Received: by 2002:a89:48b:0:b0:1f5:f2ab:c469 with SMTP id a11csp984618lqd; Thu, 25 Apr 2024 02:37:12 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXml7XwMfk/W/94S3oXWlFHPGDAuZRjz95dT+s9y+zjQIyDzkJvqhnrIOtiQh3iKnJDBKCr2S8ZinOSkgzS8UO5S4RIG1ujkNkIjq+91w== X-Google-Smtp-Source: AGHT+IFnliknrx9mTTP7plXjYTEHUg+wxPXAQmR248QQ4ZmEGLbhZbwhKGyCLMitBDC58Lg7cdgC X-Received: by 2002:a17:902:680a:b0:1ea:8f39:df70 with SMTP id h10-20020a170902680a00b001ea8f39df70mr2759848plk.39.1714037832119; Thu, 25 Apr 2024 02:37:12 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714037832; cv=pass; d=google.com; s=arc-20160816; b=HYozwoTfBL3H9BQoHt9M96gjjkekvBc0LRpMtl7Jo9xmTLiSKp6PBHDfm1a1Y92mwS cckdQMlcUjfePt7BWOU5rYE4Q12qWffPk21gNkkHpj45HxBLmQOleAMcjEFOhqlKZaMH QFDZdvukXqheNhgg6VoBOapUHNdH3mkif27Ed5GS3pN9xIoPolQ7OaYjVlzpLr0TE6RS I9MM2maki1LsYOu2sSsR0z7yHGDT2eZaJd9P7qv+ihFyVFR6gz2lt8H3i8Xl0PfTaXIl P1NqAvswxz1KtNcjBsiqjgeHHuPjyd7Emdjg5oLMe3zhAGvgFMoO6hIfeXy6Ad/meEd1 /P4w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:organization:autocrypt :content-language:from:references:cc:to:subject:user-agent :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :date:message-id:dkim-signature; bh=SpCxz09SAGUu9P+wzuJ591zF5pdKBRWT7g1om/mMNi4=; fh=YD/+j4JMNk0P+VgUvGUpD25shOXaBfFfYVWEtoBIAWI=; b=drKWAj7M7z6HI2atJmbfCwt1EPeyQDWsNtVFZKjMsezliIDgUrVMGVSI8vED7DWuOy 4kK1msPIdwUFYKeWHltwt5GpKKusR81wLBfkgl1FzXn9hWrmUIb0XXaSHwKwkNSKAHti MHmtB7ubmuEkVyjZLSkIz/glJ5yEqxXCojwf0yNByKrdapSK5x+cCg2TEuIerB78Ukhd 0Vb9Xv6fNR4s471m7h6Y2/S3bZFDICrblW7+q1VYvmbVCKryGsUTSIVBurTunImx+zMr t5hhqhskXSUG5mOHroCFJRjCPqeK1zVwBS9Vf//xXRAEL/4pME7wSn1D9fCIM3O0b+qw ypGQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=GscxQdyx; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-kernel+bounces-158276-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-158276-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id x8-20020a170902ec8800b001e904d7aadesi9739977plg.462.2024.04.25.02.37.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 25 Apr 2024 02:37:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-158276-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=GscxQdyx; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-kernel+bounces-158276-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-158276-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 57F57B27198 for ; Thu, 25 Apr 2024 09:22:08 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 6AFC684FAE; Thu, 25 Apr 2024 09:20:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="GscxQdyx" Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D4821127B58 for ; Thu, 25 Apr 2024 09:20:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.129.124 