Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp129838ybv; Tue, 18 Feb 2020 19:25:05 -0800 (PST) X-Google-Smtp-Source: APXvYqy7VegCb83q3nv88+fBK6Zqvs2V0EY+YciRwcKzPF/348ONCqTxQjh2xIzMK7yyjFFoEhpV X-Received: by 2002:aca:5ad5:: with SMTP id o204mr3213520oib.2.1582082705558; Tue, 18 Feb 2020 19:25:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582082705; cv=none; d=google.com; s=arc-20160816; b=dnt4Bea+lopWm1isEFz3CcRyflS409v5kv16e7qawN27rHxTWEo1nZIVELGIIiwcsh 4iRxkerUUcH2ppwclk8hwvfQPHC4K8nZlWMBkguUKSdyAc2cgJppwEwda290M/cdoSkM yDsxaYRBnjLOeffkIOJWcrWOaLEElGFhL+reAx9224pKeBSrtX+O9mljaI0aSvdMT1Qg b5jA7OiDCthxVDaxgq67kfa3sSZQ25n8wK3Jyb9m+b3ZQZClhJI9q+rOpHhlQr09qEK6 MqoO8n4iy4faJJse/kdMchD/EZhhMmBiMd9YOVk5mFvLrBdJ/CguxXiH0fCTvfKFjEO3 2+Ow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=mOwsfCxIuEAE5EfWzjTqJ5OG19WWGU0wtmPirueEhaU=; b=eZnHwQ2ylsfruSucAa6uMenKZLSxCp7qcst8F4xNBbyrIsyiHTnOcMGXS21X3FIhEq cTRBrZrEKIfw8Hqpk8cxPFEtwXBUhCiDu0EKYYdQ9ct264zBQu6RbLcNBlzy4bOiSJ90 ypdkxh6YFeLyOJt1/P5Fxp9F1m2jNx3zw3P1Qvn5juiFz0BhSWktAF1KbqRDqtugTDsq bRBR+NkFNIaHLd7oqXgmxUg7poZ1Ygr3RMlniPUfpU1pwfBERPMudeoumy7t5NHDAD40 ZonUnQoy8xh6ibGF6q3lsp35LJwLHHcnlsniwH15bFHzfkK5M9g1hxbtTDM9qP6EMqmK XNUA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=eSd7Al7O; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m85si8885639oig.158.2020.02.18.19.24.53; Tue, 18 Feb 2020 19:25:05 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=eSd7Al7O; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726582AbgBSDWg (ORCPT + 99 others); Tue, 18 Feb 2020 22:22:36 -0500 Received: from mail-ed1-f65.google.com ([209.85.208.65]:43103 "EHLO mail-ed1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726346AbgBSDWf (ORCPT ); Tue, 18 Feb 2020 22:22:35 -0500 Received: by mail-ed1-f65.google.com with SMTP id dc19so27348611edb.10 for ; Tue, 18 Feb 2020 19:22:33 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=mOwsfCxIuEAE5EfWzjTqJ5OG19WWGU0wtmPirueEhaU=; b=eSd7Al7OY+mz5Or3VCm94r/VJDi1/bdRrhb9Ior3AMIH15vekk9WuEMIusd4zqBes5 Ntpj53PgI/pKghFIQWbSVCEz2D+DuJSIFFryKUtFft133BNTw3XCqOJs2vcM24tXZC6p qV5O/UsBAxe0uidFndVqxdqOdu6aOn2zCHOciFcQT1ZlT+gj4X0qe+wlR0IVIEBkQBkW kKDGqcTRPcjqA/PmZs18SGduB1UMRGZmw4CGAAuRQDvv1kPAWyUD0bsbSE/yYGsxcS4q vVHspuASnEQYPUC1OrN0gCMRSmkAKy0yqd6u9L1ZQ3FL6O57Na+9hDemklOQWRDXkICx N0Aw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=mOwsfCxIuEAE5EfWzjTqJ5OG19WWGU0wtmPirueEhaU=; b=klffs4+3TZIB65JDmfLo+NQBLhGxLGLFlMOC3IL1oOR4OAVR+/4QtwAGcw/+yIa8Hp 992M2Ey22swIF/wsGNrpg8CCavEGDpX8/B0CyGlLYh6fZejMxYcq/Dujxk6PuIfqMmYP TsUKeEYqbGZf9Bv2yCNEdJ1uUSUOcOQPjns9ToXepiHojKzIhNFSkkfr3aGyjt+lHIEn veMTdoD+/pcITzwLX4U8meA/YUiiU+AV6JytNxHQ2zyv2I07vdWO8q4jRRYuyfVDnh+c z6QxiXhDXeOySQvLkV6R6SQRmeml+kvuyryM82yNZrJ2qcjR0GAy1btpYZA68yvvsG7N ZmvQ== X-Gm-Message-State: APjAAAUZ40fB8HC9MEHZV+XWOyO+J+4jXlNrngL2P5/p6Qjpnv5CIzZa nBXaR6bYBAmBObZnxxrE9Q1eUE24ppLv1g0kGjA= X-Received: by 2002:a05:6402:c0f:: with SMTP id co15mr21926223edb.200.1582082553048; Tue, 18 Feb 2020 19:22:33 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Yang Shi Date: Tue, 