Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp143566ybv; Tue, 18 Feb 2020 19:45:51 -0800 (PST) X-Google-Smtp-Source: APXvYqxEldZ9BdcCqjezWVYvNiW9siOiiQTv70w8JIBDwy36Yb1nZAytibR9OmOSvqvtIQIgm4cM X-Received: by 2002:aca:d484:: with SMTP id l126mr3267293oig.114.1582083951452; Tue, 18 Feb 2020 19:45:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582083951; cv=none; d=google.com; s=arc-20160816; b=sIx/OhIj5UNfNIKBnLCuE2mLhVSQLkp4q7v1nDjA8EoAMEB1Q1JGCO5PrykD9NNXUQ 5FTcISUrq4V7v7/Xp0ZzSc1rOuJMTVa5+Wf9pH2wHRNHuyLrrTte8ZJ+WEfJ3K+vfOPD btX1NUfSoQqryQfjlQ/2k7N84xwKdIOjGP2Sfy4mAjQBd11MpKezRm+COla1SkGio3aI B9KIX85B021KtWWMMnReNCfgG9rzpI31fAKehoh5+uQNJfi5NbStwF3KgwMEpDAnF390 coyIOVV7bRwgFKJbH8DuoUpiI1hmImB388Th+AFntZ2lnJZ3eRM602V0k4hlOI6PESCp kr4w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature; bh=8yMk1rmENYxZ4Ak7kdDvWY8wqNcb6ofqoMJvwOVdmAo=; b=p+Z2Vl/D4v9Zrm0EkvShuGzrRwlG8VEpMx4SCFycvJnGB8/YoJ3UGg19E+jxsSjXDl +3Tk0wnk2tdL9zULPAP6jww9UjRfc9XgNdL3znp87VV1mULbhU9/NQiPz7mpMJkE3aUn Yzv8bPcYnu7ErC12eHQhDGk1DAtj9/2ofuGZk6P7ZGr907LVFLwYvD8NTbi/iGwGMxbv AsQzOkWrTRjTGY1ro63bxCbsuZwJ1bM803OS3LAhYD9KZDnRFMDPSAwMycw5TrsnJHxK nAwOaqnDIYR0sgXU2tQ8jTKZ4jbODgaqZsHgHHBbmpXLzUsnmgVka+GNRm3XWzLrLvy9 29Ag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Q3IBW1bj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k10si449573otn.323.2020.02.18.19.45.39; Tue, 18 Feb 2020 19:45:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Q3IBW1bj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726613AbgBSDoN (ORCPT + 99 others); Tue, 18 Feb 2020 22:44:13 -0500 Received: from mail-pl1-f177.google.com ([209.85.214.177]:36370 "EHLO mail-pl1-f177.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726439AbgBSDoM (ORCPT ); Tue, 18 Feb 2020 22:44:12 -0500 Received: by mail-pl1-f177.google.com with SMTP id a6so8976769plm.3 for ; Tue, 18 Feb 2020 19:44:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:in-reply-to:message-id:references :user-agent:mime-version; bh=8yMk1rmENYxZ4Ak7kdDvWY8wqNcb6ofqoMJvwOVdmAo=; b=Q3IBW1bjFwvi4HtS64zNZH7Vt2aIPBvcJXYNnGvmm62rWgxJ36Taj6dctGqf8Wz8h1 j3ze+JJsU6etxCHyjski5b/JNc0WfoWywTJ6m0s/zMV0MtUpw+DcBJDEA3gyxRe6kVCD PBu+DUcP9c3O2IFscEsVK3IOf+w1tk2/NTSEmaxAAia5hnZLoHOOuYivCQRX8uor5ej5 YylpAn59Mvv4AnHpurfuc5Io3tHVUf4Xl+NoEA4oBhhCV9gT0Our0OEEXvF05DvW79Bg 11AEsC04tkucDZ+2vHN4w1RlrvZW382oONkuLKTlt9C0fctyNvBq22NU8CUDZCG4k5nY b6wA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:in-reply-to:message-id :references:user-agent:mime-version; bh=8yMk1rmENYxZ4Ak7kdDvWY8wqNcb6ofqoMJvwOVdmAo=; b=HC/oxePF/hV9xY42pDqE39iOSHqMdJBenabd9N2cwhSbXx/IX0zjbwv9tl0k3ZfKTA YKPP5FJ+HDEvgNYhEoK0Th1+yryjimjCo0mH5sRM64ospD9XfqP6PcMu9kKlqmGRJvBy PgRpt3Gx2NUa1gwcKayTEHQ/WzRmCiVhv9XPPargpzqFJY8Y1U0zocqjJZ1vpaul065Q MMAce0WSKjyWoL3qFzhnyHwWPILTZHo2Yn9v5KiAQsSd1I8EA2OR/xlDvzo1u4Ndsanz JhBu5R4JeZ1+7ucI3bfV+/HcwAFHxSK6OK1K7LYHp4v7M+/ox7543X7z2JcntexdZQqG fgrQ== X-Gm-Message-State: APjAAAWDRKgBorLvaK3xl0XfTvHBorTGgJ15IF/qEJRik+3uXUnLy3bc BGn5C5ndDtscSz/YwbcalKiVkw== X-Received: by 2002:a17:90a:8547:: with SMTP id a7mr7037628pjw.0.1582083851875; Tue, 18 Feb 2020 19:44:11 -0800 (PST) Received: from [2620:15c:17:3:3a5:23a7:5e32:4598] ([2620:15c:17:3:3a5:23a7:5e32:4598]) by smtp.gmail.com with ESMTPSA id g2sm414891pgn.59.2020.02.18.19.44.