Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp366181yba; Wed, 3 Apr 2019 10:10:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqw6fHh+iebTTKs+/7pw4VhMZDzxAFxfEAugY1JrhCpPhOwMfQCDaYGBNGfUdWnNOYbL+d37 X-Received: by 2002:aa7:9089:: with SMTP id i9mr533568pfa.115.1554311454651; Wed, 03 Apr 2019 10:10:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554311454; cv=none; d=google.com; s=arc-20160816; b=Mb+NSBgC6VDzxdU3cEBZkQxbK6aKkZhYTpXC3Ojh5BngTtFop0Ja0oyq6De49wr+Ck qpgW8bLEV+JiIDyAvvi622kq1q37NDVKCS/HA7noTv831kXzoOB06ncQhsqOpGLoCFQB kI3yBLbRsWzeP/7+blLPihsUYoZOe6eiOTqdXBgV5iPGFpwVIRxeLzbIoud8c+VgAyWB mF3b7gHitUvRhQ1JAOrFH1PJQcXjaIDSEY8aNcPgXioB+OrnrZRPcuSucC724iVg2ixT UHTg1TynwbFD05g7IKXU6rcf51+JuGWVBe7+RO20gcZkEi0iobktv53Rc/+gBJ7N4Mwo 5xSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=szulT7NfpOOAl6Q5NRLBlwod2VyZhZp2orgKdKl2/8M=; b=VKF3IjYnvwXRez4YUpjlgVJYuvYfQwOTj7yao79i8IczE/bIH4fw/b5TXYDNHaj8M8 rHwizbPc4kN/pEQAsPDDRfpyeOeDMS3BXcgtFb5eb6/0r7uNCHBkjLGClUShgzYDroLM RvQnGjG7itk3F551L0Gh55hGTqbGrfWcAPLgY7QWAmP/F0W4thtj21PL1HV9luxEcM+Z hJutv9v7MMB8eDUmM+nJDE8lz03fBNNlQL0CIdTeYd6oqf1A3jHvAaHCq9CxzbD9Cbp3 9J0xyt6JOm+DK7LZ9TfmKpTFuW3SPnevX6kAl2qyeSgP9PsZJaWTMXqu0Oczi60D4Rqx sdAw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l37si14652755plb.173.2019.04.03.10.10.38; Wed, 03 Apr 2019 10:10:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726685AbfDCRIo (ORCPT + 99 others); Wed, 3 Apr 2019 13:08:44 -0400 Received: from zeniv.linux.org.uk ([195.92.253.2]:33670 "EHLO ZenIV.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726144AbfDCRIn (ORCPT ); Wed, 3 Apr 2019 13:08:43 -0400 Received: from viro by ZenIV.linux.org.uk with local (Exim 4.92 #3 (Red Hat Linux)) id 1hBjMx-0003uc-II; Wed, 03 Apr 2019 17:08:11 +0000 Date: Wed, 3 Apr 2019 18:08:11 +0100 From: Al Viro To: "Tobin C. Harding" Cc: Andrew Morton , Roman Gushchin , Alexander Viro , Christoph Hellwig , Pekka Enberg , David Rientjes , Joonsoo Kim , Christopher Lameter , Matthew Wilcox , Miklos Szeredi , Andreas Dilger , Waiman Long , Tycho Andersen , Theodore Ts'o , Andi Kleen , David Chinner , Nick Piggin , Rik van Riel , Hugh Dickins , linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, Linus Torvalds Subject: Re: [RFC PATCH v2 14/14] dcache: Implement object migration Message-ID: <20190403170811.GR2217@ZenIV.linux.org.uk> References: <20190403042127.18755-1-tobin@kernel.org> <20190403042127.18755-15-tobin@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190403042127.18755-15-tobin@kernel.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 03, 2019 at 03:21:27PM +1100, Tobin C. Harding wrote: > The dentry slab cache is susceptible to internal fragmentation. Now > that we have Slab Movable Objects we can defragment the dcache. Object > migration is only possible for dentry objects that are not currently > referenced by anyone, i.e. we are using the object migration > infrastructure to free unused dentries. > > Implement isolate and migrate functions for the dentry slab cache. > + /* > + * Three sorts of dentries cannot be reclaimed: > + * > + * 1. dentries that are in the process of being allocated > + * or being freed. In that case the dentry is neither > + * on the LRU nor hashed. > + * > + * 2. Fake hashed entries as used for anonymous dentries > + * and pipe I/O. The fake hashed entries have d_flags > + * set to indicate a hashed entry. However, the > + * d_hash field indicates that the entry is not hashed. > + * > + * 3. dentries that have a backing store that is not > + * writable. This is true for tmpsfs and other in > + * memory filesystems. Removing dentries from them > + * would loose dentries for good. > + */ > + if ((d_unhashed(dentry) && list_empty(&dentry->d_lru)) || > + (!d_unhashed(dentry) && hlist_bl_unhashed(&dentry->d_hash)) || > + (dentry->d_inode && > + !mapping_cap_writeback_dirty(dentry->d_inode->i_mapping))) { > + /* Ignore this dentry */ > + v[i] = NULL; > + } else { > + __dget_dlock(dentry); > + } > + spin_unlock(&dentry->d_lock); > + } > + return NULL; /* No need for private data */ > +} > + > +/* > + * d_migrate() - Dentry migration callback function. > + * @s: The dentry cache. > + * @v: Vector of pointers to the objects to migrate. > + * @nr: Number of objects in @v. > + * @node: The NUMA node where new object should be allocated. > + * @private: Returned by d_isolate() (currently %NULL). > + * > + * Slab has dropped all the locks. Get rid of the refcount obtained > + * earlier and also free the object. > + */ > +static void d_migrate(struct kmem_cache *s, void **v, int nr, > + int node, void *_unused) > +{ > + struct dentry *dentry; > + int i; > + > + for (i = 0; i < nr; i++) { > + dentry = v[i]; > + if (dentry) > + d_invalidate(dentry); Oh, *brilliant* Let's do d_invalidate() on random dentries and hope they go away. With convoluted and brittle logics for deciding which ones to spare, which is actually wrong. This will pick mountpoints and tear them out, to start with. NAKed-by: Al Viro And this is a NAK for the entire approach; if it has a positive refcount, LEAVE IT ALONE. Period. Don't play this kind of games, they are wrong. d_invalidate() is not something that can be done to an arbitrary dentry.