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714036831; cv=none; b=pKpctTsbMYm78J+dI1Z3ykPi7f+Xye4+kOFAMQXeP6ir8pf/Q+84rw7jO9xsa+ttViH8zraDvBK2gBOa395C+z2tsPG/1hJVORVmqReBrGTEVyz0srZRKh3e4lyFsFCr7u/9n+pK0IHDEdE7PE0K3k60AZCjVfhbaDPWyk4MLHE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714036831; c=relaxed/simple; bh=yMUi4isyenkaYN4wvPrZxjUN/50f1sxUh9DE/gBH5IU=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=OFnZDJtMGDjVCwz48wDejp+ap7WZG9RniSD+VzoB1buIuktXiA31eO91UdRS2O3aE2bfa4oR0LouPfXcj2xK1HFjGLJXLGRJSEu6T/fUT8WSR/M3M8xFlXeFOeMCLuq64i7KyXuR7W9Z2UcYXbLSmdh0YZmlwmmbKVwZO3dhuZ4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=GscxQdyx; arc=none smtp.client-ip=170.10.129.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1714036828; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=SpCxz09SAGUu9P+wzuJ591zF5pdKBRWT7g1om/mMNi4=; b=GscxQdyxXI88u36fIGrHewxX4Sas/xBX4bvfigPKQTIoGlwLxxYQ1U6cwoodQHsrXJ+dC2 rt+G1QO2jdkWn7ifCQexoHWnG356FO6C7jzuEQyU092qmZ0DpayrenfjmV5/GcAJG1wYce wjHBU9OW5BKjmXHTlcTwAr7mu/E8p/Q= Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com [209.85.128.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-389-Gr-ES1RrP7WqvOv8UsxJmw-1; Thu, 25 Apr 2024 05:20:27 -0400 X-MC-Unique: Gr-ES1RrP7WqvOv8UsxJmw-1 Received: by mail-wm1-f72.google.com with SMTP id 5b1f17b1804b1-41a3369659eso8362845e9.1 for ; Thu, 25 Apr 2024 02:20:27 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714036826; x=1714641626; h=content-transfer-encoding:in-reply-to:organization:autocrypt :content-language:from:references:cc:to:subject:user-agent :mime-version:date:message-id:x-gm-message-state:from:to:cc:subject :date:message-id:reply-to; bh=SpCxz09SAGUu9P+wzuJ591zF5pdKBRWT7g1om/mMNi4=; b=mGbH807/iTtHGZ0/Gu558gZ6zEkRhs1gDh03EJmOhfEDkoBzvNOSthE5fs28Yd1IZP UvBxiaJvTnCsX1lkqRNm2TNiLNW+/1RZB5HyrjqW+k2t6BEeyu2mjeevj2wq2ScXBrky WKhbWusOtSZ0iOZlpBReyh0lFPDvp3GBUQfi52ngePrcIALRWQ42s695fObGstywShlx enxfwG3Tlk+7Q071uwa1t/FPSMm5qSEJLBTws9bkng29pRrY9UaP8OIFHVFUtpsDkhvZ U/0tiDW4UOM2GqtWxyvZkrgDH3nZ6MOOvlIeH/yYpIBgGaI1SNxmXcNILPksnX5iHa2Z 7EfA== X-Forwarded-Encrypted: i=1; AJvYcCV0A0kiZi9g0fF/sCN+niCmUIdELxDM0H6y6tsDEtUkadthimCpOdmSVk5WihNc20THm18mkt/JnngurH+MMS4g534vHTbdy84paHJd X-Gm-Message-State: AOJu0YydC5kwW9OskUfSudL5o979aqJsiRONZvsfkwt9Pe/DHjFW7ni4 f3fanqDqdB021dHh1ly3PrL2HU1DCoWzqslrckq3RwY+9agTXhET8iKafBec+3TFn2/3wqVa0vr 6/hPoYnlCeoKbJKz3uqiMBoltLxyCpKRfe1oWnE59I3WVYL0NBKlnQWcgyRmVpQ== X-Received: by 2002:a05:600c:35c9:b0:41a:7c1d:3326 with SMTP id r9-20020a05600c35c900b0041a7c1d3326mr1745721wmq.8.1714036826169; Thu, 25 Apr 2024 02:20:26 -0700 (PDT) X-Received: by 2002:a05:600c:35c9:b0:41a:7c1d:3326 with SMTP id