Received: by 2002:ab2:6816:0:b0:1f9:5764:f03e with SMTP id t22csp2160652lqo; Sun, 19 May 2024 17:04:16 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWqZYFQxeOXfBUCOP/R63eim5qgWVhp7AP3DHifKfW5GAeRvTT9/4MFg+zEt1M3oXSf6GnJudEsgiK68h0qxHU+4UAvQZlSJ4ab0j4nbA== X-Google-Smtp-Source: AGHT+IGFhPfntRaVG4Xohd2mS2uJG6MfCVvbcKwOannaRkeZ7F9l/RNXqm642U2wBY19MW0dJEn4 X-Received: by 2002:a05:6359:4c09:b0:192:4634:b1db with SMTP id e5c5f4694b2df-193bb517d7dmr2945154555d.11.1716163455953; Sun, 19 May 2024 17:04:15 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716163455; cv=pass; d=google.com; s=arc-20160816; b=ZDbBGYN0kl5y9kVmr5H+4lpQ/OVAweiT2v04aF/wGF5npuKbzU75mofo72iqn9XDP8 MH8E2ZcDGC9eQtH1VetWSK3GuVDzLa5exnxaP06wnjJOxgqMMf7RFu8laVbqjnvTeidE U3ZaLS1c9WLSKYYbHxyh0lzg5MQIkLT0AbrbbpgGkGbwFsRVYhvh7JnAIGIS3Adx53n/ 9ovx8TfRz5H487DrVB2qWaWIyTgX2FBPa8AxvCsYhCfMeqEJFfZ2v/tmPzlCUBdRoqfM FnCfrguLGHLbXkL6dYSJvpqcK6FGuT5OKH11SyyBkMKMhq1mbm8pTv5wwHTDYncUUZ9m BObA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=O5sDHCTmtIPLpgqtH3nIAb+SDutrYrwcw0ASXYMenlY=; fh=E0DbcmpaWUMU3tsh9qMXjeTDw4iIX563hSZx7yhoIM8=; b=zjcBtsAHP9BKD85im2sfXNsdsG6A8P1mNtl01EQmDJU67lU/9h4FYHQgHqHkua3yU9 OB1J5QNexDkFuof0SLqJaRhAasmLwBre8bnFyFYL/I1KKxMfbp/dn8++aqkqeHCJa/pJ J0oThgHp1qeeokrKCCAkj/6HTbQwLH5i2JH5N5V7aBdfr9Rtug3zD8wQ2umx6Tltqr/z Vya9D3BttwUprLTWXnH1M9Vf+ap9kWM7g7U3eDXHfKf7PsYi2jSxP0AKdZwAmI/A7WT7 jVIvv10UhYyV2pcrQZcqO2HhAdBxreD9qeggC3lYC8Nv63rvdwjcD82V/AMgT5WJcaTc OWzQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=F7aihozi; arc=pass (i=1 dkim=pass dkdomain=linux-foundation.org); spf=pass (google.com: domain of linux-kernel+bounces-183312-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-183312-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id 41be03b00d2f7-659a7c4db22si7405765a12.865.2024.05.19.17.04.15 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 19 May 2024 17:04:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-183312-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=F7aihozi; arc=pass (i=1 dkim=pass dkdomain=linux-foundation.org); spf=pass (google.com: domain of linux-kernel+bounces-183312-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-183312-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 62DB1B209AB for ; Mon, 20 May 2024 00:04:08 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7F1A5ECF; Mon, 20 May 2024 00:03:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux-foundation.org header.i=@linux-foundation.org header.b="F7aihozi" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 98B477F6; Mon, 20 May 2024 00:03:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716163438; cv=none; b=OpR/eE6o/aAoq04W50/Z7rX70OTkZquRtHKBgE6Fz2MbwP2PBlPOdi0XF24ujmw0EgTNkRkPCvILHTvMPkajJTBXBwaZWV3HwwHeoZrLVuaGOahBtVgl19teXJrpVxCRRSM2U0ysmojmh4GJvxfNTzSvOOKmLtm7/cOdwARcyfk= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716163438; c=relaxed/simple; bh=7yFBaYGbdejk5hZQC2H+aoo4UlB4LeIDYylGT3eKgD4=; h=Date:From:To:Cc:Subject:Message-Id:In-Reply-To:References: Mime-Version:Content-Type; b=B7DBRMWdlBr4lwcGq1vfIvSSap8ahvv4cL2zxPFwyA0jub7SACYCABZBDSNRQYcj1cAnv+6bGw83VSo0jT9ct+xN++QrkuLGIlafszfWKC/VMMJu9v13ok2SKqpJvKyxJ9pUin2tTeLwRcmvP/k2C/7+PHQ6zVRM7hxpXdDq/h4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux-foundation.org header.i=@linux-foundation.org header.b=F7aihozi; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id C8B81C32781; Mon, 20 May 2024 00:03:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1716163438; bh=7yFBaYGbdejk5hZQC2H+aoo4UlB4LeIDYylGT3eKgD4=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=F7aihoziRiv6mHe2u8ZO/m74t67Vxpw3JJ0ZBNtIDAf3ae4hDtDSkxecj1KkyhUAe 8DYzLinGmCU2Ui+NNUi6bOEhV/UaTSSIrS0NFQlY0CyVlsXitk4xZspPOMvtMDRs10 LquAgTIpZNCHokNh4+x2Hmf31O3o5Pk2k56vRFmc= Date: Sun, 19 May 2024 17:03:57 -0700 