Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1104206yba; Thu, 18 Apr 2019 15:25:41 -0700 (PDT) X-Google-Smtp-Source: APXvYqza9gb5c6E3KA4xSe7954NFFBsrx47YDLWRy/tvV6kPOSYE81OCdQRQUJGioA8ynU160QfJ X-Received: by 2002:a17:902:b60d:: with SMTP id b13mr139500pls.100.1555626341242; Thu, 18 Apr 2019 15:25:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555626341; cv=none; d=google.com; s=arc-20160816; b=PiCkdnMO9Jtg/8qpLOpEs1oM/hO+G3aLonQoqU/YvPK4snhmtEle+WlRn2atiadcgi SG4LmKvxxOByU8iJbR3YYlg9T3JmChQq91CJDlh4z6LYGaOQgmE3594Kav9DIouJEeG5 XWo2EudkcXrbdOA9w/ggPTi/RaxowHSdsnDCotK6Wgmg3cc16TMSDru4iQv5IKPX1YsC Pik5LUP+6h2jZ7U/XjAgoM6Eh8HsShsfsHYsiFTLEdsqih49HtNj6l18c/Y3K9F1mVUl ktMKQykzGwnFEunCrLM05dqRryut/Elc9G8zb0LtZ5JARjUKkfWhsRD4u49IpOiYGP+E Z0zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=aA9zcWjkQt5q4swM/DAfqtwYnHQBxTvTRaWHqqz/mZo=; b=Fn/d/n5yLp1KE/Yp902//Bh5q/bquonVdNZ1JT2qweceWWSrVWWwg3FVKZJMcygrYK EBI7y9Y6dp/VmyfmEawsbfvYMvlolw1l5rVrWsaB8uOllLI2Fu6BLTTZBoHw7wHR+b72 jrBMDMQN3tviQDC2vU7NFOq2yII7zNHJxT8jhu7Ucte0cpD5yDjYLt/SJtI2dND6d1bH y54LpgowcltxZJA7ys4pz3LkoONeSJIGwDoKr04OZtsfmmtHxHIdAReKhr5mFVPNCi8Y Vqtxbc8jm5NaeQJl4178Td2ixGpgYQtQKyZskiQN8XDxoOoNAV/lZaZiaHBYDNBnw9W/ /IAA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f2si3338584pfd.17.2019.04.18.15.25.25; Thu, 18 Apr 2019 15:25:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726082AbfDRWYd (ORCPT + 99 others); Thu, 18 Apr 2019 18:24:33 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:59410 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725824AbfDRWYd (ORCPT ); Thu, 18 Apr 2019 18:24:33 -0400 Received: from akpm3.svl.corp.google.com (unknown [104.133.8.65]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 584911F5A; Thu, 18 Apr 2019 22:24:32 +0000 (UTC) Date: Thu, 18 Apr 2019 15:24:31 -0700 From: Andrew Morton To: Matthew Wilcox Cc: Roman Gushchin , linux-mm@kvack.org, linux-kernel@vger.kernel.org, kernel-team@fb.com, Johannes Weiner , Vlastimil Babka , Roman Gushchin , Christoph Hellwig , Joel Fernandes Subject: Re: [PATCH v4 1/2] mm: refactor __vunmap() to avoid duplicated call to find_vm_area() Message-Id: <20190418152431.c583ef892a8028c662db3e6a@linux-foundation.org> In-Reply-To: <20190418111834.GE7751@bombadil.infradead.org> References: <20190417194002.12369-1-guro@fb.com> <20190417194002.12369-2-guro@fb.com> <20190417145827.8b1c83bf22de8ba514f157e3@linux-foundation.org> <20190418111834.GE7751@bombadil.infradead.org> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 18 Apr 2019 04:18:34 -0700 Matthew Wilcox wrote: > On Wed, Apr 17, 2019 at 02:58:27PM -0700, Andrew Morton wrote: > > On Wed, 17 Apr 2019 12:40:01 -0700 Roman Gushchin wrote: > > > +static struct vm_struct *__remove_vm_area(struct vmap_area *va) > > > +{ > > > + struct vm_struct *vm = va->vm; > > > + > > > + might_sleep(); > > > > Where might __remove_vm_area() sleep? > > > > >From a quick scan I'm only seeing vfree(), and that has the > > might_sleep_if(!in_interrupt()). > > > > So perhaps we can remove this... > > See commit 5803ed292e63 ("mm: mark all calls into the vmalloc subsystem as potentially sleeping") > > It looks like the intent is to unconditionally check might_sleep() at > the entry points to the vmalloc code, rather than only catch them in > the occasional place where it happens to go wrong. afaict, vfree() will only do a mutex_trylock() in try_purge_vmap_area_lazy(). So does vfree actually sleep in any situation? Whether or not local interrupts are enabled?