From owner-freebsd-hackers@FreeBSD.ORG Wed Apr 10 17:49:29 2013 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 2D36ACF3; Wed, 10 Apr 2013 17:49:29 +0000 (UTC) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Received: from wojtek.tensor.gdynia.pl (wojtek.tensor.gdynia.pl [188.252.31.196]) by mx1.freebsd.org (Postfix) with ESMTP id AA6DEDEF; Wed, 10 Apr 2013 17:49:28 +0000 (UTC) Received: from wojtek.tensor.gdynia.pl (localhost [127.0.0.1]) by wojtek.tensor.gdynia.pl (8.14.6/8.14.5) with ESMTP id r3AHnAbO019445; Wed, 10 Apr 2013 19:49:10 +0200 (CEST) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Received: from localhost (wojtek@localhost) by wojtek.tensor.gdynia.pl (8.14.6/8.14.5/Submit) with ESMTP id r3AHn9gY019442; Wed, 10 Apr 2013 19:49:09 +0200 (CEST) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Date: Wed, 10 Apr 2013 19:49:09 +0200 (CEST) From: Wojciech Puchar To: John Baldwin Subject: Re: Multiple page size support on FreeBSD? In-Reply-To: <201304101006.13960.jhb@freebsd.org> Message-ID: References: <201304101006.13960.jhb@freebsd.org> User-Agent: Alpine 2.00 (BSF 1167 2008-08-23) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.2.7 (wojtek.tensor.gdynia.pl [127.0.0.1]); Wed, 10 Apr 2013 19:49:10 +0200 (CEST) Cc: freebsd-hackers@freebsd.org, Benjamin Kaduk , Sebastian Feld X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 10 Apr 2013 17:49:29 -0000 > How do your tests work? Do you examine PTEs directly to check for superpages > or are you relying on the vm.pmap.pde sysctls? the later. anyway - algorithm described on list - that heuristics detects consecutive page access doesn't really help the urgent case - RANDOM access to large amount of memory. sequential access will get minimal improvement. IMHO the only way that really make sens is to add options to madvise to give kernel information about usage.