Received: by 2002:a89:48b:0:b0:1f5:f2ab:c469 with SMTP id a11csp1005495lqd; Thu, 25 Apr 2024 03:19:37 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUdU9/8Uz8ohJEsGdquH+01KH1DZUpii86OrRg8ZgiMJ549DRGVI3AMEqc3DinXkFCoHGokTIHnKfB4G0U5D6hOfVV1qbiC3sWZQrXnmw== X-Google-Smtp-Source: AGHT+IH8/wNKYlzU8R+TcHTQ1xuKKd8sFAWGtEL5uJk4GsopNtlKKCkpYvTT8ZFYqNBc9LqSMVXz X-Received: by 2002:a17:90a:7402:b0:2a2:f25c:c250 with SMTP id a2-20020a17090a740200b002a2f25cc250mr5514589pjg.11.1714040377086; Thu, 25 Apr 2024 03:19:37 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714040377; cv=pass; d=google.com; s=arc-20160816; b=JfWzfzTeQsWXqly0/5uCIkh+qoxV5DWw4Fz13PtYqX7J5S7T8wXkDGxdB/pm657+IF 5MiWJ+v1QXdY6nHNyjlbY1vIDkZUyTm2a7m8bLE5pUbRpBBCGJT8/ogWciA9fYGKfFMS HeYLOJZKTwEccPzGxJXvmTn+My4URUmwIlwnC8TvPL7GUelNvLAxhDyabw1A/BBs4w5k kmUkQbNPNKQXll9Hp2VfimW61kZFZea8YwfpEanjF7/Dit0/o+gzGuuRUh6KtE1f3hk1 j5QXRrrNnFbPn7btqo+UgkfA3dacN0QcK3r/0cArbU9CQ+UXixtIXLhleoRwQrIGFgtB 7LWg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id; bh=rUEIw3dEJe5X4TpR6w8h4H77ZCkn6PxNhq9zKt5rjPE=; fh=j2a7/zMU7VYtZXf//KK2+K8IUDAtYNnrWyeszW3MjQE=; b=s85Do+sNfrCJjD9efOfv79L0FYWU10deCPZes6IeGmReRW3mKQy3mDQ2Z+JynJ3hF7 Pd0VXDINzotohDfnnJCAcQtjXGLa7LW682aATWgRRAmCRnN3EFSudH2cB9yzl3T32HHm zAg1V4u2lgNNpVOqwJVXUYfQcnC2IdNuCOQuqZUHmO0OBHbfq2mxOv9Y4DkzUCdp8SeP 1Qn1XGccgHphWp7V5rTlyrvbmvzj7IsKkwdqp9fWZz0ThPdRtkl1dTQF/X4Ppb8CGUv9 y73pMK19TwZgvBJg92b6lpgV4AjXGQeMjjEtsAl5nXkAZSeIYiRyFhUm8Jh/BGwDXa1i JHJA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-158377-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-158377-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id o14-20020a17090ab88e00b002a4ed388b28si13166652pjr.82.2024.04.25.03.19.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 25 Apr 2024 03:19:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-158377-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-158377-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-158377-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 2664328995A for ; Thu, 25 Apr 2024 10:18:29 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1AA238663A; Thu, 25 Apr 2024 10:17:58 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 43E848624E for ; Thu, 25 Apr 2024 10:17:55 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714040277; cv=none; b=iIviywUjyD9lNdmipzcQR8N8OpTXOQjlXFLiZiKeX6mm0dPHsEo1PHRZone5Rq0YL5YiR9yLt1uRO0h5rFlXm2otvv0mP+NfZzdzMPm1foRCwHZViqccSGTKDPWAJRJUVAknt5Fox9IoNdB/KYvqT3adU7e+yy50QdbTPz7HVdM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714040277; c=relaxed/simple; bh=dT2t8ia8pTZMd32Ph45ZMNVC2iqb0Fiq0bqx9Ch3K9I=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=cKwls+h0ir0BZDXR2FPtqNSAXUfkdOPv4im90hiBdbrECUuH6Qzl1vT6iSx1ojXg6uPB+GFXrpacVVT5R1AZVQqyyYDm/4KKFf9VpAe/lBGB/BuseHYDL1wiU3tq9Lir4eHqCKNun5uk/uEx2Kej6mtYrBUabBZuY3h2o50mwMk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id CD3212F; Thu, 25 Apr 2024 03:18:22 -0700 (PDT) Received: from [10.1.27.187] (unknown [10.1.27.187]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1B9893F64C; Thu, 25 Apr 2024 03:17:53 -0700 (PDT) Message-ID: <2f58b505-c276-463a-a7ef-42d64cbe5e7c@arm.com> Date: Thu, 25 Apr 2024 11:17:51 +0100 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [RFC PATCH 0/5] add mTHP support for anonymous share pages Content-Language: en-GB To: Baolin Wang , David Hildenbrand , akpm@linux-foundation.org, hughd@google.com Cc: willy@infradead.org, wangkefeng.wang@huawei.com, 21cnbao@gmail.com, ying.huang@intel.com, shy828301@gmail.com, ziy@nvidia.