r9-20020a05600c35c900b0041a7c1d3326mr1745694wmq.8.1714036825715; Thu, 25 Apr 2024 02:20:25 -0700 (PDT) Received: from ?IPV6:2003:cb:c719:8200:487a:3426:a17e:d7b7? (p200300cbc7198200487a3426a17ed7b7.dip0.t-ipconnect.de. [2003:cb:c719:8200:487a:3426:a17e:d7b7]) by smtp.gmail.com with ESMTPSA id t13-20020a05600c450d00b00417f700eaeasm26976864wmo.22.2024.04.25.02.20.24 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 25 Apr 2024 02:20:25 -0700 (PDT) Message-ID: <8665df72-0855-4f71-823b-5ff8d8342fd1@redhat.com> Date: Thu, 25 Apr 2024 11:20:24 +0200 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [RFC PATCH 0/5] add mTHP support for anonymous share pages To: Baolin Wang , Ryan Roberts , akpm@linux-foundation.org, hughd@google.com Cc: willy@infradead.org, wangkefeng.wang@huawei.com, 21cnbao@gmail.com, ying.huang@intel.com, shy828301@gmail.com, ziy@nvidia.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org References: <4b998e7d-153f-48cc-a9bb-8c84bb675581@arm.com> <80b5f87e-c156-4ccc-98f0-96f1fd864273@arm.com> <5b8b22e7-6355-4b08-b5b5-1e33ebae6f16@arm.com> <813fe7fd-3004-4e8b-801d-95c33559a025@linux.alibaba.com> <76f816dd-3bbf-48c9-a630-3787051cf289@arm.com> <8c0d6358-3c16-4a57-822c-04b3b3403fe6@linux.alibaba.com> <4204b5f6-21f0-4aa2-a625-3dd2f416b649@arm.com> <94ae96f7-79ce-4b3f-a272-6af62d01a3f8@redhat.com> <71c1e953-84f9-4d47-bd4c-725a447627df@arm.com> From: David Hildenbrand Content-Language: en-US Autocrypt: addr=david@redhat.com; keydata= xsFNBFXLn5EBEAC+zYvAFJxCBY9Tr1xZgcESmxVNI/0ffzE/ZQOiHJl6mGkmA1R7/uUpiCjJ dBrn+lhhOYjjNefFQou6478faXE6o2AhmebqT4KiQoUQFV4R7y1KMEKoSyy8hQaK1umALTdL QZLQMzNE74ap+GDK0wnacPQFpcG1AE9RMq3aeErY5tujekBS32jfC/7AnH7I0v1v1TbbK3Gp XNeiN4QroO+5qaSr0ID2sz5jtBLRb15RMre27E1ImpaIv2Jw8NJgW0k/D1RyKCwaTsgRdwuK Kx/Y91XuSBdz0uOyU/S8kM1+ag0wvsGlpBVxRR/xw/E8M7TEwuCZQArqqTCmkG6HGcXFT0V9 PXFNNgV5jXMQRwU0O/ztJIQqsE5LsUomE//bLwzj9IVsaQpKDqW6TAPjcdBDPLHvriq7kGjt WhVhdl0qEYB8lkBEU7V2Yb+SYhmhpDrti9Fq1EsmhiHSkxJcGREoMK/63r9WLZYI3+4W2rAc UucZa4OT27U5ZISjNg3Ev0rxU5UH2/pT4wJCfxwocmqaRr6UYmrtZmND89X0KigoFD/XSeVv jwBRNjPAubK9/k5NoRrYqztM9W6sJqrH8+UWZ1Idd/DdmogJh0gNC0+N42Za9yBRURfIdKSb B3JfpUqcWwE7vUaYrHG1nw54pLUoPG6sAA7Mehl3nd4pZUALHwARAQABzSREYXZpZCBIaWxk ZW5icmFuZCA8ZGF2aWRAcmVkaGF0LmNvbT7CwZgEEwEIAEICGwMGCwkIBwMCBhUIAgkKCwQW AgMBAh4BAheAAhkBFiEEG9nKrXNcTDpGDfzKTd4Q9wD/g1oFAl8Ox4kFCRKpKXgACgkQTd4Q 9wD/g1oHcA//a6Tj7SBNjFNM1iNhWUo1lxAja0lpSodSnB2g4FCZ4R61SBR4l/psBL73xktp rDHrx4aSpwkRP6Epu6mLvhlfjmkRG4OynJ5HG1gfv7RJJfnUdUM1z5kdS8JBrOhMJS2c/gPf wv1TGRq2XdMPnfY2o0CxRqpcLkx4vBODvJGl2mQyJF/gPepdDfcT8/PY9BJ7FL6Hrq1gnAo4 3Iv9qV0JiT2wmZciNyYQhmA1V6dyTRiQ4YAc31zOo2IM+xisPzeSHgw3ONY/XhYvfZ9r7W1l pNQdc2G+o4Di9NPFHQQhDw3YTRR1opJaTlRDzxYxzU6ZnUUBghxt9cwUWTpfCktkMZiPSDGd