From: Andrew Morton To: Dev Jain Cc: shuah@kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Anshuman.Khandual@arm.com, sjayaram@akamai.com, stable@vger.kernel.org Subject: Re: [PATCH 2/2] selftests/mm: compaction_test: Fix trivial test success and reduce probability of OOM-killer invocation Message-Id: <20240519170357.757d30aac192c686f10d709c@linux-foundation.org> In-Reply-To: <20240515093633.54814-3-dev.jain@arm.com> References: <20240515093633.54814-1-dev.jain@arm.com> <20240515093633.54814-3-dev.jain@arm.com> X-Mailer: Sylpheed 3.8.0beta1 (GTK+ 2.24.33; x86_64-pc-linux-gnu) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Wed, 15 May 2024 15:06:33 +0530 Dev Jain wrote: > Reset nr_hugepages to zero before the start of the test. > > If a non-zero number of hugepages is already set before the start of the > test, the following problems arise: > > - The probability of the test getting OOM-killed increases. > Proof: The test wants to run on 80% of available memory to prevent > OOM-killing (see original code comments). Let the value of mem_free at the > start of the test, when nr_hugepages = 0, be x. In the other case, when > nr_hugepages > 0, let the memory consumed by hugepages be y. In the former > case, the test operates on 0.8 * x of memory. In the latter, the test > operates on 0.8 * (x - y) of memory, with y already filled, hence, memory > consumed is y + 0.8 * (x - y) = 0.8 * x + 0.2 * y > 0.8 * x. Q.E.D > > - The probability of a bogus test success increases. > Proof: Let the memory consumed by hugepages be greater than 25% of x, > with x and y defined as above. The definition of compaction_index is > c_index = (x - y)/z where z is the memory consumed by hugepages after > trying to increase them again. In check_compaction(), we set the number > of hugepages to zero, and then increase them back; the probability that > they will be set back to consume at least y amount of memory again is > very high (since there is not much delay between the two attempts of > changing nr_hugepages). Hence, z >= y > (x/4) (by the 25% assumption). > Therefore, > c_index = (x - y)/z <= (x - y)/y = x/y - 1 < 4 - 1 = 3 > hence, c_index can always be forced to be less than 3, thereby the test > succeeding always. Q.E.D > > NOTE: This patch depends on the previous one. > > -int check_compaction(unsigned long mem_free, unsigned int hugepage_size) > +int check_compaction(unsigned long mem_free, unsigned int hugepage_size, > + int initial_nr_hugepages) > { > int fd, ret = -1; > int compaction_index = 0; > - char initial_nr_hugepages[10] = {0}; > char nr_hugepages[10] = {0}; > + char init_nr_hugepages[10] = {0}; > + > + sprintf(init_nr_hugepages, "%d", initial_nr_hugepages); Well, [10] isn't really large enough. "-1111111111" requires 12 chars, with the trailing \0. And I'd suggest an unsigned type and a %u - negative initial_nr_hugepages doesn't make a lot of sense. > > +int set_zero_hugepages(int *initial_nr_hugepages) > +{ > + int fd, ret = -1; > + char nr_hugepages[10] = {0}; Ditto? > + fd = open("/proc/sys/vm/nr_hugepages", O_RDWR | O_NONBLOCK); > + if (fd < 0) { > + ksft_print_msg("Failed to open /proc/sys/vm/nr_hugepages: %s\n", > + strerror(errno)); > + goto out; > + } > + > + if (read(fd, nr_hugepages, sizeof(nr_hugepages)) <= 0) { > + ksft_print_msg("Failed to read from /proc/sys/vm/nr_hugepages: %s\n", > + strerror(errno)); > + goto close_fd; > + } > + > + lseek(fd, 0, SEEK_SET); > + > + /* Start with the initial condition of 0 huge pages */ > + if (write(fd, "0", sizeof(char)) != sizeof(char)) { > + ksft_print_msg("Failed to write 0 to /proc/sys/vm/nr_hugepages: %s\n", > + strerror(errno)); > + goto close_fd; > + } > + > + *initial_nr_hugepages = atoi(nr_hugepages); > + ret = 0; > + > + close_fd: > + close(fd); > + > + out: > + return ret; > +}