PROT_WRITE, > MAP_PRIVATE|MAP_ANONYMOUS, -1, 0 > ... > 1223  <... mmap2 resumed>)              = -1 ENOMEM (Cannot allocate > memory) > > Note the .tmp_vmlinux.btf above can be arbitrary, but likely large > enough. For reference, one is available at: > https://decibel.fi.muni.cz/~xslaby/n/btf > > Any ideas? This works around the problem, of course (but is a band-aid, not a fix): --- a/mm/mmap.c +++ b/mm/mmap.c @@ -1829,7 +1829,7 @@ get_unmapped_area(struct file *file, unsigned long addr, unsigned long len, */ pgoff = 0; get_area = shmem_get_unmapped_area; - } else if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE)) { + } else if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) && !in_32bit_syscall()) { /* Ensures that larger anonymous mappings are THP aligned. */ get_area = thp_get_unmapped_area; } thp_get_unmapped_area() does not take care of the legacy stuff... regards, -- js suse labs