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org References: <4b998e7d-153f-48cc-a9bb-8c84bb675581@arm.com> <80b5f87e-c156-4ccc-98f0-96f1fd864273@arm.com> <5b8b22e7-6355-4b08-b5b5-1e33ebae6f16@arm.com> <813fe7fd-3004-4e8b-801d-95c33559a025@linux.alibaba.com> <76f816dd-3bbf-48c9-a630-3787051cf289@arm.com> <8c0d6358-3c16-4a57-822c-04b3b3403fe6@linux.alibaba.com> <4204b5f6-21f0-4aa2-a625-3dd2f416b649@arm.com> <94ae96f7-79ce-4b3f-a272-6af62d01a3f8@redhat.com> <71c1e953-84f9-4d47-bd4c-725a447627df@arm.com> <8665df72-0855-4f71-823b-5ff8d8342fd1@redhat.com> From: Ryan Roberts In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit On 25/04/2024 10:50, Baolin Wang wrote: > > > On 2024/4/25 17:20, David Hildenbrand wrote: >> On 25.04.24 11:05, Baolin Wang wrote: >>> >>> >>> On 2024/4/25 16:57, David Hildenbrand wrote: >>>> On 25.04.24 10:46, Ryan Roberts wrote: >>>>> On 25/04/2024 09:26, David Hildenbrand wrote: >>>>>> On 25.04.24 10:17, Ryan Roberts wrote: >>>>>>> On 25/04/2024 07:20, Baolin Wang wrote: >>>>>>>> >>>>>>>> >>>>>>>> On 2024/4/24 22:20, Ryan Roberts wrote: >>>>>>>>> On 24/04/2024 14:49, Baolin Wang wrote: >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> On 2024/4/24 18:01, Ryan Roberts wrote: >>>>>>>>>>> On 24/04/2024 10:55, Baolin Wang wrote: >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> On 2024/4/24 16:26, Ryan Roberts wrote: >>>>>>>>>>>>> On 24/04/2024 07:55, Baolin Wang wrote: >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> On 2024/4/23 18:41, Ryan Roberts wrote: >>>>>>>>>>>>>>> On 22/04/2024 08:02, Baolin Wang wrote: >>>>>>>>>>>>>>>> Anonymous pages have already been supported for multi-size >>>>>>>>>>>>>>>> (mTHP) >>>>>>>>>>>>>>>> allocation >>>>>>>>>>>>>>>> through commit 19eaf44954df, that can allow THP to be >>>>>>>>>>>>>>>> configured >>>>>>>>>>>>>>>> through the >>>>>>>>>>>>>>>> sysfs interface located at >>>>>>>>>>>>>>>> '/sys/kernel/mm/transparent_hugepage/hugepage-XXkb/enabled'. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> However, the anonymous shared pages will ignore the >>>>>>>>>>>>>>>> anonymous mTHP rule >>>>>>>>>>>>>>>> configured through the sysfs interface, and can only use >>>>>>>>>>>>>>>> the PMD-mapped >>>>>>>>>>>>>>>> THP, that is not reasonable. Many implement anonymous page >>>>>>>>>>>>>>>> sharing >>>>>>>>>>>>>>>> through >>>>>>>>>>>>>>>> mmap(MAP_SHARED | MAP_ANONYMOUS), especially in database usage >>>>>>>>>>>>>>>> scenarios, >>>>>>>>>>>>>>>> therefore, users expect to apply an unified mTHP strategy >>>>>>>>>>>>>>>> for anonymous >>>>>>>>>>>>>>>> pages, >>>>>>>>>>>>>>>> also including the anonymous shared pages, in order to >>>>>>>>>>>>>>>> enjoy the >>>>>>>>>>>>>>>> benefits of >>>>>>>>>>>>>>>> mTHP. For example, lower latency than PMD-mapped THP, >>>>>>>>>>>>>>>> smaller memory >>>>>>>>>>>>>>>> bloat >>>>>>>>>>>>>>>> than PMD-mapped THP, contiguous PTEs on ARM architecture to >>>>>>>>>>>>>>>> reduce TLB >>>>>>>>>>>>>>>> miss >>>>>>>>>>>>>>>> etc. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> This sounds like a very useful addition! >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Out of interest, can you point me at any workloads (and >>>>>>>>>>>>>>> off-the-shelf >>>>>>>>>>>>>>> benchmarks >>>>>>>>>>>>>>> for those workloads) that predominantly use shared anon memory? >>>>>>>>>>>>>> >>>>>>>>>>>>>> As far as I know, some database related workloads make >>>>>>>>>>>>>> extensive use of >>>>>>>>>>>>>> shared >>>>>>>>>>>>>> anonymous page, such as PolarDB[1] in our Alibaba fleet, or >>>>>>>>>>>>>> MySQL likely >>>>>>>>>>>>>> also >>>>>>>>>>>>>> uses shared anonymous memory. And I still need to do some >>>>>>>>>>>>>> investigation to >>>>>>>>>>>>>> measure the performance. >>>>>>>>>>>>>> >>>>>>>>>>>>>> [1] https://github.com/ApsaraDB/PolarDB-for-PostgreSQL >>>>>>>>>>>>> >>>>>>>>>>>>> Thanks for the pointer! >>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>>>> The primary strategy is that, the use of huge pages for >>>>>>>>>>>>>>>> anonymous shared >>>>>>>>>>>>>>>> pages >>>>>>>>>>>>>>>> still follows the global control determined by the mount >>>>>>>>>>>>>>>> option "huge=" >>>>>>>>>>>>>>>> parameter >>>>>>>>>>>>>>>> or the sysfs interface at >>>>>>>>>>>>>>>> '/sys/kernel/mm/transparent_hugepage/shmem_enabled'. >>>>>>>>>>>>>>>> The utilization of mTHP is allowed only when the global >>>>>>>>>>>>>>>> 'huge' switch is >>>>>>>>>>>>>>>> enabled. >>>>>>>>>>>>>>>> Subsequently, the mTHP sysfs interface >>>>>>>>>>>>>>>> (/sys/kernel/mm/transparent_hugepage/hugepage-XXkb/enabled) >>>>>>>>>>>>>>>> is checked to determine the mTHP size that can be used for >>>>>>>>>>>>>>>> large folio >>>>>>>>>>>>>>>> allocation >>>>>>>>>>>>>>>> for these anonymous shared pages. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> I'm not sure about this proposed control mechanism; won't it >>>>>>>>>>>>>>> break >>>>>>>>>>>>>>> compatibility? I could be wrong, but I don't think shmem's >>>>>>>>>>>>>>> use of THP >>>>>>>>>>>>>>> used to >>>>>>>>>>>>>>> depend upon the value of >>>>>>>>>>>>>>> /sys/kernel/mm/transparent_hugepage/enabled? >>>>>>>>>>>>>>> So it >>>>>>>>>>>>>> >>>>>>>>>>>>>> Yes, I realized this after more testing. >>>>>>>>>>>>>> >>>>>>>>>>>>>>> doesn't make sense to me that we now depend upon the >>>>>>>>>>>>>>> /sys/kernel/mm/transparent_hugepage/hugepage-XXkb/enabled >>>>>>>>>>>>>>> values >>>>>>>>>>>>>>> (which by >>>>>>>>>>>>>>> default disables all sizes except 2M, which is set to >>>>>>>>>>>>>>> "inherit" from >>>>>>>>>>>>>>> /sys/kernel/mm/transparent_hugepage/enabled). >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> The other problem is that shmem_enabled has a different set >>>>>>>>>>>>>>> of options >>>>>>>>>>>>>>> (always/never/within_size/advise/deny/force) to enabled >>>>>>>>>>>>>>> (always/madvise/never) >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Perhaps it would be cleaner to do the same trick we did for >>>>>>>>>>>>>>> enabled; >>>>>>>>>>>>>>> Introduce >>>>>>>>>>>>>>> /mm/transparent_hugepage/hugepage-XXkb/shmem_enabled, which >>>>>>>>>>>>>>> can have all >>>>>>>>>>>>>>> the >>>>>>>>>>>>>>> same values as the top-level >>>>>>>>>>>>>>> /sys/kernel/mm/transparent_hugepage/shmem_enabled, >>>>>>>>>>>>>>> plus the additional "inherit" option. By default all sizes >>>>>>>>>>>>>>> will be set to >>>>>>>>>>>>>>> "never" except 2M, which is set to "inherit". >>>>>>>>>>>>>> >>>>>>>>>>>>>> Sounds good to me. But I do not want to copy all same values >>>>>>>>>>>>>> from >>>>>>>>>>>>>> top-level >>>>>>>>>>>>>> '/sys/kernel/mm/transparent_hugepage/shmem_enabled': >>>>>>>>>>>>>> always within_size advise never deny force >>>>>>>>>>>>>> >>>>>>>>>>>>>> For mTHP's shmem_enabled interface, we can just keep below >>>>>>>>>>>>>> values: >>>>>>>>>>>>>> always within_size advise never >>>>>>>>>>>>>> >>>>>>>>>>>>>> Cause when checking if mTHP can be used for anon shmem, >>>>>>>>>>>>>> 'deny' is equal to >>>>>>>>>>>>>> 'never', and 'force' is equal