Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1185056ybh; Thu, 16 Jul 2020 05:42:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwjSgy/r9vSSIxOvWoRL54CQ5HfyxHLf/t+HgDEvvVEmWKykl308kB5t2IURWQKVwrKBtuV X-Received: by 2002:a17:906:aac9:: with SMTP id kt9mr3425634ejb.488.1594903328232; Thu, 16 Jul 2020 05:42:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594903328; cv=none; d=google.com; s=arc-20160816; b=XblYOIUCGCQV+3+d05tzAAnFYZ/oycJe2nJoVo/SGyqxLRcbMC9OxucM3m1BCZ7/YU KDMx3Zc+MNq7FGAIpmFf5w0MxU9dcbMwTcV6OcXLBzevYjVeNCOi5eOhm85zyyk7Mn+W L8EOjUjaeKmlKAKtrYLVxK57s/Kgi7epJh2fgkTbYgp90XCEQ0jNyUlKD5xgF96h19le pzS4HRhbLonPKOuPfY0iYS+NfvC/Rs40kOYSehdf3tlKv1OrJCe7VEVJevGwjZzO+Mk3 vGp/bnKHWiCdy7Jn8An2aZTdHv6Fdb/k74V2gTqOyLRY+mftXm2UkCr6WV+4w9a3icxy yBqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=ICOXD8vSwlGVyHZyZBM7AKBUIw0nvOniCdNtamOp9vM=; b=QzQWKEDZbuBXmh+QiY7/BfugpXzS5tFbiT6se9E0uPvUZ6XncgB/iuWIlNIjidz5e6 /+OU9zbo8jZF0cUEB3/ub8gu8yTBtd87FewLMCaZBNTYwmt7DHBT8dli6RHpGzHABgcG HIb55l+rfmiYuT8uJjH771VCshzWTR6oJ5WcWVATZranyV9zxUZEbjpYHQp1dY23mbk8 yZ6KDscMWfKKTqc1t5iZwyEOEQ6LtP3pEVmW2OnVR8fLS+kuvoGUXKXZiS2o6XtFc7H6 r3B5Ccb+l0IrwjKxWbfr+oexfHwGTQEAd4f1YyjvQ38srq2PhUtVXi4eitjocNK4hb9E 3WrQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k23si3092318ejo.308.2020.07.16.05.41.44; Thu, 16 Jul 2020 05:42:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728891AbgGPMjT (ORCPT + 99 others); Thu, 16 Jul 2020 08:39:19 -0400 Received: from mx2.suse.de ([195.135.220.15]:35944 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728532AbgGPMid (ORCPT ); Thu, 16 Jul 2020 08:38:33 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id AADC0B93F; Thu, 16 Jul 2020 12:38:36 +0000 (UTC) From: Oscar Salvador To: akpm@linux-foundation.org Cc: mhocko@suse.com, linux-mm@kvack.org, mike.kravetz@oracle.com, david@redhat.com, aneesh.kumar@linux.vnet.ibm.com, naoya.horiguchi@nec.com, linux-kernel@vger.kernel.org, Naoya Horiguchi , Oscar Salvador Subject: [PATCH v4 08/15] mm,hwpoison: remove MF_COUNT_INCREASED Date: Thu, 16 Jul 2020 14:38:02 +0200 Message-Id: <20200716123810.25292-9-osalvador@suse.de> X-Mailer: git-send-email 2.13.7 In-Reply-To: <20200716123810.25292-1-osalvador@suse.de> References: <20200716123810.25292-1-osalvador@suse.de> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Naoya Horiguchi Now there's no user of MF_COUNT_INCREASED, so we can safely remove it from all calling points. Signed-off-by: Naoya Horiguchi Signed-off-by: Oscar Salvador --- include/linux/mm.h | 7 +++---- mm/memory-failure.c | 14 +++----------- 2 files changed, 6 insertions(+), 15 deletions(-) diff --git a/include/linux/mm.h b/include/linux/mm.h index 9d1c8540fdaf..e2ce2f05fa49 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -2999,10 +2999,9 @@ void register_page_bootmem_memmap(unsigned long section_nr, struct page *map, unsigned long nr_pages); enum mf_flags { - MF_COUNT_INCREASED = 1 << 0, - MF_ACTION_REQUIRED = 1 << 1, - MF_MUST_KILL = 1 << 2, - MF_SOFT_OFFLINE = 1 << 3, + MF_ACTION_REQUIRED = 1 << 0, + MF_MUST_KILL = 1 << 1, + MF_SOFT_OFFLINE = 1 << 2, }; extern int memory_failure(unsigned long pfn, int flags); extern void memory_failure_queue(unsigned long pfn, int flags); diff --git a/mm/memory-failure.c b/mm/memory-failure.c index 0b7d9769cf29..15b8e7fd94ed 100644 --- a/mm/memory-failure.c +++ b/mm/memory-failure.c @@ -1118,7 +1118,7 @@ static int memory_failure_hugetlb(unsigned long pfn, int flags) num_poisoned_pages_inc(); - if (!(flags & MF_COUNT_INCREASED) && !get_hwpoison_page(p)) { + if (!get_hwpoison_page(p)) { /* * Check "filter hit" and "race with other subpage." */ @@ -1314,7 +1314,7 @@ int memory_failure(unsigned long pfn, int flags) * In fact it's dangerous to directly bump up page count from 0, * that may make page_ref_freeze()/page_ref_unfreeze() mismatch. */ - if (!(flags & MF_COUNT_INCREASED) && !get_hwpoison_page(p)) { + if (!get_hwpoison_page(p)) { if (is_free_buddy_page(p)) { action_result(pfn, MF_MSG_BUDDY, MF_DELAYED); return 0; @@ -1354,10 +1354,7 @@ int memory_failure(unsigned long pfn, int flags) shake_page(p, 0); /* shake_page could have turned it free. */ if (!PageLRU(p) && is_free_buddy_page(p)) { - if (flags & MF_COUNT_INCREASED) - action_result(pfn, MF_MSG_BUDDY, MF_DELAYED); - else - action_result(pfn, MF_MSG_BUDDY_2ND, MF_DELAYED); + action_result(pfn, MF_MSG_BUDDY_2ND, MF_DELAYED); return 0; } @@ -1655,9 +1652,6 @@ static int __get_any_page(struct page *p, unsigned long pfn, int flags) { int ret; - if (flags & MF_COUNT_INCREASED) - return 1; - /* * When the target page is a free hugepage, just remove it * from free hugepage list. @@ -1933,8 +1927,6 @@ int soft_offline_page(unsigned long pfn, int flags) if (PageHWPoison(page)) { pr_info("soft offline: %#lx page already poisoned\n", pfn); - if (flags & MF_COUNT_INCREASED) - put_page(page); return -EBUSY; } -- 2.26.2