Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4743826pxj; Tue, 25 May 2021 15:35:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJznmV7n6BlFqMBZikmREdaw3P2KFNdboAMd2KcQgiMNYoiPeNBYYDRcEIBgAlM4cnkAiG/T X-Received: by 2002:a05:6402:40c1:: with SMTP id z1mr33042550edb.97.1621982101895; Tue, 25 May 2021 15:35:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621982101; cv=none; d=google.com; s=arc-20160816; b=sdauWp8+4qili0wvkiWvUbZ68D3YGBPnBYewA9gxqCSu6ad5kNjMiAtOcTPzJy/YYq aAy9gpwKBNIpK8XpLXa3gcIBZjoDPyJowCh2khDPv6KXefJfVdvp1FOCDOtWZdtdvqVy GvpmQCIsu3RB+Xw9BjPZnay5iUq0XGAdS8midX2Mj9tt1VMH42UCwhvJOsT+t+v/C+xq xDlUUaIH/pd5eSyb0YCv5Mk1E064eDDBsmh1ZxiwcO1JZWuxmycg2xf4dQ0fg14sXQY6 Edsj4ZwfIhahjAagSp68W9CJ58Zdhhw8rSp7aWkD87EwrFpzGSxevxJdpd13qj+8IZy5 vFLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:message-id :in-reply-to:subject:cc:to:from:date:dkim-signature; bh=iM55N2qbAQ/cxjUwr+cKwHTKE/ISXaL/m6HyzitTaDE=; b=0e+DCSqId6l9D8VwTa8w9tU2QpsQ5bnPUAqurYSkoCZyUQm0x+fTrvLbck/RdCdWLP pJt9fYje9P7/aax5R5T8Gl2cKiDVWHo7uzWH6YcSs7n0m2P9Tv9xwMePJDjA+fSkiaxO DbE8b//rUBBznwGrJpt+J+62xj8z/nbj3/Dv50GIS0i6/hPksRFUv7N0e6CIBt1Y9827 Ple3lIP/TAox2Pp6W3BeU4swZ24W1/mBGQrXcTRkRHFu5lbvJ2EkJd01QteYC2jU+A+F VWRp4exD3lA0QFp5ERETCzL55Hdz4YYwtDJMG1Ch37LhTUytWN6VtkV+IVt6sBs6Rloq Lh+Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Y8GvFXJD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p14si3479224ejd.654.2021.05.25.15.34.39; Tue, 25 May 2021 15:35:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Y8GvFXJD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232380AbhEYVNi (ORCPT + 99 others); Tue, 25 May 2021 17:13:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53916 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232141AbhEYVNi (ORCPT ); Tue, 25 May 2021 17:13:38 -0400 Received: from mail-qk1-x733.google.com (mail-qk1-x733.google.com [IPv6:2607:f8b0:4864:20::733]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D5E57C061574 for ; Tue, 25 May 2021 14:12:07 -0700 (PDT) Received: by mail-qk1-x733.google.com with SMTP id q10so31939586qkc.5 for ; Tue, 25 May 2021 14:12:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:in-reply-to:message-id:references :user-agent:mime-version; bh=iM55N2qbAQ/cxjUwr+cKwHTKE/ISXaL/m6HyzitTaDE=; b=Y8GvFXJDMnL8AHyBV89sB4THIqwHkJgIwM39JA7OAJZJLB95kSvTWPTdHbtD3m0D7j EGCIl2ymiZL/7nE75QExRpzcSEgEvHAdlIeuiQPBouhSwLz/9axq7QKAdQo0wW1clbav pMQyyK3Iz8JXWjzfV6MdvLc/8dV2pYDAUisDXMK/jhW09zXfCsxtXNNp1T4tyFJjeUIp 0CwRjl1wmfIhwjdldh8XDKCpdg2h4EUCkpeqi/mmw7Ui9H9YE3IURj4GxRjYdO3E9v6+ /K4xcyEB1zbAT+qSZSMoxSFElmLPPiu3JsYIMq18kf5LrgJsfI8IcJLydPwrN5MMD9ap WxAw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:in-reply-to:message-id :references:user-agent:mime-version; bh=iM55N2qbAQ/cxjUwr+cKwHTKE/ISXaL/m6HyzitTaDE=; b=mbl78ewOsTeNSUVrle2qvVbezp0k8gJn261QrRMLO7DWPZXw4uL2Zl6ko+awFaby6u uW9BSbO21Xu5jLLTqziwdGd1sX9OckslqmqCNHnX31NrBtaqsJUI2imZei73PNfgDOK/ LP5YeNQ7iIUugLq4cfQRK5S/Sh2HGbC0aDetudbG2VyXjjKpt2OOdxjJZHkWLG3Mksp7 a2/7e0R4JvriSkhhl0YMC8FpfpnCwC9Se/I3Av6JZdiwvQ9fXBRdbbTTLFtOG8T89KvA 1SEEXfuUTqKJPknpXWAxNZIe6TDPsMxn0Gv3QEjN+ouHKZcPN3kq+vq6fqfRTFyNXl7d 5GbA== X-Gm-Message-State: AOAM532KBvYVGivVdcZMVlND3TK6Y2Gh+59qgCYjkqRIzIsXZQ2hOTXo OUtsDgDo5vR43Ho/wMTLY/u41w== X-Received: by 2002:a05:620a:a5a:: with SMTP id j26mr36366971qka.156.1621977126700; Tue, 25 May 2021 14:12:06 -0700 (PDT) Received: from eggly.attlocal.net (172-10-233-147.lightspeed.sntcca.sbcglobal.net. [172.10.233.147]) by smtp.gmail.com with ESMTPSA id 7sm282385qkd.20.2021.05.25.14.12.05 (version=TLS1 cipher=ECDHE-ECDSA-AES128-SHA bits=128/128); Tue, 25 May 2021 14:12:06 -0700 (PDT) Date: Tue, 25 May 2021 14:11:53 -0700 (PDT) From: Hugh Dickins X-X-Sender: hugh@eggly.anvils To: Yang Shi cc: hughd@google.com, ziy@nvidia.com, kirill.shutemov@linux.intel.com, naoya.horiguchi@nec.com, wangyugui@e16-tech.com, akpm@linux-foundation.