Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp7893050pxb; Fri, 19 Feb 2021 01:58:57 -0800 (PST) X-Google-Smtp-Source: ABdhPJwXdpnW+Vf8uB2wMdmVMSJriHhLt38g5SazYzKBoT8QFO9yDWFHbi9DbqijUP8jKB+TAtgE X-Received: by 2002:a17:906:2803:: with SMTP id r3mr7988610ejc.50.1613728736974; Fri, 19 Feb 2021 01:58:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613728736; cv=none; d=google.com; s=arc-20160816; b=Nh/u6PqwdMzBOzXeARTI6q9nZEmQcyBscpH3dicTThzMIt+hM+LzOzurxKXnBsMq0z MONb6emk1dtnQkuEL1ZjWt3m9Hxr+sUpwtHj8esStGYlS/yrY6B0zryZyR6/pzFoaWzQ SYTn0gObdShS51w3K+1BSRofRrMSw92LxZvOZNhr57Vs8RUE0EDWGING7g01WP2gIELn oGF0g1mXvatOHuTAYWsJiVUGLgClfrWwQXIZp6YA54/EXgcdhYlPXCv0Lx3BfLwuV4jH E9gEzHRO3IAK50nGyoZCXdbRYxizhvDg/9hby9C+yL1yfd4Izq+LBR5cK5HjfZirLnDe hDwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=+pSIhQidfu0Q5u3LjyNZr9MXzltQyM//XcNXBDgi7F4=; b=1IHC/WwIznczepvnYxNwwUZ7oDeNO/VWc7DYDizo8EvFI2BcuFCZfqe5m1vUz6DfiM SrwLy2ku+4sQQEfPmqM+R+NSoZCxxcBD+UQEW2iLe925ioEOh6Wp0Q5II/jIbZM0z3Wz cRnbXcofrA4GhRPOzILhsvHfsd1KbylT/hzYmcBedNH8Oe/emRQqw9qSloaW3W73T8xz 0WCnii1qQQMF2L71xC7kdy59yB+lEvav4O95Spo6edKr1GA0c0nillbgu0OuXRlqm+bK Fy7xKkiEGBEVOSWkEAcKyJvuNW/qihNT/26vHdpRN4hFYw4UoiNh+njHmA7dBMQBjs7p 1FsQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=kpQ8XcU0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=suse.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z9si5397479ejm.194.2021.02.19.01.58.33; Fri, 19 Feb 2021 01:58:56 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=kpQ8XcU0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=suse.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230231AbhBSJ5x (ORCPT + 99 others); Fri, 19 Feb 2021 04:57:53 -0500 Received: from mx2.suse.de ([195.135.220.15]:48752 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230186AbhBSJ5a (ORCPT ); Fri, 19 Feb 2021 04:57:30 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1613728603; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=+pSIhQidfu0Q5u3LjyNZr9MXzltQyM//XcNXBDgi7F4=; b=kpQ8XcU0aoviZ9pVMeuuBUzY6fz6Q9b+o4iTGbAA1ERcc5Awt+ZtIEnTNkFgVad6aAsswk nH803hFI+HUS7rLEGYZklC+5wJEeqkdBAdSF2Kj7sfON/9e7p9xY9oQc2hRsNB5yIZLs0K LWNo8AwWLVJTD9rdV9AsAEN6T47r+Jg= Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id ACD74ACBF; Fri, 19 Feb 2021 09:56:43 +0000 (UTC) Date: Fri, 19 Feb 2021 10:56:42 +0100 From: Michal Hocko To: Oscar Salvador Cc: Andrew Morton , Mike Kravetz , David Hildenbrand , Muchun Song , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 1/2] mm: Make alloc_contig_range handle free hugetlb pages Message-ID: References: <20210217100816.28860-1-osalvador@suse.de> <20210217100816.28860-2-osalvador@suse.de> <20210218100917.GA4842@localhost.localdomain> <20210218133250.GA7983@localhost.localdomain> <20210219090548.GA17266@linux> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210219090548.GA17266@linux> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 19-02-21 10:05:53, Oscar Salvador wrote: > On Thu, Feb 18, 2021 at 02:59:40PM +0100, Michal Hocko wrote: > > > It should be: > > > > > > allocate_a_new_page (new_page's refcount = 1) > > > put_page(new_page); (new_page's refcount = 0) > > > dissolve_old_page > > > : if fail > > > dissolve_new_page (we can dissolve it as refcount == 0) > > > > > > I hope this clarifies it . > > > > OK, I see the problem now. And your above solution is not really > > optimal either. Your put_page would add the page to the pool and so it > > could be used by somebody. One way around it would be either directly > > manipulating reference count which is fugly or you can make it a > > temporal page (alloc_migrate_huge_page) or maybe even better not special > > case this here but rather allow migrating free hugetlb pages in the > > migrate_page path. > > I have been weighting up this option because it seemed the most clean way to > proceed. Having the hability to migrate free hugepages directly from migrate_page > would spare us this function. > But there is a problem. migrate_pages needs the pages to be on a list (by > page->lru). That is no problem for used pages, but for freehugepages we would > have to remove the page from hstate->hugepage_freelists, meaning that if userspace > comes along and tries to get a hugepage (a hugepage he previously allocated by > e.g: /proc/sys/.../nr_hugepages), it will fail. Good point. I should have realized that. > So I am not really sure we can go this way. Unless we are willing to accept > that temporary userspace can get ENOMEM if it tries to use a hugepage, which > I do not think it is a good idea. No, this is not acceptable. > Another way to go would be to make up for the free hugepages to be migrated and > allocate the same amount, but that starts to go down a rabbit hole. > > I yet need to give it some more spins, but all in all, I think the easiest way > forward way might be to do something like: > > alloc_and_dissolve_huge_page { > > new_page = alloc_fresh_huge_page(h, gfp_mask, nid, NULL, NULL); > if (new_page) { > /* > * Put the page in the freelist hugepage pool. > * We might race with someone coming by and grabbing the page, > * but that is fine since we mark the page as Temporary in case > * both old and new_page fail to be dissolved, so new_page > * will be freed when its last reference is gone. > */ > put_page(new_page); > > if (!dissolve_free_huge_page(page)) { > /* > * Old page could be dissolved. > */ > ret = true; > } else if (dissolve_free_huge_page(new_page)) { > /* > * Page might have been dissolved by admin by doing > * "echo 0 > /proc/../nr_hugepages". Check it before marking > * the page. > */ > spin_lock(&hugetlb_lock); > /* Mark the page Temporary in case we fail to dissolve both > * the old page and new_page. It will be freed when the last > * user drops it. > */ > if (PageHuge(new_page)) > SetPageHugeTemporary(new_page); > spin_unlock(&hugetlb_lock); > } > } OK, this should work but I am really wondering whether it wouldn't be just simpler to replace the old page by a new one in the free list directly. Or is there any reason we have to go through the generic helpers path? I mean something like this new_page = alloc_fresh_huge_page(); if (!new_page) goto fail; spin_lock(hugetlb_lock); if (!PageHuge(old_page)) { /* freed from under us, nothing to do */ __update_and_free_page(new_page); goto unlock; } list_del(&old_page->lru); __update_and_free_page(old_page); __enqueue_huge_page(new_page); unlock: spin_unlock(hugetlb_lock); This will require to split update_and_free_page and enqueue_huge_page to counters independent parts but that shouldn't be a big deal. But it will also protect from any races. Not an act of beauty but seems less hackish to me. -- Michal Hocko SUSE Labs