Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp91948ybv; Tue, 18 Feb 2020 18:30:36 -0800 (PST) X-Google-Smtp-Source: APXvYqyhZR4FV9HQ3PPctwgI62OXiNi0TESwEP1Q6ycchp8XJvEmKCM5cUrcZI5K3HvafoC1MfLZ X-Received: by 2002:a05:6830:1643:: with SMTP id h3mr17140349otr.70.1582079435825; Tue, 18 Feb 2020 18:30:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582079435; cv=none; d=google.com; s=arc-20160816; b=pyAODqO/JzglXZE9WW8/YS2sJMIncB4wO+Mtgrruqz5912l+3IWF8mYN2ohVIUqO9r HU2MZnbUSAY76BmX6Kwm1ZXkbttMYYF+87EzKJzWkjIM3+oZ8oWPtQXfjgtc4buPABm1 eOAfNjtXA+q9QIjbgcRT81flQ+GsC+9UG/mXh0Da8Jjr9B3uHue4uyF/MwfNviaKEbJs TQ9xa0z6tuYHTjiIaQMV+Cj8PND7vLhYYLtlUWnPIVLCV7n4hxPzQ1v6V/3sY2Ptvtes O4f2P9aXHOcMUwzb6ITiBrYqE3nKsinGm0awgrfQM1snhLdxhGBaiHHS35QQ1ClBRaD6 Uj1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature; bh=Lwgaqpl0HZQ1P9McupBrS5OPeUo6B2/L0nmFQFzJpZ0=; b=nSRxBefm69yi07RA0r8zJeWPwvgWMuWm5HhuBo/F+YMuCZrH2AQpPcpPFs5+9DwCF7 Qmkfm/KiCjT9KBnwcvRH5SvjG0KOZdM0FBovgjVCDvgbwo1xcyM2Ozg6+0LFFbKMIPWW mcvNRCdsmMqAiLi1mrsDZdvLbWyX1PbipGmyy/I3rz1n14ryOCFAF42kqdpyxENadWF7 EYhdW9IQWYjFkT6XD8f2HMTvbPet9zWXc1veP47NB+lWicrADDSbZ1SCmB7PsIcA6hF8 UkWcbs/0au662yzTrLNiVJB+2RdmMO+cpjj1aK2HegwgB/u9XuacjsfuYRXZGCBvbU1V ZkIg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=EZ9SJk6G; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 22si8262931oin.34.2020.02.18.18.30.23; Tue, 18 Feb 2020 18:30:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=EZ9SJk6G; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728087AbgBSC3V (ORCPT + 99 others); Tue, 18 Feb 2020 21:29:21 -0500 Received: from mail-pf1-f194.google.com ([209.85.210.194]:42937 "EHLO mail-pf1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726595AbgBSC3V (ORCPT ); Tue, 18 Feb 2020 21:29:21 -0500 Received: by mail-pf1-f194.google.com with SMTP id 4so11683112pfz.9 for ; Tue, 18 Feb 2020 18:29:20 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:in-reply-to:message-id:references :user-agent:mime-version; bh=Lwgaqpl0HZQ1P9McupBrS5OPeUo6B2/L0nmFQFzJpZ0=; b=EZ9SJk6GGVAI+GAOUJ/e5T3k0xmSQAgenxkgUj3FNHcdryseTmuv3u6iNykko5/4Sx 940TJ11ToPsGThl+bY/R7CTI2jt0YDJEyKjeITxDxmCEacKKwplsxrSGcNzBB+BMaFpS maWI9j6+FOBv2LtRAzave9vRkSfJ1nr6V/UI/xvPeOrY7TASlCzQ+i8ijO2XkXX5+TQu A8zI/anJz8BbQS17k0ruVajAiyPORd3NqtF+k+C5U7kr3yc4nsnhHEkWkKqU8D9YSI6e WtEKKcrWQTGXayvTLGiTFyVob2adLXHr5ocmXKchx/ZsOfAqNRdsbKyaAexrLziwqcJU ScQQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:in-reply-to:message-id :references:user-agent:mime-version; bh=Lwgaqpl0HZQ1P9McupBrS5OPeUo6B2/L0nmFQFzJpZ0=; b=dTqUs1ISeEERn4ctPAFhGw9NfWpjHauetJowyo6bCRj/MxujMnHqgzONa0CYB/Dhtz +YHHEAj5fQzE4T8/jDDEkziNoz9nQi/eR2uqoPRwsU522TNLrl4hSJIRvO6mIUeRXPAU dqf28aAhwW/CTGL3DlRqGfq4iRBmK0nBgNCRaMslrk8kMUEGzoyisfcinTVe+hXR4NqC DrHyHCSeNPfYWgZ2mMsORUPjHAqKOmTx2qSKtrCDWIO6K9r5aXb+2dlJMh3RCzhfBgUl EsdIvsPtm5FPaitemLMHhj0sMaGMipzaRbm5f2l2eZXZGbznYliLuVxHFce9fVw7N1rK hpUQ== X-Gm-Message-State: APjAAAUUw6F8RZDZsPiLZaGhSqnfBZtHT7qTepsQM6bC+QexqJrZIJIZ hDNyxPJ1C3RungrUND3oRdOMwQ== X-Received: by 2002:a65:5242:: with SMTP id q2mr25082514pgp.74.1582079360199; Tue, 18 Feb 2020 18:29:20 -0800 (PST) Received: from [2620:15c:17:3:3a5:23a7:5e32:4598] ([2620:15c:17:3:3a5:23a7:5e32:4598]) by smtp.gmail.com with ESMTPSA id l13sm257529pjq.23.2020.02.18.18.29.