Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp992831pxu; Wed, 2 Dec 2020 08:24:41 -0800 (PST) X-Google-Smtp-Source: ABdhPJzrNw9v8erfgS4hQVmwyCcDSw2cCYSIvC3NOqCih8MHp7Q425Lcq3nor/J22Em14pBI1iqJ X-Received: by 2002:aa7:d915:: with SMTP id a21mr642365edr.251.1606926281633; Wed, 02 Dec 2020 08:24:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606926281; cv=none; d=google.com; s=arc-20160816; b=q7HFinfCPnzKNFN7hg0G5u1lGdrbdRbw2piLTY+T8qfYrAzmPHPoM20PEQF+To4Rkv SxEFgzUHAftRpT5J28PwejZRYElhr84u+PnIwd/S3/d5sU3rwoX5zVfF5+i/MmoTI1w2 t85UcQudcO2PL0R3Th926Ha3pbm/VKnyyC0J72Ut42SwgPXhIM38Cdr5N0kE2JvslSEB t5zpiCH51dzmhmLDSB/pVEXinje2wVn21K7sshBP5fZbglByR0NSrM7bTTFEQtZRVmpJ mZge8idMc6xMlk6RJCEMRVZb/TpOBCLdf9EsCxcNKLV3cDzDu/9deesgE4NJlHKyDuWv KUzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :ironport-sdr:ironport-sdr; bh=tfTv+XQyw/FqEmWpMtad5MvsW6DMX4iRiOcCaVJhrr8=; b=kTQ8X7xVapReR7PECqz+1GqGxLRy7ysuCd//MOJARp/Deof+dX8yNLBzymIDxO19hA PJ8DdITp18CVggNIBFJJkpdZfC8p7fJhWSHKEqluolIc5MC166mjY3S/jsp6MiL6RxOk dpMxtbXMlW0KznVJ1henTThTt9kl8rPWro+kdxGMhNj/NAg7D06fgt6rhJbMtB/Gqp+P 17IRe6YIfHPDegclW0c6ACkFAMdIlf8ZzMnjD161RCoOEQLZNM1rluxlNkQ9uywvqZ8O d1xRwfLgq2cXZcCQwqr4TV9xEtdmr0ZzmJb3at4HrcUjubqB+OBjumBblbsQkx6ZhGyg GpQQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t12si300148edc.298.2020.12.02.08.24.17; Wed, 02 Dec 2020 08:24:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389044AbgLBQXA (ORCPT + 99 others); Wed, 2 Dec 2020 11:23:00 -0500 Received: from mga03.intel.com ([134.134.136.65]:44494 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389016AbgLBQW7 (ORCPT ); Wed, 2 Dec 2020 11:22:59 -0500 IronPort-SDR: 5mh4z9xwl+b2zFZQ7rkp3agojTTeqadwR0zUV9xSrTn0Snc7EUxuVayjgcw5Du7ucMRpq6Zvqw GZwGOtodSG/g== X-IronPort-AV: E=McAfee;i="6000,8403,9823"; a="173140268" X-IronPort-AV: E=Sophos;i="5.78,387,1599548400"; d="scan'208";a="173140268" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga006.jf.intel.com ([10.7.209.51]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Dec 2020 08:22:16 -0800 IronPort-SDR: Era7pDZzgxbiaJpQIAK5imL4NHLKAQ/4FwHkMmx1lAR9MtAJkXNHgqqo1XehrVMUKUtykaI1w6 juZiarijiT2g== X-IronPort-AV: E=Sophos;i="5.78,387,1599548400"; d="scan'208";a="335612597" Received: from iweiny-desk2.sc.intel.com (HELO localhost) ([10.3.52.147]) by orsmga006-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Dec 2020 08:22:15 -0800 Date: Wed, 2 Dec 2020 08:22:15 -0800 From: Ira Weiny To: Pavel Tatashin Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, akpm@linux-foundation.org, vbabka@suse.cz, mhocko@suse.com, david@redhat.com, osalvador@suse.de, dan.j.williams@intel.com, sashal@kernel.org, tyhicks@linux.microsoft.com, iamjoonsoo.kim@lge.com, mike.kravetz@oracle.com, rostedt@goodmis.org, mingo@redhat.com, jgg@ziepe.ca, peterz@infradead.org, mgorman@suse.de, willy@infradead.org, rientjes@google.com, jhubbard@nvidia.com Subject: Re: [PATCH 1/6] mm/gup: perform check_dax_vmas only when FS_DAX is enabled Message-ID: <20201202162215.GS1161629@iweiny-DESK2.sc.intel.com> References: <20201202052330.474592-1-pasha.tatashin@soleen.com> <20201202052330.474592-2-pasha.tatashin@soleen.