From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id C6700C3DA4A for ; Fri, 9 Aug 2024 09:32:10 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 5F19D6B009E; Fri, 9 Aug 2024 05:32:10 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 57AAF6B009F; Fri, 9 Aug 2024 05:32:10 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3A67D6B00A0; Fri, 9 Aug 2024 05:32:10 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 18F786B009E for ; Fri, 9 Aug 2024 05:32:10 -0400 (EDT) Received: from smtpin06.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id B5F7C1A0BB9 for ; Fri, 9 Aug 2024 09:32:09 +0000 (UTC) X-FDA: 82432190778.06.062A6AA Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by imf30.hostedemail.com (Postfix) with ESMTP id 7573D80019 for ; Fri, 9 Aug 2024 09:32:07 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=imAfVbxe; dmarc=pass (policy=none) header.from=redhat.com; spf=pass (imf30.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1723195854; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=OWYiUElLkfdUg+lpzwRgYF9R8MuRVbDbDgZSgsoIVkA=; b=5FaCe2Mf9hVt885p8th3nSWvovur7wkPlR6FVGoDDO8bp9bbW7LcMLSa/prYV2MbdNN/SX h+5VHqSKCGvScq0yf3rv04jgo4IkHYphP8b7YjEd9SttnM91o0nsZTLh5p2EDLdY82bqVw gaJkdd2WFn9qYwOcxw32Jx5iAiFKz48= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1723195854; a=rsa-sha256; cv=none; b=BPt/z8WaN4F8Le5p/h6621b8L4GDiec265gUDCJRWLZJ2ys/yIdL7ECVrC3TXTL7DHamBE qrfYzzLRuRi/IJeAAwqzCNs/ZI0ie7Ad40bYAh3jnEgOwSfXNWSl2WX8HiWmMv3DJ6D1xK 4i0vjZTg/WzLp6kUJZ6umdiKVx3JCps= ARC-Authentication-Results: i=1; imf30.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=imAfVbxe; dmarc=pass (policy=none) header.from=redhat.com; spf=pass (imf30.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1723195926; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=OWYiUElLkfdUg+lpzwRgYF9R8MuRVbDbDgZSgsoIVkA=; b=imAfVbxe+GfplwoIlqvZie/GllbyLShZSCi3i7OX5lr2XW9pJJrNbT1tmkJDUZU/xpiE78 u5hWSNSlIGdNsyhdLIvbX6QZ21q4K6QgfHYtuLTGHkb8D+UVcF/ekNHO02a/D//oAILO2I RL0d5QeI+ZtDz0a7Njb9zPUpYg0jNt8= Received: from mail-wr1-f69.google.com (mail-wr1-f69.google.com [209.85.221.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-126-EjtRtZQTOJajkqvik6SwUw-1; Fri, 09 Aug 2024 05:32:05 -0400 X-MC-Unique: EjtRtZQTOJajkqvik6SwUw-1 Received: by mail-wr1-f69.google.com with SMTP id ffacd0b85a97d-3687eca5980so861088f8f.0 for ; Fri, 09 Aug 2024 02:32:04 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1723195924; x=1723800724; h=content-transfer-encoding:in-reply-to:organization:autocrypt :content-language:from:references:cc:to:subject:user-agent :mime-version:date:message-id:x-gm-message-state:from:to:cc:subject :date:message-id:reply-to; bh=OWYiUElLkfdUg+lpzwRgYF9R8MuRVbDbDgZSgsoIVkA=; b=vAPcEfzon0EQXehGu4ung8DEXEK+3MtXf2sRq2BxFTcvHPA41WTs7q2oJOBt6ZrnuR