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 18 Feb 2020 18:29:19 -0800 (PST) Date: Tue, 18 Feb 2020 18:29:18 -0800 (PST) From: David Rientjes X-X-Sender: rientjes@chino.kir.corp.google.com To: Andrew Morton cc: "Kirill A. Shutemov" , Mike Rapoport , Jeremy Cline , linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: [patch 1/2] mm, shmem: add thp fault alloc and fallback stats In-Reply-To: Message-ID: References: User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The thp_fault_alloc and thp_fault_fallback vmstats are incremented when a hugepage is successfully or unsuccessfully allocated, respectively, during a page fault for anonymous memory. Extend this to shmem as well. Note that care is taken to increment thp_fault_alloc only when the fault succeeds; this is the same behavior as anonymous thp. Signed-off-by: David Rientjes --- mm/shmem.c | 23 ++++++++++++++--------- 1 file changed, 14 insertions(+), 9 deletions(-) diff --git a/mm/shmem.c b/mm/shmem.c --- a/mm/shmem.c +++ b/mm/shmem.c @@ -1502,9 +1502,8 @@ static struct page *shmem_alloc_page(gfp_t gfp, return page; } -static struct page *shmem_alloc_and_acct_page(gfp_t gfp, - struct inode *inode, - pgoff_t index, bool huge) +static struct page *shmem_alloc_and_acct_page(gfp_t gfp, struct inode *inode, + pgoff_t index, bool fault, bool huge) { struct shmem_inode_info *info = SHMEM_I(inode); struct page *page; @@ -1518,9 +1517,11 @@ static struct page *shmem_alloc_and_acct_page(gfp_t gfp, if (!shmem_inode_acct_block(inode, nr)) goto failed; - if (huge) + if (huge) { page = shmem_alloc_hugepage(gfp, info, index); - else + if (!page && fault) + count_vm_event(THP_FAULT_FALLBACK); + } else page = shmem_alloc_page(gfp, info, index); if (page) { __SetPageLocked(page); @@ -1832,11 +1833,10 @@ static int shmem_getpage_gfp(struct inode *inode, pgoff_t index, } alloc_huge: - page = shmem_alloc_and_acct_page(gfp, inode, index, true); + page = shmem_alloc_and_acct_page(gfp, inode, index, vmf, true); if (IS_ERR(page)) { alloc_nohuge: - page = shmem_alloc_and_acct_page(gfp, inode, - index, false); + page = shmem_alloc_and_acct_page(gfp, inode, index, vmf, false); } if (IS_ERR(page)) { int retry = 5; @@ -1871,8 +1871,11 @@ static int shmem_getpage_gfp(struct inode *inode, pgoff_t index, error = mem_cgroup_try_charge_delay(page, charge_mm, gfp, &memcg, PageTransHuge(page)); - if (error) + if (error) { + if (vmf && PageTransHuge(page)) + count_vm_event(THP_FAULT_FALLBACK); goto unacct; + } error = shmem_add_to_page_cache(page, mapping, hindex, NULL, gfp & GFP_RECLAIM_MASK); if (error) { @@ -1883,6 +1886,8 @@ static int shmem_getpage_gfp(struct inode *inode, pgoff_t index, mem_cgroup_commit_charge(page, memcg, false, PageTransHuge(page)); lru_cache_add_anon(page); + if (vmf && PageTransHuge(page)) + count_vm_event(THP_FAULT_ALLOC); spin_lock_irq(&info->lock); info->alloced += compound_nr(page);