to 'always'. >>>>>>>>>>>>> >>>>>>>>>>>>> I'll admit it wasn't completely clear to me after reading the >>>>>>>>>>>>> docs, but my >>>>>>>>>>>>> rough >>>>>>>>>>>>> understanding is: >>>>>>>>>>>>> >>>>>>>>>>>>>        - /sys/kernel/mm/transparent_hugepage/shmem_enabled >>>>>>>>>>>>> controls >>>>>>>>>>>>>          mmap(SHARED|ANON) allocations (mostly; see rule 3) >>>>>>>>>>>>>        - huge=... controls tmpfs allocations >>>>>>>>>>>>>        - deny and force in shmem_enabled are equivalent to >>>>>>>>>>>>> never and >>>>>>>>>>>>> always for >>>>>>>>>>>>>          mmap(SHARED|ANON) but additionally override all tmpfs >>>>>>>>>>>>> mounts so they >>>>>>>>>>>>> act as >>>>>>>>>>>>>          if they were mounted with huge=never or huge=always >>>>>>>>>>>>> >>>>>>>>>>>>> Is that correct? If so, then I think it still makes sense to >>>>>>>>>>>>> support >>>>>>>>>>>>> per-size >>>>>>>>>>>> >>>>>>>>>>>> Correct. >>>>>>>>>>>> >>>>>>>>>>>>> deny/force. Certainly if a per-size control is set to >>>>>>>>>>>>> "inherit" and the >>>>>>>>>>>>> top-level control is set to deny or force, you would need that >>>>>>>>>>>>> to mean >>>>>>>>>>>>> something. >>>>>>>>>>>> >>>>>>>>>>>> IMHO, the >>>>>>>>>>>> '/mm/transparent_hugepage/hugepage-XXkb/shmem_enabled' interface >>>>>>>>>>>> should only control the anonymous shmem. And 'huge=' controls >>>>>>>>>>>> tmpfs >>>>>>>>>>>> allocation, >>>>>>>>>>>> so we should not use anonymous control to override tmpfs >>>>>>>>>>>> control, which >>>>>>>>>>>> seems a >>>>>>>>>>>> little mess? >>>>>>>>>>> >>>>>>>>>>> I agree it would be cleaner to only handle mmap(SHARED|ANON) >>>>>>>>>>> here, and leave >>>>>>>>>>> the >>>>>>>>>>> tmpfs stuff for another time. But my point is that >>>>>>>>>>> /mm/transparent_hugepage/shmem_enabled already interferes with >>>>>>>>>>> tmpfs if the >>>>>>>>>>> value is deny or force. So if you have: >>>>>>>>>>> >>>>>>>>>>> echo deny > /mm/transparent_hugepage/shmem_enabled >>>>>>>>>> >>>>>>>>>> IIUC, this global control will cause shmem_is_huge() to always >>>>>>>>>> return >>>>>>>>>> false, so >>>>>>>>>> no matter how >>>>>>>>>> '/mm/transparent_hugepage/hugepage-xxxkB/shmem_enabled' is set, >>>>>>>>>> anonymous shmem will not use mTHP. No? >>>>>>>>> >>>>>>>>> No, that's not how >>>>>>>>> '/mm/transparent_hugepage/hugepage-xxxkB/enabled' works, and >>>>>>>>> I think '/mm/transparent_hugepage/hugepage-xxxkB/shmem_enabled' >>>>>>>>> should follow >>>>>>>>> the established pattern. >>>>>>>>> >>>>>>>>> For anon-private, each size is controlled by its >>>>>>>>> /mm/transparent_hugepage/hugepage-xxxkB/enabled value. Unless that >>>>>>>>> value is >>>>>>>>> "inherit", in which case the value in >>>>>>>>> /mm/transparent_hugepage/enabled is used >>>>>>>>> for that size. >>>>>>>>> >>>>>>>>> That approach enables us to 1) maintain back-compat and 2) control >>>>>>>>> each size >>>>>>>>> independently >>>>>>>>> >>>>>>>>> 1) is met because the default is that all sizes are initially set >>>>>>>>> to "never", >>>>>>>>> except the PMD-size (e.g. >>>>>>>>> /mm/transparent_hugepage/hugepage-2048kB/enabled) >>>>>>>>> which is initially set to inherit. So any mTHP unaware SW can >>>>>>>>> still modify >>>>>>>>> /mm/transparent_hugepage/enabled and it will still only apply to >>>>>>>>> PMD size. >>>>>>>>> >>>>>>>>> 2) is met because mTHP aware SW can come along and e.g. enable the >>>>>>>>> 64K size >>>>>>>>> (echo always > /mm/transparent_hugepage/hugepage-64kB/enabled) >>>>>>>>> without >>>>>>>>> having to >>>>>>>>> modify