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201202052330.474592-2-pasha.tatashin@soleen.com> User-Agent: Mutt/1.11.1 (2018-12-01) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Dec 02, 2020 at 12:23:25AM -0500, Pavel Tatashin wrote: > There is no need to check_dax_vmas() and run through the npage loop of > pinned pages if FS_DAX is not enabled. > > Add a stub check_dax_vmas() function for no-FS_DAX case. This looks like a good idea. > > Signed-off-by: Pavel Tatashin > --- > mm/gup.c | 7 +++++++ > 1 file changed, 7 insertions(+) > > diff --git a/mm/gup.c b/mm/gup.c > index 98eb8e6d2609..cdb8b9eeb016 100644 > --- a/mm/gup.c > +++ b/mm/gup.c > @@ -1568,6 +1568,7 @@ struct page *get_dump_page(unsigned long addr) > #endif /* CONFIG_ELF_CORE */ > > #if defined(CONFIG_FS_DAX) || defined (CONFIG_CMA) In addition, I think it would make a lot of sense to clean up this config as well like this: 08:20:10 > git di diff --git a/mm/gup.c b/mm/gup.c index 102877ed77a4..92cfda220aeb 100644 --- a/mm/gup.c +++ b/mm/gup.c @@ -1567,7 +1567,7 @@ struct page *get_dump_page(unsigned long addr) } #endif /* CONFIG_ELF_CORE */ -#if defined(CONFIG_FS_DAX) || defined (CONFIG_CMA) +#ifdef CONFIG_FS_DAX static bool check_dax_vmas(struct vm_area_struct **vmas, long nr_pages) { long i; @@ -1586,6 +1586,12 @@ static bool check_dax_vmas(struct vm_area_struct **vmas, long nr_pages) } return false; } +#else +static bool check_dax_vmas(struct vm_area_struct **vmas, long nr_pages) +{ + return false; +} +#endif /* CONFIG_FS_DAX */ #ifdef CONFIG_CMA static long check_and_migrate_cma_pages(struct mm_struct *mm, @@ -1691,6 +1697,7 @@ static long check_and_migrate_cma_pages(struct mm_struct *mm, } #endif /* CONFIG_CMA */ +#if defined(CONFIG_FS_DAX) || defined (CONFIG_CMA) /* * __gup_longterm_locked() is a wrapper for __get_user_pages_locked which * allows us to process the FOLL_LONGTERM flag. That makes it more clear what is going on with __gup_longterm_locked() and places both CMA and FS_DAX code within their own blocks. Ira > +#ifdef CONFIG_FS_DAX > static bool check_dax_vmas(struct vm_area_struct **vmas, long nr_pages) > { > long i; > @@ -1586,6 +1587,12 @@ static bool check_dax_vmas(struct vm_area_struct **vmas, long nr_pages) > } > return false; > } > +#else > +static bool check_dax_vmas(struct vm_area_struct **vmas, long nr_pages) > +{ > + return false; > +} > +#endif > > #ifdef CONFIG_CMA > static long check_and_migrate_cma_pages(struct mm_struct *mm, > -- > 2.25.1 > >