From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 36F2DD1CDC7 for ; Tue, 22 Oct 2024 09:33:56 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id C286E6B0088; Tue, 22 Oct 2024 05:33:55 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id BD6886B0089; Tue, 22 Oct 2024 05:33:55 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A77216B008A; Tue, 22 Oct 2024 05:33:55 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 86CD36B0088 for ; Tue, 22 Oct 2024 05:33:55 -0400 (EDT) Received: from smtpin27.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id DCE7C16038A for ; Tue, 22 Oct 2024 09:33:36 +0000 (UTC) X-FDA: 82700725800.27.6FA4269 Received: from mail-ej1-f49.google.com (mail-ej1-f49.google.com [209.85.218.49]) by imf03.hostedemail.com (Postfix) with ESMTP id 7631B20015 for ; Tue, 22 Oct 2024 09:33:45 +0000 (UTC) Authentication-Results: imf03.hostedemail.com; dkim=none; spf=pass (imf03.hostedemail.com: domain of ngompa13@gmail.com designates 209.85.218.49 as permitted sender) smtp.mailfrom=ngompa13@gmail.com; dmarc=none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1729589482; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=YDnCU5uV7X3XxlntBsD6cvm5xA5ulNN8qAE5+TteYHA=; b=6uLaT4VGR532OKDReoRjtnlhfBwQxpWIVdOOqa9hoBTfM6cgzQtQdge0xnM2BwojYvtUdF Fx9Qtnj+tyJE+8pqBqNwM8RR/sqEWMNuZx2J+YccPT+w4jSG6hFWIUeYwiUTmyq+2h6do9 HpG28oGoxJ+o37INzamyI5zoy438kug= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1729589482; a=rsa-sha256; cv=none; b=KNYIu6Q/csektAIm9vkNv+rh6Ys74xYONj4HL5fZcwOJh0R/iHo3aAzDwoJDwP0gF62u7R DCYNkHHQyROJ/WnTXdUWDFgLy+ULZifv/89/pAWaz2lNqG5VcgsKUGSI3Rl1mfV1IFUR2h Fsd5hllhm4r7sDVUK1XgAokpfDsh5B8= ARC-Authentication-Results: i=1; imf03.hostedemail.com; dkim=none; spf=pass (imf03.hostedemail.com: domain of ngompa13@gmail.com designates 209.85.218.49 as permitted sender) smtp.mailfrom=ngompa13@gmail.com; dmarc=none Received: by mail-ej1-f49.google.com with SMTP id a640c23a62f3a-a9a2209bd7fso725891566b.2 for ; Tue, 22 Oct 2024 02:33:52 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1729589631; x=1730194431; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=YDnCU5uV7X3XxlntBsD6cvm5xA5ulNN8qAE5+TteYHA=; b=aPWHGLM2LpVqfecuIzVzwcjwfBQ8vcqiOA9xbzIb+8pJzhswz65RPUboIO6HbiPPIl LKxYpeAdZGbosC7KtcOjJhwXN1Kk+kMkdrQ/YUMCCocmw002rNg9dCMTsccmUYQGGw6u x5pbWeiCt/wiKOfhXHTnVJXQXVkGr9U7D2F3CSw9eLaHeobdFuIuHg3WTArw4JXuIFcM 12ftbp2xPLV0OrmvPCPSRolCpSV08Y83SXMi4jbdTKenzkFpOsQJ+aQGpIoc3fNINx3s f9l3PCau00E8EXpMUmovVNPcOcD3Qfv5Bx5kbxHUZLWCDSmSFSesTvu23+q4qP1sGvuQ b9/Q== X-Forwarded-Encrypted: i=1; AJvYcCUcIC5WCw9XnaowYifFA0dSdM09HcUrR6eWVpPv2QMZkQHy3Vd6DRtIJtZDnqC8PQ6lTQ+bf45NYw==@kvack.org X-Gm-Message-State: AOJu0Yz7E29p9fzzMxkDH1VjwNurRiCuhV+C9qAIfbMoB3hNv5DPun7a 0VANa/kuB75WqgyU5pXqx2m7vyI+Kp85bITKQ2kSHCn+VQiDbWq4hxInZgzKLRPVqQ== X-Google-Smtp-Source: AGHT+IEc72jk3sTNfJiTPpoI77qmYaWaLDmZ2Oy1dLCxWGK7F8SJHgFUJdwIRiHPBqEyTu1FOuM6dw== X-Received: by 2002:a17:907:6d21:b0:a99:f3ab:c58d with SMTP id a640c23a62f3a-a9a69a7b37bmr1406055566b.16.1729589630216; Tue, 22 Oct 2024 02:33:50 -0700 (PDT) Received: from mail-ej1-f51.google.com (mail-ej1-f51.google.com. [209.85.218.51]) by smtp.gmail.com with ESMTPSA id a640c23a62f3a-a9a91559a1csm314135566b.125.2024.10.22.02.33.49 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 22 Oct 2024 02:33:49 -0700 (PDT) Received: by mail-ej1-f51.google.com with SMTP id a640c23a62f3a-a9a2209bd7fso725886866b.2 for ; Tue, 22 Oct 2024 02:33:49 -0700 (PDT) X-Forwarded-Encrypted: i=1; AJvYcCXIwjmCwX25/MLY0JCz4jXA8tzWdciaP8fZlujPfgDahCZYh6uTqdwwNLSrfOYZ/T/KFBA1mgudiA==@kvack.org X-Received: by 2002:a17:907:3ea8:b0:a9a:8a4:e079 with SMTP id a640c23a62f3a-a9a69bad3c8mr1494093966b.31.1729589629074; Tue, 22 Oct 2024 02:33:49 -0700 (PDT) MIME-Version: 1.0 References: <20241014105514.3206191-1-ryan.roberts@arm.com> <4623805.lGaqSPkdTl@skuld-framework> <09e480d7-3ef6-4352-a484-91733ad7d231@arm.com> <649d7aa6-4163-4969-ba14-777f0e9cddb1@arm.com> <872f1c9c-9fb2-4372-810d-abe5419c4bd8@arm.com> In-Reply-To: <872f1c9c-9fb2-4372-810d-abe5419c4bd8@arm.com> From: Neal Gompa Date: Tue, 22 Oct 2024 05:33:12 -0400 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [RFC PATCH v1 00/57] Boot-time page size selection for arm64 To: Ryan Roberts Cc: Eric Curtin , Andrew Morton , Anshuman