KgQBjnweV2jw9UOTxjb4LXqDjmSNkjDdQUOU69jGMUXgihvo4zhYcMX8F5gWdRtMR7DzW/YE BgVcyxNkMIXoY1aYj6npHYiNQesQlqjU6azjbH70/SXKM5tNRplgW8TNprMDuntdvV9wNkFs 9TyM02V5aWxFfI42+aivc4KEw69SE9KXwC7FSf5wXzuTot97N9Phj/Z3+jx443jo2NR34XgF 89cct7wJMjOF7bBefo0fPPZQuIma0Zym71cP61OP/i11ahNye6HGKfxGCOcs5wW9kRQEk8P9 M/k2wt3mt/fCQnuP/mWutNPt95w9wSsUyATLmtNrwccz63XOwU0EVcufkQEQAOfX3n0g0fZz Bgm/S2zF/kxQKCEKP8ID+Vz8sy2GpDvveBq4H2Y34XWsT1zLJdvqPI4af4ZSMxuerWjXbVWb T6d4odQIG0fKx4F8NccDqbgHeZRNajXeeJ3R7gAzvWvQNLz4piHrO/B4tf8svmRBL0ZB5P5A 2uhdwLU3NZuK22zpNn4is87BPWF8HhY0L5fafgDMOqnf4guJVJPYNPhUFzXUbPqOKOkL8ojk CXxkOFHAbjstSK5Ca3fKquY3rdX3DNo+EL7FvAiw1mUtS+5GeYE+RMnDCsVFm/C7kY8c2d0G NWkB9pJM5+mnIoFNxy7YBcldYATVeOHoY4LyaUWNnAvFYWp08dHWfZo9WCiJMuTfgtH9tc75 7QanMVdPt6fDK8UUXIBLQ2TWr/sQKE9xtFuEmoQGlE1l6bGaDnnMLcYu+Asp3kDT0w4zYGsx 5r6XQVRH4+5N6eHZiaeYtFOujp5n+pjBaQK7wUUjDilPQ5QMzIuCL4YjVoylWiBNknvQWBXS lQCWmavOT9sttGQXdPCC5ynI+1ymZC1ORZKANLnRAb0NH/UCzcsstw2TAkFnMEbo9Zu9w7Kv AxBQXWeXhJI9XQssfrf4Gusdqx8nPEpfOqCtbbwJMATbHyqLt7/oz/5deGuwxgb65pWIzufa N7eop7uh+6bezi+rugUI+w6DABEBAAHCwXwEGAEIACYCGwwWIQQb2cqtc1xMOkYN/MpN3hD3 AP+DWgUCXw7HsgUJEqkpoQAKCRBN3hD3AP+DWrrpD/4qS3dyVRxDcDHIlmguXjC1Q5tZTwNB boaBTPHSy/Nksu0eY7x6HfQJ3xajVH32Ms6t1trDQmPx2iP5+7iDsb7OKAb5eOS8h+BEBDeq 3ecsQDv0fFJOA9ag5O3LLNk+3x3q7e0uo06XMaY7UHS341ozXUUI7wC7iKfoUTv03iO9El5f XpNMx/YrIMduZ2+nd9Di7o5+KIwlb2mAB9sTNHdMrXesX8eBL6T9b+MZJk+mZuPxKNVfEQMQ a5SxUEADIPQTPNvBewdeI80yeOCrN+Zzwy/Mrx9EPeu59Y5vSJOx/z6OUImD/GhX7Xvkt3kq Er5KTrJz3++B6SH9pum9PuoE/k+nntJkNMmQpR4MCBaV/J9gIOPGodDKnjdng+mXliF3Ptu6 3oxc2RCyGzTlxyMwuc2U5Q7KtUNTdDe8T0uE+9b8BLMVQDDfJjqY0VVqSUwImzTDLX9S4g/8 kC4HRcclk8hpyhY2jKGluZO0awwTIMgVEzmTyBphDg/Gx7dZU1Xf8HFuE+UZ5UDHDTnwgv7E th6RC9+WrhDNspZ9fJjKWRbveQgUFCpe1sa77LAw+XFrKmBHXp9ZVIe90RMe2tRL06BGiRZr jPrnvUsUUsjRoRNJjKKA/REq+sAnhkNPPZ/NNMjaZ5b8Tovi8C0tmxiCHaQYqj7G2rgnT0kt WNyWQQ== Organization: Red Hat In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit On 25.04.24 11:05, Baolin Wang wrote: > > > On 2024/4/25 16:57, David Hildenbrand wrote: >> On 25.04.24 10:46, Ryan Roberts wrote: >>> On 25/04/2024 09:26, David Hildenbrand wrote: >>>> On 25.04.24 10:17, Ryan Roberts wrote: >>>>> On 25/04/2024 07:20, Baolin Wang wrote: >>>>>> >>>>>> >>>>>> On 2024/4/24 22:20, Ryan Roberts wrote: >>>>>>> On 24/04/2024 14:49, Baolin Wang wrote: >>>>>>>> >>>>>>>> >>>>>>>> On 2024/4/24 18:01, Ryan Roberts wrote: >>>>>>>>> On 24/04/2024 10:55, Baolin Wang wrote: >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> On 2024/4/24 16:26, Ryan Roberts wrote: >>>>>>>>>>> On 24/04/2024 07:55, Baolin Wang wrote: >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> On 2024/4/23 18:41, Ryan Roberts wrote: >>>>>>>>>>>>> On 22/04/2024 08:02, Baolin Wang