[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20251015141716.887-1-laoar.shao@gmail.com>
Date: Wed, 15 Oct 2025 22:17:07 +0800
From: Yafang Shao <laoar.shao@...il.com>
To: akpm@...ux-foundation.org,
david@...hat.com,
ziy@...dia.com,
baolin.wang@...ux.alibaba.com,
lorenzo.stoakes@...cle.com,
Liam.Howlett@...cle.com,
npache@...hat.com,
ryan.roberts@....com,
dev.jain@....com,
hannes@...xchg.org,
usamaarif642@...il.com,
gutierrez.asier@...wei-partners.com,
willy@...radead.org,
ast@...nel.org,
daniel@...earbox.net,
andrii@...nel.org,
ameryhung@...il.com,
rientjes@...gle.com,
corbet@....net,
21cnbao@...il.com,
shakeel.butt@...ux.dev,
tj@...nel.org,
lance.yang@...ux.dev,
rdunlap@...radead.org
Cc: bpf@...r.kernel.org,
linux-mm@...ck.org,
linux-doc@...r.kernel.org,
linux-kernel@...r.kernel.org,
Yafang Shao <laoar.shao@...il.com>
Subject: [RFC PATCH v10 mm-new 0/9] mm, bpf: BPF-MM, BPF-THP
History
=======
RFC v1: fmod_ret based BPF-THP hook
https://lore.kernel.org/linux-mm/20250429024139.34365-1-laoar.shao@gmail.com/
RFC v2: struct_ops based BPF-THP hook
https://lore.kernel.org/linux-mm/20250520060504.20251-1-laoar.shao@gmail.com/
RFC v4: Get THP order with interface get_suggested_order()
https://lore.kernel.org/linux-mm/20250729091807.84310-1-laoar.shao@gmail.com/
v4->v9: Simplify the interface to:
unsigned long
bpf_hook_thp_get_orders(struct vm_area_struct *vma, enum tva_type type,
unsigned long orders);
https://lore.kernel.org/linux-mm/20250930055826.9810-1-laoar.shao@gmail.com/
v9->RFC v10: Scope BPF-THP to individual processes
The Design
==========
Scoping BPF-THP to cgroup is rejected
-------------------------------------
As explained by Gutierrez:
1. It breaks the cgroup hierarchy when 2 siblings have different THP policies
2. Cgroup was designed for resource management not for grouping processes and
tune those processes
3. We set a precedent for other people adding new flags to cgroup and
potentially polluting cgroups. We may end up with cgroups having tens of
different flags, making sysadmin's job more complex
The related links are:
https://lore.kernel.org/linux-mm/1940d681-94a6-48fb-b889-cd8f0b91b330@huawei-partners.com/
https://lore.kernel.org/linux-mm/20241030150851.GB706616@cmpxchg.org/
So we has to scope it to process.
Scoping BPF-THP to process
--------------------------
To eliminate potential conflicts among competing BPF-THP instances, we
enforce that each process is exclusively managed by a single BPF-THP. This
approach has received agreement from David. For context, see:
https://lore.kernel.org/linux-mm/3577f7fd-429a-49c5-973b-38174a67be15@redhat.com/
When registering a BPF-THP, we specify the PID of a target task. The
BPF-THP is then installed in the task's `mm_struct`
struct mm_struct {
struct bpf_thp_ops __rcu *thp_thp;
};
Inheritance Behavior:
- Existing child processes are unaffected
- Newly forked children inherit the BPF-THP from their parent
- The BPF-THP persists across execve() calls
A new linked list tracks all tasks managed by each BPF-THP instance:
- Newly managed tasks are added to the list
- Exiting tasks are automatically removed from the list
- During BPF-THP unregistration (e.g., when the BPF link is removed), all
managed tasks have their bpf_thp pointer set to NULL
- BPF-THP instances can be dynamically updated, with all tracked tasks
automatically migrating to the new version.
This design simplifies BPF-THP management in production environments by
providing clear lifecycle management and preventing conflicts between
multiple BPF-THP instances.
Any feedback is welcomed.
Future Work
===========
Introduce a global fallback mechanism to address shared resource management
limitations in process and cgroup-based methods:
https://lore.kernel.org/linux-mm/YwNold0GMOappUxc@slm.duckdns.org/
Yafang Shao (9):
mm: thp: remove vm_flags parameter from khugepaged_enter_vma()
mm: thp: remove vm_flags parameter from thp_vma_allowable_order()
mm: thp: add support for BPF based THP order selection
mm: thp: decouple THP allocation between swap and page fault paths
mm: thp: enable THP allocation exclusively through khugepaged
bpf: mark mm->owner as __safe_rcu_or_null
bpf: mark vma->vm_mm as __safe_trusted_or_null
selftests/bpf: add a simple BPF based THP policy
Documentation: add BPF-based THP policy management
Documentation/admin-guide/mm/transhuge.rst | 39 +++
MAINTAINERS | 3 +
fs/exec.c | 1 +
fs/proc/task_mmu.c | 3 +-
include/linux/huge_mm.h | 59 +++-
include/linux/khugepaged.h | 10 +-
include/linux/mm_types.h | 18 ++
kernel/bpf/verifier.c | 8 +
kernel/fork.c | 1 +
mm/Kconfig | 22 ++
mm/Makefile | 1 +
mm/huge_memory.c | 7 +-
mm/huge_memory_bpf.c | 306 ++++++++++++++++++
mm/khugepaged.c | 35 +-
mm/madvise.c | 7 +
mm/memory.c | 22 +-
mm/mmap.c | 1 +
mm/shmem.c | 2 +-
mm/vma.c | 6 +-
tools/testing/selftests/bpf/config | 3 +
.../selftests/bpf/prog_tests/thp_adjust.c | 245 ++++++++++++++
tools/testing/selftests/bpf/progs/lsm.c | 8 +-
.../selftests/bpf/progs/test_thp_adjust.c | 23 ++
23 files changed, 777 insertions(+), 53 deletions(-)
create mode 100644 mm/huge_memory_bpf.c
create mode 100644 tools/testing/selftests/bpf/prog_tests/thp_adjust.c
create mode 100644 tools/testing/selftests/bpf/progs/test_thp_adjust.c
--
2.47.3
Powered by blists - more mailing lists