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 18 Feb 2020 19:44:11 -0800 (PST) Date: Tue, 18 Feb 2020 19:44:10 -0800 (PST) From: David Rientjes X-X-Sender: rientjes@chino.kir.corp.google.com To: Yang Shi cc: Andrew Morton , "Kirill A. Shutemov" , Mike Rapoport , Jeremy Cline , Linux Kernel Mailing List , Linux MM Subject: Re: [patch 1/2] mm, shmem: add thp fault alloc and fallback stats In-Reply-To: Message-ID: References: User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 18 Feb 2020, Yang Shi wrote: > > diff --git a/mm/shmem.c b/mm/shmem.c > > --- a/mm/shmem.c > > +++ b/mm/shmem.c > > @@ -1502,9 +1502,8 @@ static struct page *shmem_alloc_page(gfp_t gfp, > > return page; > > } > > > > -static struct page *shmem_alloc_and_acct_page(gfp_t gfp, > > - struct inode *inode, > > - pgoff_t index, bool huge) > > +static struct page *shmem_alloc_and_acct_page(gfp_t gfp, struct inode *inode, > > + pgoff_t index, bool fault, bool huge) > > { > > struct shmem_inode_info *info = SHMEM_I(inode); > > struct page *page; > > @@ -1518,9 +1517,11 @@ static struct page *shmem_alloc_and_acct_page(gfp_t gfp, > > if (!shmem_inode_acct_block(inode, nr)) > > goto failed; > > > > - if (huge) > > + if (huge) { > > page = shmem_alloc_hugepage(gfp, info, index); > > - else > > + if (!page && fault) > > + count_vm_event(THP_FAULT_FALLBACK); > > + } else > > page = shmem_alloc_page(gfp, info, index); > > if (page) { > > __SetPageLocked(page); > > @@ -1832,11 +1833,10 @@ static int shmem_getpage_gfp(struct inode *inode, pgoff_t index, > > } > > > > alloc_huge: > > - page = shmem_alloc_and_acct_page(gfp, inode, index, true); > > + page = shmem_alloc_and_acct_page(gfp, inode, index, vmf, true); > > if (IS_ERR(page)) { > > alloc_nohuge: > > - page = shmem_alloc_and_acct_page(gfp, inode, > > - index, false); > > + page = shmem_alloc_and_acct_page(gfp, inode, index, vmf, false); > > } > > if (IS_ERR(page)) { > > int retry = 5; > > @@ -1871,8 +1871,11 @@ static int shmem_getpage_gfp(struct inode *inode, pgoff_t index, > > > > error = mem_cgroup_try_charge_delay(page, charge_mm, gfp, &memcg, > > PageTransHuge(page)); > > - if (error) > > + if (error) { > > + if (vmf && PageTransHuge(page)) > > + count_vm_event(THP_FAULT_FALLBACK); > > goto unacct; > > + } > > error = shmem_add_to_page_cache(page, mapping, hindex, > > NULL, gfp & GFP_RECLAIM_MASK); > > if (error) { > > @@ -1883,6 +1886,8 @@ static int shmem_getpage_gfp(struct inode *inode, pgoff_t index, > > mem_cgroup_commit_charge(page, memcg, false, > > PageTransHuge(page)); > > lru_cache_add_anon(page); > > + if (vmf && PageTransHuge(page)) > > + count_vm_event(THP_FAULT_ALLOC); > > I think shmem THP alloc is accounted to THP_FILE_ALLOC. And it has > been accounted by shmem_add_to_page_cache(). So, it sounds like a > double count. > I think we can choose to either include file allocations into both thp_fault_alloc and thp_fault_fallback or we can exclude them from both of them. I don't think we can account for only one of them. > > > > spin_lock_irq(&info->lock); > > info->alloced += compound_nr(page); > > >