wrote: >>>>>>>>>>>>>> Anonymous pages have already been supported for multi-size >>>>>>>>>>>>>> (mTHP) >>>>>>>>>>>>>> allocation >>>>>>>>>>>>>> through commit 19eaf44954df, that can allow THP to be >>>>>>>>>>>>>> configured >>>>>>>>>>>>>> through the >>>>>>>>>>>>>> sysfs interface located at >>>>>>>>>>>>>> '/sys/kernel/mm/transparent_hugepage/hugepage-XXkb/enabled'. >>>>>>>>>>>>>> >>>>>>>>>>>>>> However, the anonymous shared pages will ignore the >>>>>>>>>>>>>> anonymous mTHP rule >>>>>>>>>>>>>> configured through the sysfs interface, and can only use >>>>>>>>>>>>>> the PMD-mapped >>>>>>>>>>>>>> THP, that is not reasonable. Many implement anonymous page >>>>>>>>>>>>>> sharing >>>>>>>>>>>>>> through >>>>>>>>>>>>>> mmap(MAP_SHARED | MAP_ANONYMOUS), especially in database usage >>>>>>>>>>>>>> scenarios, >>>>>>>>>>>>>> therefore, users expect to apply an unified mTHP strategy >>>>>>>>>>>>>> for anonymous >>>>>>>>>>>>>> pages, >>>>>>>>>>>>>> also including the anonymous shared pages, in order to >>>>>>>>>>>>>> enjoy the >>>>>>>>>>>>>> benefits of >>>>>>>>>>>>>> mTHP. For example, lower latency than PMD-mapped THP, >>>>>>>>>>>>>> smaller memory >>>>>>>>>>>>>> bloat >>>>>>>>>>>>>> than PMD-mapped THP, contiguous PTEs on ARM architecture to >>>>>>>>>>>>>> reduce TLB >>>>>>>>>>>>>> miss >>>>>>>>>>>>>> etc. >>>>>>>>>>>>> >>>>>>>>>>>>> This sounds like a very useful addition! >>>>>>>>>>>>> >>>>>>>>>>>>> Out of interest, can you point me at any workloads (and >>>>>>>>>>>>> off-the-shelf >>>>>>>>>>>>> benchmarks >>>>>>>>>>>>> for those workloads) that predominantly use shared anon memory? >>>>>>>>>>>> >>>>>>>>>>>> As far as I know, some database related workloads make >>>>>>>>>>>> extensive use of >>>>>>>>>>>> shared >>>>>>>>>>>> anonymous page, such as PolarDB[1] in our Alibaba fleet, or >>>>>>>>>>>> MySQL likely >>>>>>>>>>>> also >>>>>>>>>>>> uses shared anonymous memory. And I still need to do some >>>>>>>>>>>> investigation to >>>>>>>>>>>> measure the performance. >>>>>>>>>>>> >>>>>>>>>>>> [1] https://github.com/ApsaraDB/PolarDB-for-PostgreSQL >>>>>>>>>>> >>>>>>>>>>> Thanks for the pointer! >>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>>>> The primary strategy is that, the use of huge pages for >>>>>>>>>>>>>> anonymous shared >>>>>>>>>>>>>> pages >>>>>>>>>>>>>> still follows the global control determined by the mount >>>>>>>>>>>>>> option "huge=" >>>>>>>>>>>>>> parameter >>>>>>>>>>>>>> or the sysfs interface at >>>>>>>>>>>>>> '/sys/kernel/mm/transparent_hugepage/shmem_enabled'. >>>>>>>>>>>>>> The utilization of mTHP is allowed only when the global >>>>>>>>>>>>>> 'huge' switch is >>>>>>>>>>>>>> enabled. >>>>>>>>>>>>>> Subsequently, the mTHP sysfs