nOYUdthfIM9OHtFNeKYZbLDQItsn0GFTKwPzxhsgWfKLV0W7uxWJz+oMnhEGUrO0PJWG SW0qECSo6kwBC6MmPB4fBBORfPVv3ltz7vLjaoOV92G7xY6wWfx7DT4lPWPAFVFAJbOj s9JiR5kkYUWjl+3tF766AhnSHb5xj8dO+TGAZTcSrUTimJys0/KS1kfMwxR+QxPFINQp /gD+iIEntRU656jytReJGitUg1uzMOxNaYItHQmdjD1YGqXjhh5oEoiBTVPSbXZsVYKE +pTw== X-Forwarded-Encrypted: i=1; AJvYcCWFb+XcZa0X08cKTmknXGcC/VgQpNSMPuOQAhj1o7DlgbnhKGHd2j8M+931rhcJimoGbAxpj4cltw==@kvack.org X-Gm-Message-State: AOJu0Yybv3taghMLhLarwG9mkQwF0KqmzYCbqJmZ+C3o1NJSd9LS22PT wOGbAuyddqBZZu9agKRmMVkA9dh+vbG8iRqR8FS1bbMOmbMYm4MB6s8h66NdOew5KMU+ARPHfKj d2/k14UUf8SuDBeQibRWKtATLDYnz5lTQUicf+cRoLXiM1TlS X-Received: by 2002:a05:6000:1813:b0:36b:bd38:c724 with SMTP id ffacd0b85a97d-36d616e2a5fmr745102f8f.47.1723195923886; Fri, 09 Aug 2024 02:32:03 -0700 (PDT) X-Google-Smtp-Source: AGHT+IH2a+r1bLn8Fwb4AjfMB5RfdwLekL4TjdrZzkU7NJKI7oPV6OsLuaQr55uRSzJRt2eXNx00jA== X-Received: by 2002:a05:6000:1813:b0:36b:bd38:c724 with SMTP id ffacd0b85a97d-36d616e2a5fmr745081f8f.47.1723195923387; Fri, 09 Aug 2024 02:32:03 -0700 (PDT) Received: from ?IPV6:2003:cb:c71c:4e00:b097:7075:f6ba:300a? (p200300cbc71c4e00b0977075f6ba300a.dip0.t-ipconnect.de. [2003:cb:c71c:4e00:b097:7075:f6ba:300a]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-36d2715716esm4728486f8f.5.2024.08.09.02.32.02 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 09 Aug 2024 02:32:02 -0700 (PDT) Message-ID: <75eb6e75-8a6d-460a-8e96-7496ed1396b7@redhat.com> Date: Fri, 9 Aug 2024 11:32:01 +0200 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v2] mm: Override mTHP "enabled" defaults at kernel cmdline To: Barry Song Cc: Ryan Roberts , Andrew Morton , Jonathan Corbet , Lance Yang , Baolin Wang , linux-kernel@vger.kernel.org, linux-mm@kvack.org References: <20240808101700.571701-1-ryan.roberts@arm.com> <99b78488-c524-4269-b1fb-a13eaa4f274c@redhat.com> From: David Hildenbrand Autocrypt: addr=david@redhat.com; keydata= xsFNBFXLn5EBEAC+zYvAFJxCBY9Tr1xZgcESmxVNI/0ffzE/ZQOiHJl6mGkmA1R7/uUpiCjJ dBrn+lhhOYjjNefFQou6478faXE6o2AhmebqT4KiQoUQFV4R7y1KMEKoSyy8hQaK1umALTdL QZLQMzNE74ap+GDK0wnacPQFpcG1AE9RMq3aeErY5tujekBS32jfC/7AnH7I0v1v1TbbK3Gp XNeiN4QroO+5qaSr0ID2sz5jtBLRb15RMre27E1ImpaIv2Jw8NJgW0k/D1RyKCwaTsgRdwuK Kx/Y91XuSBdz0uOyU/S8kM1+ag0wvsGlpBVxRR/xw/E8M7TEwuCZQArqqTCmkG6HGcXFT0V9 PXFNNgV5jXMQRwU0O/ztJIQqsE5LsUomE//bLwzj9IVsaQpKDqW6TAPjcdBDPLHvriq7kGjt WhVhdl0qEYB8lkBEU7V2Yb+SYhmhpDrti9Fq1EsmhiHSkxJcGREoMK/63r9WLZYI3+4W2rAc UucZa4OT27U5ZISjNg3Ev0rxU5UH2/pT4wJCfxwocmqaRr6UYmrtZmND89X0KigoFD/XSeVv jwBRNjPAubK9/k5NoRrYqztM9W6sJqrH8+UWZ1Idd/DdmogJh0gNC0+N42Za9yBRURfIdKSb B3JfpUqcWwE7vUaYrHG1nw54pLUoPG6sAA7Mehl3nd4pZUALHwARAQABzSREYXZpZCBIaWxk ZW5icmFuZCA8ZGF2aWRAcmVkaGF0LmNvbT7CwZgEEwEIAEICGwMGCwkIBwMCBhUIAgkKCwQW