Khandual , Ard Biesheuvel , Catalin Marinas , David Hildenbrand , Greg Marsden , Ivan Ivanov , Kalesh Singh , Marc Zyngier , Mark Rutland , Matthias Brugger , Miroslav Benes , Will Deacon , Hector Martin , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, asahi@lists.linux.dev Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Rspam-User: X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 7631B20015 X-Stat-Signature: 8dth43eanpc9oyqmpznetb1f4e4q3kob X-HE-Tag: 1729589625-394957 X-HE-Meta: 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 dFSM8E1g kOqyFBJNPiPP4mRkleUMHVJsPySWnyCG2+7qFnU1+ZxmYtRf3+qjzIsXp11Ojon9UkxJtDFO3hd9Spw1xtdnQwSUyZETIkKptUrPqY/35l1ezoED7wtORXcWoPpqRlhLkKRnh9S9RffCSlRFe0xUVyDRojU+0AN+nfxiuNFTV0DEvv2WmBWxBxiG7qQbzNBgJuGC7f2iUPb6eIkS2UwhUoSEDod/Z+cnlpXBnpNKi11wkOHucOew/LW6cxlyO3X2jtPVQ9gXej//oSj6mG483uwLHsfLAnIOCDsS2SfUw15//gJP3jlyahX8omKuGBWg+84lGOgaCZhvWJMZiJ0wKHtJA7M7wEqeHnOmGIuZSEIkLR6oQXRtsnYVDAQ== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Mon, Oct 21, 2024 at 11:02=E2=80=AFAM Ryan Roberts wrote: > > On 21/10/2024 14:49, Neal Gompa wrote: > > On Mon, Oct 21, 2024 at 7:51=E2=80=AFAM Ryan Roberts wrote: > >> > >> On 21/10/2024 12:32, Eric Curtin wrote: > >>> On Mon, 21 Oct 2024 at 12:09, Ryan Roberts wro= te: > >>>> > >>>> On 19/10/2024 16:47, Neal Gompa wrote: > >>>>> On Monday, October 14, 2024 6:55:11=E2=80=AFAM EDT Ryan Roberts wro= te: > >>>>>> Hi All, > >>>>>> > >>>>>> Patch bomb incoming... This covers many subsystems, so I've includ= ed a core > >>>>>> set of people on the full series and additionally included maintai= ners on > >>>>>> relevant patches. I haven't included those maintainers on this cov= er letter > >>>>>> since the numbers were far too big for it to work. But I've includ= ed a link > >>>>>> to this cover letter on each patch, so they can hopefully find the= ir way > >>>>>> here. For follow up submissions I'll break it up by subsystem, but= for now > >>>>>> thought it was important to show the full picture. > >>>>>> > >>>>>> This RFC series implements support for boot-time page size selecti= on within > >>>>>> the arm64 kernel. arm64 supports 3 base page sizes (4K, 16K, 64K),= but to > >>>>>> date, page size has been selected at compile-time, meaning the siz= e is > >>>>>> baked into a given kernel image. As use of larger-than-4K page siz= es become > >>>>>> more prevalent this starts to present a problem for distributions. > >>>>>> Boot-time page size selection enables the creation of a single ker= nel > >>>>>> image, which can be told which page size to use on the kernel comm= and line. > >>>>>> > >>>>>> Why is having an image-per-page size problematic? > >>>>>> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D > >>>>>> > >>>>>> Many traditional distros are now supporting both 4K and 64K. And t= his means > >>>>>> managing 2 kernel packages, along with drivers for each. For some,= it means > >>>>>> multiple installer flavours and multiple ISOs. All of this adds up= to a > >>>>>> less-than-ideal level of complexity. Additionally, Android now sup= ports 4K > >>>>>> and 16K kernels. I'm told having to explicitly manage their KABI f= or each > >>>>>> kernel is painful, and the extra flash space required for both ker= nel > >>>>>> images and the duplicated modules has been problematic. Boot-time = page size > >>>>>> selection solves all of this. > >>>>>> > >>>>>> Additionally, in starting to think about the longer term deploymen= t story > >>>>>> for D128 page tables, which Arm architecture now supports, a lot o= f the > >>>>>> same problems need to be solved, so this work sets us up nicely fo= r that. > >>>>>> > >>>>>> So what's the down side? > >>>>>> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D > >>>>>> > >>>>>> Well nothing's free; Various static allocations in the kernel imag= e must be > >>>>>> sized for the worst case (largest supported page size), so image s= ize is in > >>>>>> line with size of 64K compile-time image. So if you're interested = in 4K or > >>>>>> 16K, there is a slight increase to the image size. But I expect th= at > >>>>>> problem goes away if you're compressing the image - its just some = extra > >>>>>> zeros. At boot-time, I expect we could free the unused static stor= age once > >>>>>> we know the page size - although that would be a follow up enhance= ment. > >>>>>> > >>>>>> And then there is performance. Since PAGE_SIZE and friends are no = longer > >>>>>> compile-time constants, we must look up their values and do arithm= etic at > >>>>>> runtime instead of compile-time. My early perf testing suggests th= is is > >>>>>> inperceptible for real-world workloads, and only has small impact = on > >>>>>> microbenchmarks - more on this below. > >>>>>> > >>>>>> Approach > >>>>>> =3D=3D=3D=3D=3D=3D=3D=3D > >>>>>> > >>>>>> The basic idea is to rid the source of any assumptions that PAGE_S= IZE and > >>>>>> friends are compile-time constant, but in a way that allows the co= mpiler to > >>>>>> perform the same optimizations as was previously being done if the= y do turn > >>>>>> out to be compile-time constant. Where constants are required, we = use > >>>>>> limits; PAGE_SIZE_MIN and PAGE_SIZE_MAX. See commit log in patch 1= for full > >>>>>> description of all the classes of problems to solve. > >>>>>> > >>>>>> By default PAGE_SIZE_MIN=3DPAGE_SIZE_MAX=3DPAGE_SIZE. But an arch = may opt-in to > >>>>>> boot-time page size selection by defining PAGE_SIZE_MIN & PAGE_SIZ= E_MAX. > >>>>>> arm64 does this if the user selects the CONFIG_ARM64_BOOT_TIME_PAG= E_SIZE > >>>>>> Kconfig, which is an alternative to selecting a compile-time page = size. > >>>>>> > >>>>>> When boot-time page size is active, the arch pgtable geometry macr= o > >>>>>> definitions resolve to something that can be configured at boot. T= he arm64 > >>>>>> implementation in this series mainly uses global, __ro_after_init > >>>>>> variables. I've tried using alternatives patching, but that perfor= ms worse > >>>>>> than loading from memory; I think due to code size bloat. > >>>>>> > >>>>>> Status > >>>>>> =3D=3D=3D=3D=3D=3D > >>>>>> > >>>>>> When CONFIG_ARM64_BOOT_TIME_PAGE_SIZE is selected, I've only imple= mented > >>>>>> enough to compile the kernel image itself with defconfig (and a fe= w other > >>>>>> bits and pieces). This is enough to build a kernel that can boot u= nder QEMU > >>>>>> or FVP. I'll happily do the rest of the work to enable all the ext= ra > >>>>>> drivers, but wanted to get feedback on the shape of this effort fi= rst. If > >>>>>> anyone wants to do any testing, and has a must-have config, let me= know and > >>>>>> I'll prioritize enabling it first. > >>>>>> > >>>>>> The series is arranged as follows: > >>>>>> > >>>>>> - patch 1: Add macros required for converting non-arch code t= o support > >>>>>> boot-time page size selection > >>>>>> - patches 2-36: Remove PAGE_SIZE compile-time constant assumpti= on from > >>>>>> all non-arch code > >>>>>> - patches 37-38: Some arm64 tidy ups > >>>>>> - patch 39: Add macros required for converting arm64 c= ode to > >>>>> support > >>>>>> boot-time page size selection > >>>>>> - patches 40-56: arm64 changes to support boot-time page size se= lection > >>>>>> - patch 57: Add arm64 Kconfig option to enable boot-ti= me page > >>>>> size > >>>>>> selection > >>>>>> > >>>>>> Ideally, I'd like to get the basics merged (something like this se= ries), > >>>>>> then incrementally improve it over a handful of kernel releases un= til we > >>>>>> can demonstrate that we have feature parity with the compile-time = build and > >>>>>> no performance blockers. Once at that point, ideally the compile-t= ime build > >>>>>> options would be removed and the code could be cleaned up further. > >>>>>> > >>>>>> One of the bigger peices that I'd propose to add as a follow up, i= s to make > >>>>>> va-size boot-time selectable too. That will greatly simplify LPA2 = fallback > >>>>>> handling. > >>>>>> > >>>>>> Assuming people are ammenable to the rough shape, how would I go a= bout > >>>>>> getting the non-arch changes merged? Since they cover many subsyst= ems, will > >>>>>> each piece need to go independently to each relevant maintainer or= could it > >>>>>> all be merged together through the arm64 tree? > >>>>>> > >>>>>> Image Size > >>>>>> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > >>>>>> > >>>>>> The below shows the size of a defconfig (+ xfs, squashfs, ftrace, = kprobes) > >>>>>> kernel image on disk for base (before any changes applied), compil= e (with > >>>>>> changes, configured for compile-time page