Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp7913933pxb; Fri, 19 Feb 2021 02:39:23 -0800 (PST) X-Google-Smtp-Source: ABdhPJw+oeOoPExKCM7fEZNSRAXP+YDSxMKP87Iv1zh3lGuWlZy9+Ya51b5jrTQYBOYIYIYIiKY1 X-Received: by 2002:a17:906:3105:: with SMTP id 5mr8232900ejx.168.1613731162694; Fri, 19 Feb 2021 02:39:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613731162; cv=none; d=google.com; s=arc-20160816; b=fZcQ9xEJzRCGMy4fAgiayGacCd3lauMky+7ifaG55/ddAPh0dPJ+ABvlYS2HsTI4Ym 63a6yeaeNXj1HDwBJ3X/p/NSrCzX957cX23XSI9TQ6N3bPjlyX2/GOz61XKPTrieDgVF LCmsbLiLRH6al63EO3PQXHQIyFFj80uVEHntfWGwK+Sb+HDUFKIkIMK5bIDj72lk/XuT 1YWphxQsFn5jK5yafwcK2dOQpiRIwP4JvZiapvUg6WTvZi0SBEyGFP4TWHePJW2JJ34e 3dzxJOHUPqBPbvPXLuNfUsqGI0DkBgMHa+H2EVrTAVvX24yXAWUN8ZLoCsoY0QpEpW2r Z3Uw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=7EbNQMFcSNI0oMItBkDkX6r6vOi1t5rzTfwIGyjH8mk=; b=b3u0VNN1++smk901o813IWjHU69qjuW6nEVGWcvkMf+/gXS4OH3RjT4gETIx0XnJa/ nKTA4/yCX/K4UMQCoU88Jnmf4OfrHxFHPxdpoKAkBe57vs4km2kmGw9bp/eLjgMr2iYE wV83IOvfPj9hI0Fb/wHTIUnY2JK7o5f+8fzrkywdSMN4xLGE39zHCFwdFeTKC4cJXi30 JXycE0Mqiv2JRc2+q/M+t16SHZgx/RfmHiBbYuDzbiBXrQhbuk7+6pTO/ddyyrSj98SY 8KlzrhIaphz7O518rG2GuYWEGaqDRpr/AMOx/vCF3T2sP1U0p2WvLUUF2b+VkqheQ1PZ OlUQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=NNrBTsfn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=suse.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y12si5528055ejr.489.2021.02.19.02.38.59; Fri, 19 Feb 2021 02:39:22 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=NNrBTsfn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=suse.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229808AbhBSKgP (ORCPT + 99 others); Fri, 19 Feb 2021 05:36:15 -0500 Received: from mx2.suse.de ([195.135.220.15]:39766 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229535AbhBSKgO (ORCPT ); Fri, 19 Feb 2021 05:36:14 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1613730927; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=7EbNQMFcSNI0oMItBkDkX6r6vOi1t5rzTfwIGyjH8mk=; b=NNrBTsfniB4NnydtCSgc8ZsIFoWLIMNsTMJUjTrG2N9/X9kOUGuSMsm0kIrNGWfZy8Ik0c V2RTEJyYrvOlxtcC7JiV4cm5jwugeQTy+CvzXaXIFvOJRB3HCp9B4g3N2Gc7kfqiWAwgGp 9Bjxeh8YcPgEkWrYVdU3mSW+cXWDcUg= Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 9AEDBAC6E; Fri, 19 Feb 2021 10:35:27 +0000 (UTC) Date: Fri, 19 Feb 2021 11:35:21 +0100 From: Michal Hocko To: David Hildenbrand Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, Andrew Morton , Arnd Bergmann , Oscar Salvador , Matthew Wilcox , Andrea Arcangeli , Minchan Kim , Jann Horn , Jason Gunthorpe , Dave Hansen , Hugh Dickins , Rik van Riel , "Michael S . Tsirkin" , "Kirill A . Shutemov" , Vlastimil Babka , Richard Henderson , Ivan Kokshaysky , Matt Turner , Thomas Bogendoerfer , "James E.J. Bottomley" , Helge Deller , Chris Zankel , Max Filippov , linux-alpha@vger.kernel.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linux-xtensa@linux-xtensa.org, linux-arch@vger.kernel.org Subject: Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory Message-ID: References: <20210217154844.12392-1-david@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210217154844.12392-1-david@redhat.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 17-02-21 16:48:44, David Hildenbrand wrote: [...] I only got to the implementation now. > +static long madvise_populate(struct vm_area_struct *vma, > + struct vm_area_struct **prev, > + unsigned long start, unsigned long end) > +{ > + struct mm_struct *mm = vma->vm_mm; > + unsigned long tmp_end; > + int locked = 1; > + long pages; > + > + *prev = vma; > + > + while (start < end) { > + /* > + * We might have temporarily dropped the lock. For example, > + * our VMA might have been split. > + */ > + if (!vma || start >= vma->vm_end) { > + vma = find_vma(mm, start); > + if (!vma) > + return -ENOMEM; > + } Why do you need to find a vma when you already have one. do_madvise will give you your vma already. I do understand that you want to finish the vma for some errors but that shouldn't require handling vmas. You should be in the shope of one here unless I miss anything. > + > + /* Bail out on incompatible VMA types. */ > + if (vma->vm_flags & (VM_IO | VM_PFNMAP) || > + !vma_is_accessible(vma)) { > + return -EINVAL; > + } > + > + /* > + * Populate pages and take care of VM_LOCKED: simulate user > + * space access. > + * > + * For private, writable mappings, trigger a write fault to > + * break COW (i.e., shared zeropage). For other mappings (i.e., > + * read-only, shared), trigger a read fault. > + */ > + tmp_end = min_t(unsigned long, end, vma->vm_end); > + pages = populate_vma_page_range(vma, start, tmp_end, &locked); > + if (!locked) { > + mmap_read_lock(mm); > + *prev = NULL; > + vma = NULL; > + } > + if (pages < 0) { > + switch (pages) { > + case -EINTR: > + case -ENOMEM: > + return pages; > + case -EHWPOISON: > + /* Skip over any poisoned pages. */ > + start += PAGE_SIZE; > + continue; > + case -EBUSY: > + case -EAGAIN: > + continue; > + default: > + pr_warn_once("%s: unhandled return value: %ld\n", > + __func__, pages); > + return -ENOMEM; > + } > + } > + start += pages * PAGE_SIZE; > + } > + return 0; > +} > + > /* > * Application wants to free up the pages and associated backing store. > * This is effectively punching a hole into the middle of a file. > @@ -934,6 +1001,8 @@ madvise_vma(struct vm_area_struct *vma, struct vm_area_struct **prev, > case MADV_FREE: > case MADV_DONTNEED: > return madvise_dontneed_free(vma, prev, start, end, behavior); > + case MADV_POPULATE: > + return madvise_populate(vma, prev, start, end); > default: > return madvise_behavior(vma, prev, start, end, behavior); > } > @@ -954,6 +1023,7 @@ madvise_behavior_valid(int behavior) > case MADV_FREE: > case MADV_COLD: > case MADV_PAGEOUT: > + case MADV_POPULATE: > #ifdef CONFIG_KSM > case MADV_MERGEABLE: > case MADV_UNMERGEABLE: > -- > 2.29.2 > -- Michal Hocko SUSE Labs