18 Feb 2020 19:22:16 -0800 Message-ID: Subject: Re: [patch 1/2] mm, shmem: add thp fault alloc and fallback stats To: David Rientjes Cc: Andrew Morton , "Kirill A. Shutemov" , Mike Rapoport , Jeremy Cline , Linux Kernel Mailing List , Linux MM Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 18, 2020 at 6:29 PM David Rientjes wrote: > > The thp_fault_alloc and thp_fault_fallback vmstats are incremented when a > hugepage is successfully or unsuccessfully allocated, respectively, during > a page fault for anonymous memory. > > Extend this to shmem as well. Note that care is taken to increment > thp_fault_alloc only when the fault succeeds; this is the same behavior as > anonymous thp. > > Signed-off-by: David Rientjes > --- > mm/shmem.c | 23 ++++++++++++++--------- > 1 file changed, 14 insertions(+), 9 deletions(-) > > diff --git a/mm/shmem.c b/mm/shmem.c > --- a/mm/shmem.c > +++ b/mm/shmem.c > @@ -1502,9 +1502,8 @@ static struct page *shmem_alloc_page(gfp_t gfp, > return page; > } > > -static struct page *shmem_alloc_and_acct_page(gfp_t gfp, > - struct inode *inode, > - pgoff_t index, bool huge) > +static struct page *shmem_alloc_and_acct_page(gfp_t gfp, struct inode *inode, > + pgoff_t index, bool fault, bool huge) > { > struct shmem_inode_info *info = SHMEM_I(inode); > struct page *page; > @@ -1518,9 +1517,11 @@ static struct page *shmem_alloc_and_acct_page(gfp_t gfp, > if (!shmem_inode_acct_block(inode, nr)) > goto failed; > > - if (huge) > + if (huge) { > page = shmem_alloc_hugepage(gfp, info, index); > - else > + if (!page && fault) > + count_vm_event(THP_FAULT_FALLBACK); > + } else > page = shmem_alloc_page(gfp, info, index); > if (page) { > __SetPageLocked(page); > @@ -1832,11 +1833,10 @@ static int shmem_getpage_gfp(struct inode *inode, pgoff_t index, > } > > alloc_huge: > - page = shmem_alloc_and_acct_page(gfp, inode, index, true); > + page = shmem_alloc_and_acct_page(gfp, inode, index, vmf, true); > if (IS_ERR(page)) { > alloc_nohuge: > - page = shmem_alloc_and_acct_page(gfp, inode, > - index, false); > + page = shmem_alloc_and_acct_page(gfp, inode, index, vmf, false); > } > if (IS_ERR(page)) { > int retry = 5; > @@ -1871,8 +1871,11 @@ static int shmem_getpage_gfp(struct inode *inode, pgoff_t index, > > error = mem_cgroup_try_charge_delay(page, charge_mm, gfp, &memcg, > PageTransHuge(page)); > - if (error) > + if (error) { > + if (vmf && PageTransHuge(page)) > + count_vm_event(THP_FAULT_FALLBACK); > goto unacct; > + } > error = shmem_add_to_page_cache(page, mapping, hindex, > NULL, gfp & GFP_RECLAIM_MASK); > if (error) { > @@ -1883,6 +1886,8 @@ static int shmem_getpage_gfp(struct inode *inode, pgoff_t index, > mem_cgroup_commit_charge(page, memcg, false, > PageTransHuge(page)); > lru_cache_add_anon(page); > + if (vmf && PageTransHuge(page)) > + count_vm_event(THP_FAULT_ALLOC); I think shmem THP alloc is accounted to THP_FILE_ALLOC. And it has been accounted by shmem_add_to_page_cache(). So, it sounds like a double count. > > spin_lock_irq(&info->lock); > info->alloced += compound_nr(page); >