size) and boot (with cha= nges, > >>>>>> configured for boot-time page size). > >>>>>> > >>>>>> You can see the that compile-16k and 64k configs are actually slig= htly > >>>>>> smaller than the baselines; that's due to optimizing some buffer s= izes > >>>>>> which didn't need to depend on page size during the series. The bo= ot-time > >>>>>> image is ~1% bigger than the 64k compile-time image. I believe the= re is > >>>>>> scope to improve this to make it > >>>>>> equal to compile-64k if required: > >>>>>> | config | size/KB | diff/KB | diff/% | > >>>>>> | > >>>>>> |-------------|---------|---------|---------| > >>>>>> | > >>>>>> | base-4k | 54895 | 0 | 0.0% | > >>>>>> | base-16k | 55161 | 266 | 0.5% | > >>>>>> | base-64k | 56775 | 1880 | 3.4% | > >>>>>> | compile-4k | 54895 | 0 | 0.0% | > >>>>>> | compile-16k | 55097 | 202 | 0.4% | > >>>>>> | compile-64k | 56391 | 1496 | 2.7% | > >>>>>> | boot-4K | 57045 | 2150 | 3.9% | > >>>>>> > >>>>>> And below shows the size of the image in memory at run-time, separ= ated for > >>>>>> text and data costs. The boot image has ~1% text cost; most likely= due to > >>>>>> the fact that PAGE_SIZE and friends are not compile-time constants= so need > >>>>>> instructions to load the values and do arithmetic. I believe we co= uld > >>>>>> eventually get the data cost to match the cost for the compile ima= ge for > >>>>>> the chosen page size by freeing > >>>>>> the ends of the static buffers not needed for the selected page si= ze: > >>>>>> | | text | text | text | data | data | = data | > >>>>>> | > >>>>>> | config | size/KB | diff/KB | diff/% | size/KB | diff/KB | = diff/% | > >>>>>> | > >>>>>> |-------------|---------|---------|---------|---------|---------|-= --------| > >>>>>> | > >>>>>> | base-4k | 20561 | 0 | 0.0% | 14314 | 0 | = 0.0% | > >>>>>> | base-16k | 20439 | -122 | -0.6% | 14625 | 311 | = 2.2% | > >>>>>> | base-64k | 20435 | -126 | -0.6% | 15673 | 1359 | = 9.5% | > >>>>>> | compile-4k | 20565 | 4 | 0.0% | 14315 | 1 | = 0.0% | > >>>>>> | compile-16k | 20443 | -118 | -0.6% | 14517 | 204 | = 1.4% | > >>>>>> | compile-64k | 20439 | -122 | -0.6% | 15134 | 820 | = 5.7% | > >>>>>> | boot-4K | 20811 | 250 | 1.2% | 15287 | 973 | = 6.8% | > >>>>>> > >>>>>> Functional Testing > >>>>>> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > >>>>>> > >>>>>> I've build-tested defconfig for all arches supported by tuxmake (w= hich is > >>>>>> most) without issue. > >>>>>> > >>>>>> I've boot-tested arm64 with CONFIG_ARM64_BOOT_TIME_PAGE_SIZE for a= ll page > >>>>>> sizes and a few va-sizes, and additionally have run all the mm-sel= ftests, > >>>>>> with no regressions observed vs the equivalent compile-time page s= ize build > >>>>>> (although the mm-selftests have a few existing failures when run a= gainst > >>>>>> 16K and 64K kernels - those should really be investigated and fixe= d > >>>>>> independently). > >>>>>> > >>>>>> Test coverage is lacking for many of the drivers that I've touched= , but in > >>>>>> many cases, I'm hoping the changes are simple enough that review m= ight > >>>>>> suffice? > >>>>>> > >>>>>> Performance Testing > >>>>>> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > >>>>>> > >>>>>> I've run some limited performance benchmarks: > >>>>>> > >>>>>> First, a real-world benchmark that causes a lot of page table mani= pulation > >>>>>> (and therefore we would expect to see regression here if we are go= ing to > >>>>>> see it anywhere); kernel compilation. It barely registers a change= . Values > >>>>>> are times, > >>>>>> so smaller is better. All relative to base-4k: > >>>>>> | | kern | kern | user | user | real | = real | > >>>>>> | > >>>>>> | config | mean | stdev | mean | stdev | mean | = stdev | > >>>>>> | > >>>>>> |-------------|---------|---------|---------|---------|---------|-= --------| > >>>>>> | > >>>>>> | base-4k | 0.0% | 1.1% | 0.0% | 0.3% | 0.0% | = 0.3% | > >>>>>> | compile-4k | -0.2% | 1.1% | -0.2% | 0.3% | -0.1% | = 0.3% | > >>>>>> | boot-4k | 0.1% | 1.0% | -0.3% | 0.2% | -0.2% | = 0.2% | > >>>>>> > >>>>>> The Speedometer JavaScript benchmark also shows no change. Values = are runs > >>>>>> per > >>>>>> min, so bigger is better. All relative to base-4k: > >>>>>> | config | mean | stdev | > >>>>>> | > >>>>>> |-------------|---------|---------| > >>>>>> | > >>>>>> | base-4k | 0.0% | 0.8% | > >>>>>> | compile-4k | 0.4% | 0.8% | > >>>>>> | boot-4k | 0.0% | 0.9% | > >>>>>> > >>>>>> Finally, I've run some microbenchmarks known to stress page table > >>>>>> manipulations (originally from David Hildenbrand). The fork test > >>>>>> maps/allocs 1G of anon memory, then measures the cost of fork(). T= he munmap > >>>>>> test maps/allocs 1G of anon memory then measures the cost of munma= p()ing > >>>>>> it. The fork test is known to be extremely sensitive to any change= s that > >>>>>> cause instructions to be aligned differently in cachelines. When u= sing this > >>>>>> test for other changes, I've seen double digit regressions for the > >>>>>> slightest thing, so 12% regression on this test is actually fairly= good. > >>>>>> This likely represents the extreme worst case for regressions that= will be > >>>>>> observed across other microbenchmarks (famous last > >>>>>> words). Values are times, so smaller is better. All relative to ba= se-4k: > >>>>>> | | fork | fork | munmap | munmap | > >>>>>> | > >>>>>> | config | mean | stdev | stdev | stdev | > >>>>>> | > >>>>>> |-------------|---------|---------|---------|---------| > >>>>>> | > >>>>>> | base-4k | 0.0% | 1.3% | 0.0% | 0.3% | > >>>>>> | compile-4k | 0.1% | 1.3% | -0.9% | 0.1% | > >>>>>> | boot-4k | 12.8% | 1.2% | 3.8% | 1.0% | > >>>>>> > >>>>>> NOTE: The series applies on top of v6.11. > >>>>>> > >>>>>> Thanks, > >>>>>> Ryan > >>>>>> > >>>>>> > >>>>>> Ryan Roberts (57): > >>>>>> mm: Add macros ahead of supporting boot-time page size selection > >>>>>> vmlinux: Align to PAGE_SIZE_MAX > >>>>>> mm/memcontrol: Fix seq_buf size to save memory when PAGE_SIZE is= large > >>>>>> mm/page_alloc: Make page_frag_cache boot-time page size compatib= le > >>>>>> mm: Avoid split pmd ptl if pmd level is run-time folded > >>>>>> mm: Remove PAGE_SIZE compile-time constant assumption > >>>>>> fs: Introduce MAX_BUF_PER_PAGE_SIZE_MAX for array sizing > >>>>>> fs: Remove PAGE_SIZE compile-time constant assumption > >>>>>> fs/nfs: Remove PAGE_SIZE compile-time constant assumption > >>>>>> fs/ext4: Remove PAGE_SIZE compile-time constant assumption > >>>>>> fork: Permit boot-time THREAD_SIZE determination > >>>>>> cgroup: Remove PAGE_SIZE compile-time constant assumption > >>>>>> bpf: Remove PAGE_SIZE compile-time constant assumption > >>>>>> pm/hibernate: Remove PAGE_SIZE compile-time constant assumption > >>>>>> stackdepot: Remove PAGE_SIZE compile-time constant assumption > >>>>>> perf: Remove PAGE_SIZE compile-time constant assumption > >>>>>> kvm: Remove PAGE_SIZE compile-time constant assumption > >>>>>> trace: Remove PAGE_SIZE compile-time constant assumption > >>>>>> crash: Remove PAGE_SIZE compile-time constant assumption > >>>>>> crypto: Remove PAGE_SIZE compile-time constant assumption > >>>>>> sunrpc: Remove PAGE_SIZE compile-time constant assumption > >>>>>> sound: Remove PAGE_SIZE compile-time constant assumption > >>>>>> net: Remove PAGE_SIZE compile-time constant assumption > >>>>>> net: fec: Remove PAGE_SIZE compile-time constant assumption > >>>>>> net: marvell: Remove PAGE_SIZE compile-time constant assumption > >>>>>> net: hns3: Remove PAGE_SIZE compile-time constant assumption > >>>>>> net: e1000: Remove PAGE_SIZE compile-time constant assumption > >>>>>> net: igbvf: Remove PAGE_SIZE compile-time constant assumption > >>>>>> net: igb: Remove PAGE_SIZE compile-time constant assumption > >>>>>> drivers/base: Remove PAGE_SIZE compile-time constant assumption > >>>>>> edac: Remove PAGE_SIZE compile-time constant assumption > >>>>>> optee: Remove PAGE_SIZE compile-time constant assumption > >>>>>> random: Remove PAGE_SIZE compile-time constant assumption > >>>>>> sata_sil24: Remove PAGE_SIZE compile-time constant assumption > >>>>>> virtio: Remove PAGE_SIZE compile-time constant assumption > >>>>>> xen: Remove PAGE_SIZE compile-time constant assumption > >>>>>> arm64: Fix macros to work in C code in addition to the linker sc= ript > >>>>>> arm64: Track early pgtable allocation limit > >>>>>> arm64: Introduce macros required for boot-time page selection > >>>>>> arm64: Refactor early pgtable size calculation macros > >>>>>> arm64: Pass desired page size on command line > >>>>>> arm64: Divorce early init from