From: David Hildenbrand <david@redhat.com>
To: Usama Arif <usamaarif642@gmail.com>,
Andrew Morton <akpm@linux-foundation.org>,
linux-mm@kvack.org
Cc: linux-fsdevel@vger.kernel.org, corbet@lwn.net, rppt@kernel.org,
surenb@google.com, mhocko@suse.com, hannes@cmpxchg.org,
baohua@kernel.org, shakeel.butt@linux.dev, riel@surriel.com,
ziy@nvidia.com, laoar.shao@gmail.com, dev.jain@arm.com,
baolin.wang@linux.alibaba.com, npache@redhat.com,
lorenzo.stoakes@oracle.com, Liam.Howlett@oracle.com,
ryan.roberts@arm.com, vbabka@suse.cz, jannh@google.com,
Arnd Bergmann <arnd@arndb.de>,
sj@kernel.org, linux-kernel@vger.kernel.org,
linux-doc@vger.kernel.org, kernel-team@meta.com
Subject: Re: [PATCH v2 4/5] selftests: prctl: introduce tests for disabling THPs completely
Date: Thu, 31 Jul 2025 21:42:30 +0200 [thread overview]
Message-ID: <7b13d8b5-a534-47f8-b6c5-09a65bffc691@redhat.com> (raw)
In-Reply-To: <20250731122825.2102184-5-usamaarif642@gmail.com>
On 31.07.25 14:27, Usama Arif wrote:
> The test will set the global system THP setting to never, madvise
> or always depending on the fixture variant and the 2M setting to
> inherit before it starts (and reset to original at teardown).
>
> This tests if the process can:
> - successfully set and get the policy to disable THPs completely.
> - never get a hugepage when the THPs are completely disabled
> with the prctl, including with MADV_HUGE and MADV_COLLAPSE.
> - successfully reset the policy of the process.
> - after reset, only get hugepages with:
> - MADV_COLLAPSE when policy is set to never.
> - MADV_HUGE and MADV_COLLAPSE when policy is set to madvise.
> - always when policy is set to "always".
> - repeat the above tests in a forked process to make sure
> the policy is carried across forks.
>
> Signed-off-by: Usama Arif <usamaarif642@gmail.com>
> ---
[...]
Looks much better already. Some quirks.
> +#include <stdio.h>
> +#include <stdlib.h>
> +#include <string.h>
> +#include <unistd.h>
> +#include <sys/mman.h>
> +#include <sys/prctl.h>
> +#include <sys/wait.h>
> +
> +#include "../kselftest_harness.h"
> +#include "thp_settings.h"
> +#include "vm_util.h"
> +
> +static int sz2ord(size_t size, size_t pagesize)
> +{
> + return __builtin_ctzll(size / pagesize);
> +}
> +
> +enum thp_collapse_type {
> + THP_COLLAPSE_NONE,
> + THP_COLLAPSE_MADV_HUGEPAGE, /* MADV_HUGEPAGE before access */
> + THP_COLLAPSE_MADV_COLLAPSE, /* MADV_COLLAPSE after access */
> +};
> +
> +enum thp_policy {
> + THP_POLICY_NEVER,
> + THP_POLICY_MADVISE,
> + THP_POLICY_ALWAYS,
> +};
Couldn't you have reused "enum thp_enabled" end simply never specified
the "THP_INHERIT"? Then, you need to do less translation.
> +
> +struct test_results {
> + int prctl_get_thp_disable;
The result is always one, does that here make sense?
> + int prctl_applied_collapse_none;
"prctl_applied" is a bit confusing. And most of these always have the
same value.
Can't we special case the remaining two cases on the current policy and
avoid this struct compeltely?
> + int prctl_applied_collapse_madv_huge;
> + int prctl_applied_collapse_madv_collapse;
> + int prctl_removed_collapse_none;
> + int prctl_removed_collapse_madv_huge;
> + int prctl_removed_collapse_madv_collapse;
> +};
> +
> +/*
> + * Function to mmap a buffer, fault it in, madvise it appropriately (before
> + * page fault for MADV_HUGE, and after for MADV_COLLAPSE), and check if the
> + * mmap region is huge.
> + * Returns:
> + * 0 if test doesn't give hugepage
> + * 1 if test gives a hugepage
> + * -errno if mmap fails
> + */
> +static int test_mmap_thp(enum thp_collapse_type madvise_buf, size_t pmdsize)
> +{
> + char *mem, *mmap_mem;
> + size_t mmap_size;
> + int ret;
> +
> + /* For alignment purposes, we need twice the THP size. */
> + mmap_size = 2 * pmdsize;
> + mmap_mem = (char *)mmap(NULL, mmap_size, PROT_READ | PROT_WRITE,
> + MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
> + if (mmap_mem == MAP_FAILED)
> + return -errno;
> +
> + /* We need a THP-aligned memory area. */
> + mem = (char *)(((uintptr_t)mmap_mem + pmdsize) & ~(pmdsize - 1));
> +
> + if (madvise_buf == THP_COLLAPSE_MADV_HUGEPAGE)
> + madvise(mem, pmdsize, MADV_HUGEPAGE);
> +
> + /* Ensure memory is allocated */
> + memset(mem, 1, pmdsize);
> +
> + if (madvise_buf == THP_COLLAPSE_MADV_COLLAPSE)
> + madvise(mem, pmdsize, MADV_COLLAPSE);
> +
To avoid even mmap_mem to get merged with some other VMA, maybe just do
before reading the smap here:
/* HACK: make sure we have a separate VMA that we can check reliably. */
mprotect(mem, pmdsize, PROT_READ);
or
madvise(mem, pmdsize, MADV_DONTFORK);
before reading smaps.