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [v3 PATCH 1/2] mm: rmap: make try_to_unmap() void function In-Reply-To: <20210525162145.3510-1-shy828301@gmail.com> Message-ID: References: <20210525162145.3510-1-shy828301@gmail.com> User-Agent: Alpine 2.11 (LSU 23 2013-08-11) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 25 May 2021, Yang Shi wrote: > Currently try_to_unmap() return bool value by checking page_mapcount(), > however this may return false positive since page_mapcount() doesn't > check all subpages of compound page. The total_mapcount() could be used > instead, but its cost is higher since it traverses all subpages. > > Actually the most callers of try_to_unmap() don't care about the > return value at all. So just need check if page is still mapped by > page_mapped() when necessary. And page_mapped() does bail out early > when it finds mapped subpage. > > Suggested-by: Hugh Dickins > Signed-off-by: Yang Shi Thanks for doing this, I like it, you can add Acked-by: Hugh Dickins Let's all ignore checkpatch's complaint on "struct page *": that try_to_unmap() prototype is consistent with others in rmap.h, and changing them to "struct page *page" adds no information at all. But a nit in mm/memory-failure.c: unmap_success no longer needs to be initialized to true on entry to hwpoison_user_mappings(). More seriously, I question the ordering of the two patches: I think this 1/2 should be 2/2, and the other be 1/2. The other is the one which replaces a BUG by a WARN, which will be wanted Cc stable; whereas this one is really just a cleanup - I don't think there's a serious consequence from the faint possibility of wrong unmap_success on THP, in either memory-failure.c or vmscan.c - wrong message, wrong stats, but more than that? And memory-failure.c on THP somewhat a work in progress IIUC. Unfortunately, they can't just be swapped but need rediffing. Or do you disagree that's a better ordering? As it stands, I imagine my series of THP unmap fixes (most needing Cc stable) coming on top of your "mm: thp: check page_mapped instead of page_mapcount for split" (umm, that's a bad title), but before this cleanup. Though I'm responding before I've looked through the stable trees: it's not of overriding importance, but I'll want to try to minimize the number of patches that need redoing for older stables, which might affect the ordering. (And it might end up easiest if I bring your two patches into my series, then ask Andrew to replace.) Further complicated by Andrew having brought in the nouveau reorg of mm/rmap.c (oh, and that touches mm/huge_memory.c unmap_page() too). I expect I'll have to send Andrew a series to go before all that, together with fixups to that to sit on top of it. Sigh. Well, we can only blame me for not getting those THP fixes in sooner. Hugh > --- > include/linux/rmap.h | 2 +- > mm/huge_memory.c | 4 +--- > mm/memory-failure.c | 13 ++++++------- > mm/rmap.c | 6 +----- > mm/vmscan.c | 3 ++- > 5 files changed, 11 insertions(+), 17 deletions(-) > > diff --git a/include/linux/rmap.h b/include/linux/rmap.h > index def5c62c93b3..116cb193110a 100644 > --- a/include/linux/rmap.h > +++ b/include/linux/rmap.h > @@ -194,7 +194,7 @@ static inline void page_dup_rmap(struct page *page, bool compound) > int page_referenced(struct page *, int is_locked, > struct mem_cgroup *memcg, unsigned long *vm_flags); > > -bool try_to_unmap(struct page *, enum ttu_flags flags); > +void try_to_unmap(struct page *, enum ttu_flags flags); > > /* Avoid racy checks */ > #define PVMW_SYNC (1 << 0) > diff --git a/mm/huge_memory.c b/mm/huge_memory.c > index 19195fca1aee..80fe642d742d 100644 > --- a/mm/huge_memory.c > +++ b/mm/huge_memory.c > @@ -2336,15 +2336,13 @@ static void unmap_page(struct page *page) > { > enum ttu_flags ttu_flags = TTU_IGNORE_MLOCK | > TTU_RMAP_LOCKED | TTU_SPLIT_HUGE_PMD; > - bool unmap_success; > > VM_BUG_ON_PAGE(!PageHead(page), page); > > if (PageAnon(page)) > ttu_flags |= TTU_SPLIT_FREEZE; > > - unmap_success = try_to_unmap(page, ttu_flags); > - VM_BUG_ON_PAGE(!unmap_success, page); > + try_to_unmap(page, ttu_flags); > } > > static void remap_page(struct page *page, unsigned int nr) > diff --git a/mm/memory-failure.c b/mm/memory-failure.c > index 9dcc9bcea731..6dd53ff34825 100644 > --- a/mm/memory-failure.c > +++ b/mm/memory-failure.c > @@ -1126,7 +1126,7 @@ static bool hwpoison_user_mappings(struct page *p, unsigned long pfn, > collect_procs(hpage, &tokill, flags & MF_ACTION_REQUIRED); > > if (!PageHuge(hpage)) { > - unmap_success = try_to_unmap(hpage, ttu); > + try_to_unmap(hpage, ttu); > } else { > if (!PageAnon(hpage)) { > /* > @@ -1138,17 +1138,16 @@ static bool hwpoison_user_mappings(struct page *p, unsigned long pfn, > */ > mapping = hugetlb_page_mapping_lock_write(hpage); > if (mapping) { > - unmap_success = try_to_unmap(hpage, > - ttu|TTU_RMAP_LOCKED); > + try_to_unmap(hpage, ttu|TTU_RMAP_LOCKED); > i_mmap_unlock_write(mapping); > - } else { > + } else > pr_info("Memory failure: %#lx: could not lock mapping for mapped huge page\n", pfn); > - unmap_success = false; > - } > } else { > - unmap_success = try_to_unmap(hpage, ttu); > + try_to_unmap(hpage, ttu); > } > } > + > + unmap_success = !page_mapped(hpage); > if (!unmap_success) > pr_err("Memory failure: %#lx: failed to unmap page (mapcount=%d)\n", > pfn, page_mapcount(hpage)); > diff --git a/mm/rmap.c b/mm/rmap.c > index a35cbbbded0d..728de421e43a 100644 > --- a/mm/rmap.c > +++ b/mm/rmap.c > @@ -1748,10 +1748,8 @@ static int page_not_mapped(struct page *page) > * > * Tries to remove all the page table entries which are mapping this > * page, used in the pageout path. Caller must hold the page lock. > - * > - * If unmap is successful, return true. Otherwise, false. > */ > -bool try_to_unmap(struct page *page, enum ttu_flags flags) > +void try_to_unmap(struct page *page, enum ttu_flags flags) > { > struct rmap_walk_control rwc = { > .rmap_one = try_to_unmap_one, > @@ -1776,8 +1774,6 @@ bool try_to_unmap(struct page *page, enum ttu_flags flags) > rmap_walk_locked(page, &rwc); > else > rmap_walk(page, &rwc); > - > - return !page_mapcount(page) ? true : false; > } > > /** > diff --git a/mm/vmscan.c b/mm/vmscan.c > index f96d62159720..fa5052ace415 100644 > --- a/mm/vmscan.c > +++ b/mm/vmscan.c > @@ -1499,7 +1499,8 @@ static unsigned int shrink_page_list(struct list_head *page_list, > if (unlikely(PageTransHuge(page))) > flags |= TTU_SPLIT_HUGE_PMD; > > - if (!try_to_unmap(page, flags)) { > + try_to_unmap(page, flags); > + if (page_mapped(page)) { > stat->nr_unmap_fail += nr_pages; > if (!was_swapbacked && PageSwapBacked(page)) > stat->nr_lazyfree_fail += nr_pages; > -- > 2.26.2