PAGE_SIZE > >>>>>> arm64: Clean up simple cases of CONFIG_ARM64_*K_PAGES > >>>>>> arm64: Align sections to PAGE_SIZE_MAX > >>>>>> arm64: Rework trampoline rodata mapping > >>>>>> arm64: Generalize fixmap for boot-time page size > >>>>>> arm64: Statically allocate and align for worst-case page size > >>>>>> arm64: Convert switch to if for non-const comparison values > >>>>>> arm64: Convert BUILD_BUG_ON to VM_BUG_ON > >>>>>> arm64: Remove PAGE_SZ asm-offset > >>>>>> arm64: Introduce cpu features for page sizes > >>>>>> arm64: Remove PAGE_SIZE from assembly code > >>>>>> arm64: Runtime-fold pmd level > >>>>>> arm64: Support runtime folding in idmap_kpti_install_ng_mappings > >>>>>> arm64: TRAMP_VALIAS is no longer compile-time constant > >>>>>> arm64: Determine THREAD_SIZE at boot-time > >>>>>> arm64: Enable boot-time page size selection > >>>>>> > >>>>>> arch/alpha/include/asm/page.h | 1 + > >>>>>> arch/arc/include/asm/page.h | 1 + > >>>>>> arch/arm/include/asm/page.h | 1 + > >>>>>> arch/arm64/Kconfig | 26 ++- > >>>>>> arch/arm64/include/asm/assembler.h | 78 ++++++- > >>>>>> arch/arm64/include/asm/cpufeature.h | 44 +++- > >>>>>> arch/arm64/include/asm/efi.h | 2 +- > >>>>>> arch/arm64/include/asm/fixmap.h | 28 ++- > >>>>>> arch/arm64/include/asm/kernel-pgtable.h | 150 +++++++++---- > >>>>>> arch/arm64/include/asm/kvm_arm.h | 21 +- > >>>>>> arch/arm64/include/asm/kvm_hyp.h | 11 + > >>>>>> arch/arm64/include/asm/kvm_pgtable.h | 6 +- > >>>>>> arch/arm64/include/asm/memory.h | 62 ++++-- > >>>>>> arch/arm64/include/asm/page-def.h | 3 +- > >>>>>> arch/arm64/include/asm/pgalloc.h | 16 +- > >>>>>> arch/arm64/include/asm/pgtable-geometry.h | 46 ++++ > >>>>>> arch/arm64/include/asm/pgtable-hwdef.h | 28 ++- > >>>>>> arch/arm64/include/asm/pgtable-prot.h | 2 +- > >>>>>> arch/arm64/include/asm/pgtable.h | 133 +++++++++--- > >>>>>> arch/arm64/include/asm/processor.h | 10 +- > >>>>>> arch/arm64/include/asm/sections.h | 1 + > >>>>>> arch/arm64/include/asm/smp.h | 1 + > >>>>>> arch/arm64/include/asm/sparsemem.h | 15 +- > >>>>>> arch/arm64/include/asm/sysreg.h | 54 +++-- > >>>>>> arch/arm64/include/asm/tlb.h | 3 + > >>>>>> arch/arm64/kernel/asm-offsets.c | 4 +- > >>>>>> arch/arm64/kernel/cpufeature.c | 93 ++++++-- > >>>>>> arch/arm64/kernel/efi.c | 2 +- > >>>>>> arch/arm64/kernel/entry.S | 60 +++++- > >>>>>> arch/arm64/kernel/head.S | 46 +++- > >>>>>> arch/arm64/kernel/hibernate-asm.S | 6 +- > >>>>>> arch/arm64/kernel/image-vars.h | 14 ++ > >>>>>> arch/arm64/kernel/image.h | 4 + > >>>>>> arch/arm64/kernel/pi/idreg-override.c | 68 +++++- > >>>>>> arch/arm64/kernel/pi/map_kernel.c | 165 ++++++++++---= - > >>>>>> arch/arm64/kernel/pi/map_range.c | 201 +++++++++++++= +++-- > >>>>>> arch/arm64/kernel/pi/pi.h | 63 +++++- > >>>>>> arch/arm64/kernel/relocate_kernel.S | 10 +- > >>>>>> arch/arm64/kernel/vdso-wrap.S | 4 +- > >>>>>> arch/arm64/kernel/vdso.c | 7 +- > >>>>>> arch/arm64/kernel/vdso/vdso.lds.S | 4 +- > >>>>>> arch/arm64/kernel/vdso32-wrap.S | 4 +- > >>>>>> arch/arm64/kernel/vdso32/vdso.lds.S | 4 +- > >>>>>> arch/arm64/kernel/vmlinux.lds.S | 48 +++-- > >>>>>> arch/arm64/kvm/arm.c | 10 + > >>>>>> arch/arm64/kvm/hyp/nvhe/Makefile | 1 + > >>>>>> arch/arm64/kvm/hyp/nvhe/host.S | 10 +- > >>>>>> arch/arm64/kvm/hyp/nvhe/hyp.lds.S | 4 +- > >>>>>> arch/arm64/kvm/hyp/nvhe/pgtable-geometry.c | 16 ++ > >>>>>> arch/arm64/kvm/mmu.c | 39 ++-- > >>>>>> arch/arm64/lib/clear_page.S | 7 +- > >>>>>> arch/arm64/lib/copy_page.S | 33 ++- > >>>>>> arch/arm64/lib/mte.S | 27 ++- > >>>>>> arch/arm64/mm/Makefile | 1 + > >>>>>> arch/arm64/mm/fixmap.c | 38 ++-- > >>>>>> arch/arm64/mm/hugetlbpage.c | 40 +--- > >>>>>> arch/arm64/mm/init.c | 26 +-- > >>>>>> arch/arm64/mm/kasan_init.c | 8 +- > >>>>>> arch/arm64/mm/mmu.c | 53 +++-- > >>>>>> arch/arm64/mm/pgd.c | 12 +- > >>>>>> arch/arm64/mm/pgtable-geometry.c | 24 +++ > >>>>>> arch/arm64/mm/proc.S | 128 ++++++++--- > >>>>>> arch/arm64/mm/ptdump.c | 3 +- > >>>>>> arch/arm64/tools/cpucaps | 3 + > >>>>>> arch/csky/include/asm/page.h | 3 + > >>>>>> arch/hexagon/include/asm/page.h | 2 + > >>>>>> arch/loongarch/include/asm/page.h | 2 + > >>>>>> arch/m68k/include/asm/page.h | 1 + > >>>>>> arch/microblaze/include/asm/page.h | 1 + > >>>>>> arch/mips/include/asm/page.h | 1 + > >>>>>> arch/nios2/include/asm/page.h | 2 + > >>>>>> arch/openrisc/include/asm/page.h | 1 + > >>>>>> arch/parisc/include/asm/page.h | 1 + > >>>>>> arch/powerpc/include/asm/page.h | 2 + > >>>>>> arch/riscv/include/asm/page.h | 1 + > >>>>>> arch/s390/include/asm/page.h | 1 + > >>>>>> arch/sh/include/asm/page.h | 1 + > >>>>>> arch/sparc/include/asm/page.h | 3 + > >>>>>> arch/um/include/asm/page.h | 2 + > >>>>>> arch/x86/include/asm/page_types.h | 2 + > >>>>>> arch/xtensa/include/asm/page.h | 1 + > >>>>>> crypto/lskcipher.c | 4 +- > >>>>>> drivers/ata/sata_sil24.c | 46 ++-- > >>>>>> drivers/base/node.c | 6 +- > >>>>>> drivers/base/topology.c | 32 +-- > >>>>>> drivers/block/virtio_blk.c | 2 +- > >>>>>> drivers/char/random.c | 4 +- > >>>>>> drivers/edac/edac_mc.h | 13 +- > >>>>>> drivers/firmware/efi/libstub/arm64.c | 3 +- > >>>>>> drivers/irqchip/irq-gic-v3-its.c | 2 +- > >>>>>> drivers/mtd/mtdswap.c | 4 +- > >>>>>> drivers/net/ethernet/freescale/fec.h | 3 +- > >>>>>> drivers/net/ethernet/freescale/fec_main.c | 5 +- > >>>>>> .../net/ethernet/hisilicon/hns3/hns3_enet.h | 4 +- > >>>>>> drivers/net/ethernet/intel/e1000/e1000_main.c | 6 +- > >>>>>> drivers/net/ethernet/intel/igb/igb.h | 25 +-- > >>>>>> drivers/net/ethernet/intel/igb/igb_main.c | 149 +++++++------ > >>>>>> drivers/net/ethernet/intel/igbvf/netdev.c | 6 +- > >>>>>> drivers/net/ethernet/marvell/mvneta.c | 9 +- > >>>>>> drivers/net/ethernet/marvell/sky2.h | 2 +- > >>>>>> drivers/tee/optee/call.c | 7 +- > >>>>>> drivers/tee/optee/smc_abi.c | 2 +- > >>>>>> drivers/virtio/virtio_balloon.c | 10 +- > >>>>>> drivers/xen/balloon.c | 11 +- > >>>>>> drivers/xen/biomerge.c | 12 +- > >>>>>> drivers/xen/privcmd.c | 2 +- > >>>>>> drivers/xen/xenbus/xenbus_client.c | 5 +- > >>>>>> drivers/xen/xlate_mmu.c | 6 +- > >>>>>> fs/binfmt_elf.c | 11 +- > >>>>>> fs/buffer.c | 2 +- > >>>>>> fs/coredump.c | 8 +- > >>>>>> fs/ext4/ext4.h | 36 ++-- > >>>>>> fs/ext4/move_extent.c | 2 +- > >>>>>> fs/ext4/readpage.c | 2 +- > >>>>>> fs/fat/dir.c | 4 +- > >>>>>> fs/fat/fatent.c | 4 +- > >>>>>> fs/nfs/nfs42proc.c | 2 +- > >>>>>> fs/nfs/nfs42xattr.c | 2 +- > >>>>>> fs/nfs/nfs4proc.c | 2 +- > >>>>>> include/asm-generic/pgtable-geometry.h | 71 +++++++ > >>>>>> include/asm-generic/vmlinux.lds.h | 38 ++-- > >>>>>> include/linux/buffer_head.h | 1 + > >>>>>> include/linux/cpumask.h | 5 + > >>>>>> include/linux/linkage.h | 4 +- > >>>>>> include/linux/mm.h | 17 +- > >>>>>> include/linux/mm_types.h | 15 +- > >>>>>> include/linux/mm_types_task.h | 2 +- > >>>>>> include/linux/mmzone.h | 3 +- > >>>>>> include/linux/netlink.h | 6 +- > >>>>>> include/linux/percpu-defs.h | 4 +- > >>>>>> include/linux/perf_event.h | 2 +- > >>>>>> include/linux/sched.h | 4 +- > >>>>>> include/linux/slab.h | 7 +- > >>>>>> include/linux/stackdepot.h | 6 +- > >>>>>> include/linux/sunrpc/svc.h | 8 +- > >>>>>> include/linux/sunrpc/svc_rdma.h | 4 +- > >>>>>> include/linux/sunrpc/svcsock.h | 2 +- > >>>>>> include/linux/swap.h | 17 +- > >>>>>> include/linux/swapops.h | 6 +- > >>>>>> include/linux/thread_info.h | 10 +- > >>>>>> include/xen/page.h | 2 + > >>>>>> init/main.c | 7 +- > >>>>>> kernel/bpf/core.c | 9 +- > >>>>>> kernel/bpf/ringbuf.c | 54 ++--- > >>>>>> kernel/cgroup/cgroup.c | 8 +- > >>>>>> kernel/crash_core.c | 2 +- > >>>>>> kernel/events/core.c | 2 +- > >>>>>> kernel/fork.c | 71 +++---- > >>>>>> kernel/power/power.h | 2 +- > >>>>>> kernel/power/snapshot.c | 2 +- > >>>>>> kernel/power/swap.c | 129 +++++++++-- > >>>>>> kernel/trace/fgraph.c | 2 +- > >>>>>> kernel/trace/trace.c | 2 +- > >>>>>> lib/stackdepot.c | 6 +- > >>>>>> mm/kasan/report.c | 3 +- > >>>>>> mm/memcontrol.c | 11 +- > >>>>>> mm/memory.c | 4 +- > >>>>>> mm/mmap.c | 2 +- > >>>>>> mm/page-writeback.c | 2 +- > >>>>>> mm/page_alloc.c | 31 +-- > >>>>>> mm/slub.c | 2 +- > >>>>>> mm/sparse.c | 2 +- > >>>>>> mm/swapfile.c | 2 +- > >>>>>> mm/vmalloc.c | 7 +- > >>>>>> net/9p/trans_virtio.c | 4 +- > >>>>>> net/core/hotdata.c | 4 +- > >>>>>> net/core/skbuff.c | 4 +- > >>>>>> net/core/sysctl_net_core.c | 2 +- > >>>>>> net/sunrpc/cache.c | 3 +- > >>>>>> net/unix/af_unix.c | 2 +- > >>>>>> sound/soc/soc-utils.c | 4 +- > >>>>>> virt/kvm/kvm_main.c | 2 +- > >>>>>> 172 files changed, 2185 insertions(+), 951 deletions(-) > >>>>>> create mode 100644 arch/arm64/include/asm/pgtable-geometry.h > >>>>>> create mode 100644 