interface >>>>>>>>>>>>>> (/sys/kernel/mm/transparent_hugepage/hugepage-XXkb/enabled) >>>>>>>>>>>>>> is checked to determine the mTHP size that can be used for >>>>>>>>>>>>>> large folio >>>>>>>>>>>>>> allocation >>>>>>>>>>>>>> for these anonymous shared pages. >>>>>>>>>>>>> >>>>>>>>>>>>> I'm not sure about this proposed control mechanism; won't it >>>>>>>>>>>>> break >>>>>>>>>>>>> compatibility? I could be wrong, but I don't think shmem's >>>>>>>>>>>>> use of THP >>>>>>>>>>>>> used to >>>>>>>>>>>>> depend upon the value of >>>>>>>>>>>>> /sys/kernel/mm/transparent_hugepage/enabled? >>>>>>>>>>>>> So it >>>>>>>>>>>> >>>>>>>>>>>> Yes, I realized this after more testing. >>>>>>>>>>>> >>>>>>>>>>>>> doesn't make sense to me that we now depend upon the >>>>>>>>>>>>> /sys/kernel/mm/transparent_hugepage/hugepage-XXkb/enabled >>>>>>>>>>>>> values >>>>>>>>>>>>> (which by >>>>>>>>>>>>> default disables all sizes except 2M, which is set to >>>>>>>>>>>>> "inherit" from >>>>>>>>>>>>> /sys/kernel/mm/transparent_hugepage/enabled). >>>>>>>>>>>>> >>>>>>>>>>>>> The other problem is that shmem_enabled has a different set >>>>>>>>>>>>> of options >>>>>>>>>>>>> (always/never/within_size/advise/deny/force) to enabled >>>>>>>>>>>>> (always/madvise/never) >>>>>>>>>>>>> >>>>>>>>>>>>> Perhaps it would be cleaner to do the same trick we did for >>>>>>>>>>>>> enabled; >>>>>>>>>>>>> Introduce >>>>>>>>>>>>> /mm/transparent_hugepage/hugepage-XXkb/shmem_enabled, which >>>>>>>>>>>>> can have all >>>>>>>>>>>>> the >>>>>>>>>>>>> same values as the top-level >>>>>>>>>>>>> /sys/kernel/mm/transparent_hugepage/shmem_enabled, >>>>>>>>>>>>> plus the additional "inherit" option. By default all sizes >>>>>>>>>>>>> will be set to >>>>>>>>>>>>> "never" except 2M, which is set to "inherit". >>>>>>>>>>>> >>>>>>>>>>>> Sounds good to me. But I do not want to copy all same values >>>>>>>>>>>> from >>>>>>>>>>>> top-level >>>>>>>>>>>> '/sys/kernel/mm/transparent_hugepage/shmem_enabled': >>>>>>>>>>>> always within_size advise never deny force >>>>>>>>>>>> >>>>>>>>>>>> For mTHP's shmem_enabled interface, we can just keep below >>>>>>>>>>>> values: >>>>>>>>>>>> always within_size advise never >>>>>>>>>>>> >>>>>>>>>>>> Cause when checking if mTHP can be used for anon shmem, >>>>>>>>>>>> 'deny' is equal to >>>>>>>>>>>> 'never', and 'force' is equal to 'always'. >>>>>>>>>>> >>>>>>>>>>> I'll admit it wasn't completely clear to me after reading the >>>>>>>>>>> docs, but my >>>>>>>>>>> rough >>>>>>>>>>> understanding is: >>>>>>>>>>> >>>>>>>>>>>       - /sys/kernel/mm/transparent_hugepage/shmem_enabled >>>>>>>>>>> controls >>>>>>>>>>>         mmap(SHARED|ANON) allocations (mostly; see rule 3) >>>>>>>>>>>       - huge=... controls tmpfs allocations >>>>>>>>>>>       - deny and force in shmem_enabled are equivalent to >>>>>>>>>>> never and >>>>>>>>>>> always for >>>>>>>>>>>         mmap(SHARED|ANON) but additionally override all tmpfs >>>>>>>>>>> mounts so they >>>>>>>>>>> act as >>>>>>>>>>>         if they were mounted with huge=never or huge=always >>>>>>>>>>> >>>>>>>>>>> Is that correct? If so, then I think it still makes sense to >>>>>>>>>>> support >>>>>>>>>>> per-size >>>>>>>>>> >>>>>>>>>> Correct. >>>>>>>>>> >>>>>>>>>>> deny/force. Certainly if a per-size control is set to >>>>>>>>>>> "inherit" and the >>>>>>>>>>> top-level control is set to deny or force, you would need that >>>>>>>>>>> to mean >>>>>>>>>>> something. >>>>>>>>>> >>>>>>>>>> IMHO, the >>>>>>>>>> '/mm/transparent_hugepage/hugepage-XXkb/shmem_enabled' interface >>>>>>>>>> should only control the anonymous shmem. And 'huge=' controls >>>>>>>>>> tmpfs >>>>>>>>>> allocation, >>>>>>>>>> so we should not use anonymous control to override tmpfs >>>>>>>>>> control, which >>>>>>>>>> seems a >>>>>>>>>> little mess? >>>>>>>>> >>>>>>>>> I agree it would be cleaner to only handle mmap(SHARED|ANON) >>>>>>>>> here, and leave >>>>>>>>> the >>>>>>>>> tmpfs stuff for another time. But my point is that >>>>>>>>> /mm/transparent_hugepage/shmem_enabled already interferes with >>>>>>>>> tmpfs if the >>>>>>>>> value is deny or force. So if you have: >>>>>>>>> >>>>>>>>> echo deny > /mm/transparent_hugepage/shmem_enabled >>>>>>>> >>>>>>>> IIUC, this global control will cause shmem_is_huge() to always >>>>>>>> return >>>>>>>> false, so >>>>>>>> no matter how >>>>>>>> '/mm/transparent_hugepage/hugepage-xxxkB/shmem_enabled' is set, >>>>>>>> anonymous shmem will not use mTHP. No? >>>>>>> >>>>>>> No, that's not how >>>>>>> '/mm/transparent_hugepage/hugepage-xxxkB/enabled' works, and >>>>>>> I think '/mm/transparent_hugepage/hugepage-xxxkB/shmem_enabled' >>>>>>> should follow >>>>>>> the established pattern. >>>>>>> >>>>>>> For anon-private, each size is controlled by its >>>>>>> /mm/transparent_hugepage/hugepage-xxxkB/enabled value. Unless that >>>>>>> value is >>>>>>> "inherit", in which case the value in >>>>>>> /mm/transparent_hugepage/enabled is used >>>>>>> for that size. >>>>>>> >>>>>>> That approach enables us to 1) maintain back-compat and 2) control >>>>>>> each size >>>>>>> independently >>>>>>> >>>>>>> 1) is met because the default is that all sizes are initially set >>>>>>> to "never", >>>>>>> except the PMD-size (e.g. >>>>>>> /mm/transparent_hugepage/hugepage-2048kB/enabled) >>>>>>> which is initially set to inherit. So any mTHP unaware SW can >>>>>>> still modify >>>>>>> /mm/transparent_hugepage/enabled