That is probably the easiest approach. The you can drop the lengthy
comment and perform a single thp check.
[...]
> +
> +static void prctl_thp_disable_test(struct __test_metadata *const _metadata,
> + size_t pmdsize, struct test_results *results)
> +{
> +
> + ASSERT_EQ(prctl(PR_GET_THP_DISABLE, NULL, NULL, NULL, NULL),
> + results->prctl_get_thp_disable);
> +
> + /* tests after prctl overrides global policy */
> + ASSERT_EQ(test_mmap_thp(THP_COLLAPSE_NONE, pmdsize),
> + results->prctl_applied_collapse_none);
> +
> + ASSERT_EQ(test_mmap_thp(THP_COLLAPSE_MADV_HUGEPAGE, pmdsize),
> + results->prctl_applied_collapse_madv_huge);
> +
> + ASSERT_EQ(test_mmap_thp(THP_COLLAPSE_MADV_COLLAPSE, pmdsize),
> + results->prctl_applied_collapse_madv_collapse);
> +
> + /* Reset to global policy */
> + ASSERT_EQ(prctl(PR_SET_THP_DISABLE, 0, NULL, NULL, NULL), 0);
> +
> + /* tests after prctl is cleared, and only global policy is effective */
> + ASSERT_EQ(test_mmap_thp(THP_COLLAPSE_NONE, pmdsize),
> + results->prctl_removed_collapse_none);
> +
> + ASSERT_EQ(test_mmap_thp(THP_COLLAPSE_MADV_HUGEPAGE, pmdsize),
> + results->prctl_removed_collapse_madv_huge);
> +
> + ASSERT_EQ(test_mmap_thp(THP_COLLAPSE_MADV_COLLAPSE, pmdsize),
> + results->prctl_removed_collapse_madv_collapse);
> +}
> +
> +FIXTURE(prctl_thp_disable_completely)
> +{
> + struct thp_settings settings;
> + struct test_results results;
Is this "expected_results" ?
But again, hopefully we can remove that and instead just base it on the
polocy that we configured.
--
Cheers,
David / dhildenb
next prev parent reply other threads:[~2025-07-31 19:42 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-07-31 12:27 [PATCH v2 0/5] prctl: extend PR_SET_THP_DISABLE to only provide THPs when advised Usama Arif
2025-07-31 12:27 ` [PATCH v2 1/5] prctl: extend PR_SET_THP_DISABLE to optionally exclude VM_HUGEPAGE Usama Arif
2025-07-31 12:40 ` Lorenzo Stoakes
2025-07-31 13:12 ` Usama Arif
2025-07-31 13:18 ` Lorenzo Stoakes
2025-07-31 13:20 ` David Hildenbrand
2025-07-31 15:13 ` Zi Yan
2025-07-31 12:27 ` [PATCH v2 2/5] mm/huge_memory: convert "tva_flags" to "enum tva_type" for thp_vma_allowable_order*() Usama Arif
2025-07-31 14:00 ` Lorenzo Stoakes
2025-07-31 15:19 ` Zi Yan
2025-07-31 16:15 ` David Hildenbrand
2025-08-01 10:08 ` Lorenzo Stoakes
2025-07-31 19:20 ` Usama Arif
2025-08-01 10:12 ` Lorenzo Stoakes
2025-07-31 12:27 ` [PATCH v2 3/5] mm/huge_memory: treat MADV_COLLAPSE as an advise with PR_THP_DISABLE_EXCEPT_ADVISED Usama Arif
2025-07-31 14:38 ` Lorenzo Stoakes
2025-07-31 14:54 ` David Hildenbrand
2025-08-01 10:32 ` Lorenzo Stoakes
2025-08-01 11:26 ` Usama Arif
2025-07-31 12:27 ` [PATCH v2 4/5] selftests: prctl: introduce tests for disabling THPs completely Usama Arif
2025-07-31 19:42 ` David Hildenbrand [this message]
2025-08-01 11:42 ` Usama Arif
2025-08-01 12:53 ` David Hildenbrand
2025-07-31 12:27 ` [PATCH v2 5/5] selftests: prctl: introduce tests for disabling THPs except for madvise Usama Arif
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=7b13d8b5-a534-47f8-b6c5-09a65bffc691@redhat.com \
--to=david@redhat.com \
--cc=Liam.Howlett@oracle.com \
--cc=akpm@linux-foundation.org \
--cc=arnd@arndb.de \
--cc=baohua@kernel.org \
--cc=baolin.wang@linux.alibaba.com \
--cc=corbet@lwn.net \
--cc=dev.jain@arm.com \
--cc=hannes@cmpxchg.org \
--cc=jannh@google.com \
--cc=kernel-team@meta.com \
--cc=laoar.shao@gmail.com \
--cc=linux-doc@vger.kernel.org \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=lorenzo.stoakes@oracle.com \
--cc=mhocko@suse.com \
--cc=npache@redhat.com \
--cc=riel@surriel.com \
--cc=rppt@kernel.org \
--cc=ryan.roberts@arm.com \
--cc=shakeel.butt@linux.dev \
--cc=sj@kernel.org \
--cc=surenb@google.com \
--cc=usamaarif642@gmail.com \
--cc=vbabka@suse.cz \
--cc=ziy@nvidia.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).