arch/arm64/kvm/hyp/nvhe/pgtable-geometry.c > >>>>>> create mode 100644 arch/arm64/mm/pgtable-geometry.c > >>>>>> create mode 100644 include/asm-generic/pgtable-geometry.h > >>>>>> > >>>>>> -- > >>>>>> 2.43.0 > >>>>> > >>>>> This is a generally very exciting patch set! I'm looking forward to= seeing it > >>>>> land so I can take advantage of it for Fedora ARM and Fedora Asahi = Remix. > >>>>> > >>>>> That said, I have a couple of questions: > >>>>> > >>>>> * Going forward, how would we handle drivers/modules that require a= particular > >>>>> page size? For example, the Apple Silicon IOMMU driver code require= s the > >>>>> kernel to operate in 16k page size mode, and it would need to be di= sabled in > >>>>> other page sizes. > >>>> > >>>> I think these drivers would want to check PAGE_SIZE at probe time an= d fail if an > >>>> unsupported page size is in use. Do you see any issue with that? > >>>> > >>>>> > >>>>> * How would we handle an invalid selection at boot? > >>>> > >>>> What do you mean by invalid here? The current policy validates that = the > >>>> requested page size is supported by the HW by checking mmfr0. If no = page size is > >>>> passed on the command line, or the passed value is not supported by = the HW, then > >>>> the we default to the largest page size supported by the HW (so for = Apple > >>>> Silicon that would be 16k since the HW doesn't support 64k). Althoug= h I think it > >>>> may be better to change that policy to use the smallest page size in= this case; > >>>> 4k is the safer bet for compat and will waste much less memory than = 64k. > >>>> > >>>>> Can we program in a > >>>>> fallback when the "wrong" mode is selected for a chip or something = similar? > >>>> > >>>> Do you mean effectively add a machanism to force 16k if the detected= HW is Apple > >>>> Silicon? The trouble is that we need to select the page size, very e= arly in > >>>> boot, before start_kernel() is called, so we really only have generi= c arch code > >>>> and the command line with which to make the decision. > >>> > >>> Yes... I think a build-time CONFIG for default page size, which can b= e > >>> overridden by a karg makes sense... Even on platforms like Apple > >>> Silicon you may want to test very specific things in 4k by overriding > >>> with a karg. > >> > >> Ahh, yes, that would certainly work. I'll work it into the next versio= n. > >> > > > > Could we maybe extend to have some kind of way to include a table of > > SoC IDs that certain modes are disabled (e.g. 64k on Apple Silicon) > > 64k is already disabled on Apple Silicon because mmfr0 reports that 64k i= s not > supported. > > > and preferred modes when no arg is set (16k for Apple Silicon)? That > > And it's not obvious that we should hard-code a page size preference to a= SoC > ID. If the CPU can support multiple page sizes, it should be up to the SW= stack > to decide, not the SoC. > > I'm guessing your desire is to have a single kernel build that will boot = 16k by > default on Apple Silicon and 4k by default on other systems, all without = needing > to modify the command line? Personally I think it's cleaner to just requi= re > setting the page size on the command line in these cases. > > > way it'd work something like this: > > > > 1. Table identification of 4/16/64 depending on identified SoC > So I'd prefer not to have this > > > 2. Unidentified ones follow build-time default > > 3. karg forces a mode regardless > But keep these 2. > I think it makes sense to have it, because it's not just Apple Silicon where such a preference/requirement may be necessary. Apple Silicon technically works at 4k, but is completely broken at 4k because Linux cannot do 16k IOMMU with 4k everything else, so being able to at least prefer 16k out of the box is important. And SoCs like the NVIDIA Grace Hopper platform prefer 64k over other options (though I am unaware of a gross incompatibility that effectively requires it like Apple Silicon has). When we're trying to get to "single generic image that works everywhere", stuff like this matters and I would really like you to consider it from the lens of "we want things to work as automagic as they do on x86". --=20 =E7=9C=9F=E5=AE=9F=E3=81=AF=E3=81=84=E3=81=A4=E3=82=82=E4=B8=80=E3=81=A4=EF= =BC=81/ Always, there's only one truth!