the value in /mm/transparent_hugepage/enabled. >>>>>>>> >>>>>>>> Thanks for explanation. Initially, I want to make >>>>>>>> ‘/mm/transparent_hugepage/shmem_enabled’ be a global control for >>>>>>>> huge page, but >>>>>>>> I think it should follow the same strategy as anon mTHP as you said. >>>>>>>> >>>>>>>>>>> echo inherit > /mm/transparent_hugepage/hugepage-64kB/shmem_enabled >>>>>>>>>>> >>>>>>>>>>> What does that mean? >>>>>>>>> >>>>>>>>> So I think /mm/transparent_hugepage/hugepage-xxxkB/shmem_enabled >>>>>>>>> will need to >>>>>>>>> support the deny and force values. When applied to non-PMD sizes, >>>>>>>>> "deny" can >>>>>>>>> just be a noop for now, because there was no way to configure a >>>>>>>>> tmpfs mount for >>>>>>>>> non-PMD size THP in the first place. But I'm not sure what to do >>>>>>>>> with "force"? >>>>>>>> >>>>>>>> OK. And I also prefer that "force" should be a noop too, since anon >>>>>>>> shmem >>>>>>>> control should not configure tmpfs huge page allocation. >>>>>>> >>>>>>> I guess technically they won't be noops, but (for the non-PMD-sizes) >>>>>>> "force" >>>>>>> will be an alias for "always" and "deny" will be an alias for "never"? >>>>>>> >>>>>>> I was just a bit concerned about later changing that behavior to >>>>>>> also impact >>>>>>> tmpfs once tmpfs supports mTHP; could that cause breaks? But >>>>>>> thinking about it, >>>>>>> I don't see that as a problem. >>>>>> >>>>>> Is the question what should happen if we "inherit" "force" or if someone >>>>>> specifies "force" for a mTP size explicitly? >>>>> >>>>> Well I think it amounts to the same thing; there isn't much point in >>>>> forbidding >>>>> "force" to be set directly because it can still be set indirectly through >>>>> "inherit". We can't forbid indirectly setting it, because "inherit" >>>>> could be set >>>>> first, then the top-level shmem_enabled changed to "force" after - and we >>>>> wouldn't want to fail that. >>>> >>>> The default for PMD should be "inherit", for the other mTHP sizes it >>>> should be "never". >>>> >>>> So we should fail if: >>>> * Setting top-level to "force" when any non-PMD size is "inherit" >>>> * Setting "inherit" of a non-PMD size when the top-level is force >>> >>> IMO, for tmpfs this is true, but for anon shmem, this 2 cases should not >>> fail. >> >> If force does not apply to an mTHP size, it should fail if it would get >> inherited. Until it applies and we enable it. >> >> I'm still confused about all the toggles here, so could be I am missing >> something. > > Yes, this is a little messy:( > > After thinking more, considering that 'force' is used to override the tmpfs > mount option, and 'inherit' will inherit the global setting. Your suggestion > will make the logic eary to understand (though it is valid for anon shmem mTHP > allocations, which are not part of this scenario), Ryan, what do you think? I was thinking that ever returning an error code when trying to set "force" for /mm/transparent_hugepage/shmem_enabled would be weird behavior and to be avoided if possible. But as always, David makes a clear and compelling case. I'm happy to go with his suggestion. I wonder if we should do the same for "deny"? The argument I previously made was that non-PMD-size mTHP is always effectively denied while tmpfs doesn't support mTHP, so we can allow "deny" and for now it would just be an alias for "never". The semantics don't change when you introduce tmpfs support. Personally I lean towards allowing "deny" from day 1. David?