AgMBAh4BAheAAhkBFiEEG9nKrXNcTDpGDfzKTd4Q9wD/g1oFAl8Ox4kFCRKpKXgACgkQTd4Q 9wD/g1oHcA//a6Tj7SBNjFNM1iNhWUo1lxAja0lpSodSnB2g4FCZ4R61SBR4l/psBL73xktp rDHrx4aSpwkRP6Epu6mLvhlfjmkRG4OynJ5HG1gfv7RJJfnUdUM1z5kdS8JBrOhMJS2c/gPf wv1TGRq2XdMPnfY2o0CxRqpcLkx4vBODvJGl2mQyJF/gPepdDfcT8/PY9BJ7FL6Hrq1gnAo4 3Iv9qV0JiT2wmZciNyYQhmA1V6dyTRiQ4YAc31zOo2IM+xisPzeSHgw3ONY/XhYvfZ9r7W1l pNQdc2G+o4Di9NPFHQQhDw3YTRR1opJaTlRDzxYxzU6ZnUUBghxt9cwUWTpfCktkMZiPSDGd KgQBjnweV2jw9UOTxjb4LXqDjmSNkjDdQUOU69jGMUXgihvo4zhYcMX8F5gWdRtMR7DzW/YE BgVcyxNkMIXoY1aYj6npHYiNQesQlqjU6azjbH70/SXKM5tNRplgW8TNprMDuntdvV9wNkFs 9TyM02V5aWxFfI42+aivc4KEw69SE9KXwC7FSf5wXzuTot97N9Phj/Z3+jx443jo2NR34XgF 89cct7wJMjOF7bBefo0fPPZQuIma0Zym71cP61OP/i11ahNye6HGKfxGCOcs5wW9kRQEk8P9 M/k2wt3mt/fCQnuP/mWutNPt95w9wSsUyATLmtNrwccz63XOwU0EVcufkQEQAOfX3n0g0fZz Bgm/S2zF/kxQKCEKP8ID+Vz8sy2GpDvveBq4H2Y34XWsT1zLJdvqPI4af4ZSMxuerWjXbVWb T6d4odQIG0fKx4F8NccDqbgHeZRNajXeeJ3R7gAzvWvQNLz4piHrO/B4tf8svmRBL0ZB5P5A 2uhdwLU3NZuK22zpNn4is87BPWF8HhY0L5fafgDMOqnf4guJVJPYNPhUFzXUbPqOKOkL8ojk CXxkOFHAbjstSK5Ca3fKquY3rdX3DNo+EL7FvAiw1mUtS+5GeYE+RMnDCsVFm/C7kY8c2d0G NWkB9pJM5+mnIoFNxy7YBcldYATVeOHoY4LyaUWNnAvFYWp08dHWfZo9WCiJMuTfgtH9tc75 7QanMVdPt6fDK8UUXIBLQ2TWr/sQKE9xtFuEmoQGlE1l6bGaDnnMLcYu+Asp3kDT0w4zYGsx 5r6XQVRH4+5N6eHZiaeYtFOujp5n+pjBaQK7wUUjDilPQ5QMzIuCL4YjVoylWiBNknvQWBXS lQCWmavOT9sttGQXdPCC5ynI+1ymZC1ORZKANLnRAb0NH/UCzcsstw2TAkFnMEbo9Zu9w7Kv AxBQXWeXhJI9XQssfrf4Gusdqx8nPEpfOqCtbbwJMATbHyqLt7/oz/5deGuwxgb65pWIzufa N7eop7uh+6bezi+rugUI+w6DABEBAAHCwXwEGAEIACYCGwwWIQQb2cqtc1xMOkYN/MpN3hD3 AP+DWgUCXw7HsgUJEqkpoQAKCRBN3hD3AP+DWrrpD/4qS3dyVRxDcDHIlmguXjC1Q5tZTwNB boaBTPHSy/Nksu0eY7x6HfQJ3xajVH32Ms6t1trDQmPx2iP5+7iDsb7OKAb5eOS8h+BEBDeq 3ecsQDv0fFJOA9ag5O3LLNk+3x3q7e0uo06XMaY7UHS341ozXUUI7wC7iKfoUTv03iO9El5f XpNMx/YrIMduZ2+nd9Di7o5+KIwlb2mAB9sTNHdMrXesX8eBL6T9b+MZJk+mZuPxKNVfEQMQ a5SxUEADIPQTPNvBewdeI80yeOCrN+Zzwy/Mrx9EPeu59Y5vSJOx/z6OUImD/GhX7Xvkt3kq Er5KTrJz3++B6SH9pum9PuoE/k+nntJkNMmQpR4MCBaV/J9gIOPGodDKnjdng+mXliF3Ptu6 3oxc2RCyGzTlxyMwuc2U5Q7KtUNTdDe8T0uE+9b8BLMVQDDfJjqY0VVqSUwImzTDLX9S4g/8 kC4HRcclk8hpyhY2jKGluZO0awwTIMgVEzmTyBphDg/Gx7dZU1Xf8HFuE+UZ5UDHDTnwgv7E th6RC9+WrhDNspZ9fJjKWRbveQgUFCpe1sa77LAw+XFrKmBHXp9ZVIe90RMe2tRL06BGiRZr jPrnvUsUUsjRoRNJjKKA/REq+sAnhkNPPZ/NNMjaZ5b8Tovi8C0tmxiCHaQYqj7G2rgnT0kt WNyWQQ== Organization: Red Hat In-Reply-To: X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: 7573D80019 X-Stat-Signature: ckxk9msbz9ny8kcp7rny9719zai9usqf X-Rspam-User: X-HE-Tag: 1723195927-630013 X-HE-Meta: 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 auavLPYQ v70rzbKVQ5fR0kWn+V2O5AB3BaGseB7T3zy5W5qu1tCvxB7sefyEiuh2Rwv+2RlipsxRTvZKsuDiXGYe1zxnVntzgiY0sXtakOQaqCi683ZSEEp0Jd4FtPMx1Iv8djBfNvAdK15o9Ll5QQTVNw40kXJz+rSdhhIBHK4Qxn2WVBDflpIawfWxNQWXQjcZQ3QjYznwQ6jDTuAL+4GQvF/Y43p9BMo8qxJOtZUIrELyuKJtoJXByKRU108C3C5xdeN7oX7/r0fu0NN9R+lJ954hOvIX5Bc9+TYWTIBx9AmnJbRzG6Q4TLVv3RsCvDDMNppIfqyWDlBbwGMq15SfgVJq5L+1JE8fScIMT/ZfiyvYNdGUta4kHft5uTIhEC1CSfDPgytcuU/wUYNZbnYxUKaJWlneR4TAcWMwRwEjYGB7TdlGUzQvEDJRx07SlSzO3IJb5bUXC9OmQK98CRkj5t5NnwfU0Ke49XOZ7tlbW X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 09.08.24 11:24, Barry Song wrote: > On Fri, Aug 9, 2024 at 5:19 PM David Hildenbrand wrote: >> >> On 08.08.24 12:16, Ryan Roberts wrote: >>> Add thp_anon= cmdline parameter to allow specifying the default >>> enablement of each supported anon THP size. The parameter accepts the >>> following format and can be provided multiple times to configure each >>> size: >>> >>> thp_anon=[KMG]: >>> >>> See Documentation/admin-guide/mm/transhuge.rst for more details. >>> >>> Configuring the defaults at boot time is useful to allow early user >>> space to take advantage of mTHP before its been configured through >>> sysfs. >> >> I suspect a khugeapged enhancement and/or kernel-config-dependant >> defaults and/or early system settings will also be able to mitigate that >> without getting kernel cmdlines involved in the future. >> >>> >>> Signed-off-by: Ryan Roberts >>> --- >>> >>> Hi All, >>> >>> I've split this off from my RFC at [1] because Barry highlighted that he would >>> benefit from it immediately [2]. There are no changes vs the version in that >>> series. >>> >>> It applies against today's mm-unstable (275d686abcb59). (although I had to fix a >>> minor build bug in stackdepot.c due to MIN() not being defined in this tree). >>> >>> Thanks, >>> Ryan >>> >>> >>> .../admin-guide/kernel-parameters.txt | 8 +++ >>> Documentation/admin-guide/mm/transhuge.rst | 26 +++++++-- >>> mm/huge_memory.c | 55 ++++++++++++++++++- >>> 3 files changed, 82 insertions(+), 7 deletions(-) >>> >>> diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt >>> index bcdee8984e1f0..5c79b58c108ec 100644 >>> --- a/Documentation/admin-guide/kernel-parameters.txt >>> +++ b/Documentation/admin-guide/kernel-parameters.txt >>> @@ -6631,6 +6631,14 @@ >>> : poll all this frequency >>> 0: no polling (default) >>> >>> + thp_anon= [KNL] >>> + Format: [KMG]:always|madvise|never|inherit >>> + Can be used to control the default behavior of the >>> + system with respect to anonymous transparent hugepages. >>> + Can be used multiple times for multiple anon THP sizes. >>> + See Documentation/admin-guide/mm/transhuge.rst for more >>> + details. >>> + >>> threadirqs [KNL,EARLY] >>> Force threading of all interrupt handlers except those >>> marked explicitly IRQF_NO_THREAD. >>> diff --git a/Documentation/admin-guide/mm/transhuge.rst b/Documentation/admin-guide/mm/transhuge.rst >>> index 24eec1c03ad88..f63b0717366c6 100644 >>> --- a/Documentation/admin-guide/mm/transhuge.rst >>> +++ b/Documentation/admin-guide/mm/transhuge.rst >>> @@ -284,13 +284,27 @@ that THP is shared. Exceeding the number would block the collapse:: >>> >>> A higher value may increase memory footprint for some workloads. >>> >>> -Boot parameter >>> -============== >>> +Boot parameters >>> +=============== >>> >>> -You can change the sysfs boot time defaults of Transparent Hugepage >>> -Support by passing the parameter ``transparent_hugepage=always`` or >>> -``transparent_hugepage=madvise`` or ``transparent_hugepage=never`` >>> -to the kernel command line. >>> +You can change the sysfs boot time default for the top-level "enabled" >>> +control by passing the parameter ``transparent_hugepage=always`` or >>> +``transparent_hugepage=madvise`` or ``transparent_hugepage=never`` to the >>> +kernel command line. >>> + >>> +Alternatively, each supported anonymous THP size can be controlled by >>> +passing ``thp_anon=[KMG]:``, where ```` is the THP size >>> +and ```` is one of ``always``, ``madvise``, ``never`` or >>> +``inherit``. >>> + >>> +For example, the following will set 64K THP to ``always``:: >>> + >>> + thp_anon=64K:always >>> + >>> +``thp_anon=`` may be specified multiple times to configure all THP sizes as >>> +required. If ``thp_anon=`` is specified at least once, any anon THP sizes >>> +not explicitly configured on the command line are implicitly set to >>> +``never``. >> >> I suggest documenting that "thp_anon=" will not effect the value of >> "transparent_hugepage=", or any configured default. >> >> Wondering if a syntax like >> >> thp_anon=16K,32K,64K:always;1048K,2048K:madvise >> >> (one could also support ranges, like "16K-64K") >> >> Would be even better. Then, maybe only allow a single instance. >> >> Maybe consider it if it's not too crazy to parse ;) > > I prefer the current approach because it effectively filters cases like this. > > [ 0.000000] huge_memory: thp_anon=8K:inherit: cannot parse, ignored > [ 0.000000] Unknown kernel command line parameters > "thp_anon=8K:inherit", will be passed to user space. > > if we put multiple sizes together, 8K,32K,64K:always > > We can't determine whether this command line is legal or illegal as it > is partially legal and partially illegal. Besides: I wouldn't bother about this "user does something stupid" scenario that much. But yes, once we support more sizes a cmdline might turn invalid on an older kernel. However, I don't see the problem here. User passed a non-existant size. Ignore that one but handle the others, like you would with multiple commands? It can be well defined and documented. The command line is legal, just one size does not exist. The world will continue turning :) -- Cheers, David / dhildenb