Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp931391ybg; Fri, 18 Oct 2019 09:26:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqxtCvpreRn0/gMT6gPdPhjGayJQjL6Q1EZqc/l3Lb7FZUD2HOZP2sMW43IFKyqZSeVhWLpp X-Received: by 2002:a50:b901:: with SMTP id m1mr10618685ede.203.1571415970826; Fri, 18 Oct 2019 09:26:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571415970; cv=none; d=google.com; s=arc-20160816; b=N8Z3l4Vr5906pmvzMxOlblNAQU/ufeNRe1XiJzhzVtsdw65qHj9tG6mfr2CXE3kC0a 9OrwVS0I8DYLRCdgi3Groj6HuXYRz++j7fhjfseUaDqkqHDDfrKwh9Bj6h52n1o3Wd6F 6cKXlOfO2PrlZQgvFUOATv+qEH67DZytkjv1BUxw/JrfxWxbLZemRw+t6qZuTnJLyhvF 62NPDwEF9F5L+ULBB4DDyQmJ0A0q0GaORVTYLoFlWrL9/m3pYl1qYTEMRkdx8wmR9758 XTa58pkScrQL6g+uywHzk5LIMzY5/kSaMqn1beyC+FrOQdv3aqMfCXVmOP2hVPKNjxuE BV4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=+zIqCxYvMS9L+at70UmguWCcafnC4qgklis7zZN+UfY=; b=GBwHaF2lBDfzz/TWRa/+iTvPc8RVDxMW8T+bmXK1L9sGDQs0Ixb6oupofxxZX1VZ1x mcnA0uAgIHi1ZJ0Cp2rDxNsSFNWfRofwr8NJKD3zMMo4ewAvIE7KuJP91d5W1X6WxWsC wtEuZN3l+Ok12LainAOsonexNe+eQ3jW1Ri+yMY6lzLW7MefvCJcTnfqwb8m3mllpKiQ f44Mp+UkjKu9lKIyBCQU9/Pdqrcw7O4Rh37AX1F09vm9dAeXeG683OwN+PqXH44/H9Yv vpcR1XGlxSR0YO5xKsRVUqR4g8MgtqEYKcVFWJl7Z+lTEILdeSeSkMzAxMpFf6dlTwTx pg4g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g12si3887094ejf.121.2019.10.18.09.25.46; Fri, 18 Oct 2019 09:26:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2440159AbfJQOVk (ORCPT + 99 others); Thu, 17 Oct 2019 10:21:40 -0400 Received: from mx2.suse.de ([195.135.220.15]:40608 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2440123AbfJQOVg (ORCPT ); Thu, 17 Oct 2019 10:21:36 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id C02B5B4A8; Thu, 17 Oct 2019 14:21:34 +0000 (UTC) From: Oscar Salvador To: n-horiguchi@ah.jp.nec.com Cc: mhocko@kernel.org, mike.kravetz@oracle.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Oscar Salvador Subject: [RFC PATCH v2 07/16] mm,hwpoison: remove MF_COUNT_INCREASED Date: Thu, 17 Oct 2019 16:21:14 +0200 Message-Id: <20191017142123.24245-8-osalvador@suse.de> X-Mailer: git-send-email 2.13.7 In-Reply-To: <20191017142123.24245-1-osalvador@suse.de> References: <20191017142123.24245-1-osalvador@suse.de> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Naoya Horiguchi Now there's no user of MF_COUNT_INCREASED, so we can safely remove it from all calling points. Signed-off-by: Naoya Horiguchi Signed-off-by: Oscar Salvador --- include/linux/mm.h | 7 +++---- mm/memory-failure.c | 16 +++------------- 2 files changed, 6 insertions(+), 17 deletions(-) diff --git a/include/linux/mm.h b/include/linux/mm.h index d6dca8778cc2..4c2cf2ea9953 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -2780,10 +2780,9 @@ void register_page_bootmem_memmap(unsigned long section_nr, struct page *map, unsigned long nr_pages); enum mf_flags { - MF_COUNT_INCREASED = 1 << 0, - MF_ACTION_REQUIRED = 1 << 1, - MF_MUST_KILL = 1 << 2, - MF_SOFT_OFFLINE = 1 << 3, + MF_ACTION_REQUIRED = 1 << 0, + MF_MUST_KILL = 1 << 1, + MF_SOFT_OFFLINE = 1 << 2, }; extern int memory_failure(unsigned long pfn, int flags); extern void memory_failure_queue(unsigned long pfn, int flags); diff --git a/mm/memory-failure.c b/mm/memory-failure.c index 3e73738a2246..c6b31cf409d3 100644 --- a/mm/memory-failure.c +++ b/mm/memory-failure.c @@ -1081,7 +1081,7 @@ static int memory_failure_hugetlb(unsigned long pfn, int flags) num_poisoned_pages_inc(); - if (!(flags & MF_COUNT_INCREASED) && !get_hwpoison_page(p)) { + if (!get_hwpoison_page(p)) { /* * Check "filter hit" and "race with other subpage." */ @@ -1277,7 +1277,7 @@ int memory_failure(unsigned long pfn, int flags) * In fact it's dangerous to directly bump up page count from 0, * that may make page_ref_freeze()/page_ref_unfreeze() mismatch. */ - if (!(flags & MF_COUNT_INCREASED) && !get_hwpoison_page(p)) { + if (!get_hwpoison_page(p)) { if (is_free_buddy_page(p)) { action_result(pfn, MF_MSG_BUDDY, MF_DELAYED); return 0; @@ -1318,10 +1318,7 @@ int memory_failure(unsigned long pfn, int flags) shake_page(p, 0); /* shake_page could have turned it free. */ if (!PageLRU(p) && is_free_buddy_page(p)) { - if (flags & MF_COUNT_INCREASED) - action_result(pfn, MF_MSG_BUDDY, MF_DELAYED); - else - action_result(pfn, MF_MSG_BUDDY_2ND, MF_DELAYED); + action_result(pfn, MF_MSG_BUDDY_2ND, MF_DELAYED); return 0; } @@ -1609,9 +1606,6 @@ static int __get_any_page(struct page *p, unsigned long pfn, int flags) { int ret; - if (flags & MF_COUNT_INCREASED) - return 1; - /* * When the target page is a free hugepage, just remove it * from free hugepage list. @@ -1881,15 +1875,11 @@ int soft_offline_page(struct page *page, int flags) if (is_zone_device_page(page)) { pr_debug_ratelimited("soft_offline: %#lx page is device page\n", pfn); - if (flags & MF_COUNT_INCREASED) - put_page(page); return -EIO; } if (PageHWPoison(page)) { pr_info("soft offline: %#lx page already poisoned\n", pfn); - if (flags & MF_COUNT_INCREASED) - put_page(page); return -EBUSY; } -- 2.12.3