and it will still only apply to >>>>>>> PMD size. >>>>>>> >>>>>>> 2) is met because mTHP aware SW can come along and e.g. enable the >>>>>>> 64K size >>>>>>> (echo always > /mm/transparent_hugepage/hugepage-64kB/enabled) >>>>>>> without >>>>>>> having to >>>>>>> modify the value in /mm/transparent_hugepage/enabled. >>>>>> >>>>>> Thanks for explanation. Initially, I want to make >>>>>> ‘/mm/transparent_hugepage/shmem_enabled’ be a global control for >>>>>> huge page, but >>>>>> I think it should follow the same strategy as anon mTHP as you said. >>>>>> >>>>>>>>> echo inherit > /mm/transparent_hugepage/hugepage-64kB/shmem_enabled >>>>>>>>> >>>>>>>>> What does that mean? >>>>>>> >>>>>>> So I think /mm/transparent_hugepage/hugepage-xxxkB/shmem_enabled >>>>>>> will need to >>>>>>> support the deny and force values. When applied to non-PMD sizes, >>>>>>> "deny" can >>>>>>> just be a noop for now, because there was no way to configure a >>>>>>> tmpfs mount for >>>>>>> non-PMD size THP in the first place. But I'm not sure what to do >>>>>>> with "force"? >>>>>> >>>>>> OK. And I also prefer that "force" should be a noop too, since anon >>>>>> shmem >>>>>> control should not configure tmpfs huge page allocation. >>>>> >>>>> I guess technically they won't be noops, but (for the non-PMD-sizes) >>>>> "force" >>>>> will be an alias for "always" and "deny" will be an alias for "never"? >>>>> >>>>> I was just a bit concerned about later changing that behavior to >>>>> also impact >>>>> tmpfs once tmpfs supports mTHP; could that cause breaks? But >>>>> thinking about it, >>>>> I don't see that as a problem. >>>> >>>> Is the question what should happen if we "inherit" "force" or if someone >>>> specifies "force" for a mTP size explicitly? >>> >>> Well I think it amounts to the same thing; there isn't much point in >>> forbidding >>> "force" to be set directly because it can still be set indirectly through >>> "inherit". We can't forbid indirectly setting it, because "inherit" >>> could be set >>> first, then the top-level shmem_enabled changed to "force" after - and we >>> wouldn't want to fail that. >> >> The default for PMD should be "inherit", for the other mTHP sizes it >> should be "never". >> >> So we should fail if: >> * Setting top-level to "force" when any non-PMD size is "inherit" >> * Setting "inherit" of a non-PMD size when the top-level is force > > IMO, for tmpfs this is true, but for anon shmem, this 2 cases should not > fail. If force does not apply to an mTHP size, it should fail if it would get inherited. Until it applies and we enable it. I'm still confused about all the toggles here, so could be I am missing something. -- Cheers, David / dhildenb