Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp6080523iob; Tue, 10 May 2022 09:53:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzzYEapCaUV6VXuTTQMSLI0W05nlYiH+iO5Lll6gv3wGtPT45JiyUUpPHbrxiKCaEcTs9M2 X-Received: by 2002:a17:907:960d:b0:6f4:3b68:8d55 with SMTP id gb13-20020a170907960d00b006f43b688d55mr20500197ejc.105.1652201619351; Tue, 10 May 2022 09:53:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652201619; cv=none; d=google.com; s=arc-20160816; b=fYP6aRy4XOW8dz3mRvvyTMXEFyuRcBbUP3gQrUEtMICeEDhNdVni0r69v18F3oWYvB t8DxPSI52fepwLNMYlitRO2XVr49Ho23EWU3TrdTVMC59//ps81kOTXX5W9FDkhZKGxu rcJTBBYWLIby1Xqgb3UWl76M5YgOcKGPAYqvOKpEaFFRL1VxKfSECiJQABj5IYxfu9cR +qsNidazh/3tdFhrAptTOsRPAs50yUA9w1FkMZQbECePIE9NTy97hJYKXuUV0FuMYvEB dySHQcVlTVtJN5UDTuLcOLAW4FSkhRogEjqSSUtQBpDflkc++BCD2DSuwSdMDV2YRH9y GK5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=WOUz2WsmdgX6LeN+LrF3txVAnT8hFkZ8ulMV7CFBOqM=; b=JksK67k5WIQNloRiLX5tQCSJRQtfubeX9p9I+OEA2lb3GDII8iRLtA9pUx78jm7K0h VT5Dhd3G2DDD41Ud0VXxAwtJT6cCPJEVMjMpzl39SkHY/GRwS9iTNreL6LTsI+vTUF/F MPZmFphoxz6AYAY1fO+g9O4I0RwaP0mf5WG2MyHjLJXEN+vx4sPTKTmOe+2i+0UzlB8O 1ptn/fn0WRjNTpe8vb1THEX3EhNY6MKaejjbsmKtqtR3KQa/JVbEAcKbkc1lijt4JzCU retCfhw5TBwqCOmgPRaj1vWZ0y8uM7l+9afNC6xBPlDMFbhC2W/YFHrZYeFwkNKxbBm2 suDA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=google header.b=XTCkuhyr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hb44-20020a170907162c00b006e7edaf2b8asi11623077ejc.371.2022.05.10.09.53.12; Tue, 10 May 2022 09:53:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=google header.b=XTCkuhyr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347126AbiEJQDU (ORCPT + 99 others); Tue, 10 May 2022 12:03:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33254 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1347807AbiEJP6F (ORCPT ); Tue, 10 May 2022 11:58:05 -0400 Received: from mail-io1-xd34.google.com (mail-io1-xd34.google.com [IPv6:2607:f8b0:4864:20::d34]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 22673554B1 for ; Tue, 10 May 2022 08:51:03 -0700 (PDT) Received: by mail-io1-xd34.google.com with SMTP id f4so18961437iov.2 for ; Tue, 10 May 2022 08:51:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linuxfoundation.org; s=google; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=WOUz2WsmdgX6LeN+LrF3txVAnT8hFkZ8ulMV7CFBOqM=; b=XTCkuhyrI12mXoibtavSh6cqwdk4FerubUN/RyfF6NFULIGnuGEkqPOOM8I2zwQ+o0 Q6t7+QE88n3MP1KIW2iOswY+eCBI2ZUBLChS/bwADArGE4WFf2CAE10R0h7xDZu1KZTV gm2knkXa/E9lbuTqeJjwbg1h+Du01PqftXDYQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=WOUz2WsmdgX6LeN+LrF3txVAnT8hFkZ8ulMV7CFBOqM=; b=HttIj2m4TVXVINAR6kXVpXiXG4f2Kd5J0FZxf1/PMDoeu22sGhRUonFVRiJ7nS6yyF lB6oa7NBVWnU8SITdX7kkHxCm3P5fXelI5UOswzVvD+m6HR5H5njTj2UVgigLNHuwDN0 uCyTkoAS2AMgMk3f/B4xsqYCbROS3G8W/inRqsyyrhzSkuD702HeiEHkGpxuWSi0ZOZl 1ofGDsukyn07sPspCrLpbkBlTs8TzuvLBUhqaoFvkFx4WlI9UA4ffldnpBTpv2C+rZaM kkUvcGxF5vS+mbmUo4XsVcQx2R/klHJFlVzuN+0zDrGHxTyKWWonIjUj812yjmkeW/rQ k45w== X-Gm-Message-State: AOAM532SmR5Zjeck6DktRwU2+cOZjOKozKGYW3sFK8STXor9bYVnHmfA 75v6wulbYmj/mXVmSKcbbY5k7A== X-Received: by 2002:a02:aa94:0:b0:32a:e769:af1 with SMTP id u20-20020a02aa94000000b0032ae7690af1mr9721447jai.0.1652197862793; Tue, 10 May 2022 08:51:02 -0700 (PDT) Received: from [192.168.1.128] ([38.15.45.1]) by smtp.gmail.com with ESMTPSA id cp20-20020a056638481400b0032b75b98013sm4455954jab.148.2022.05.10.08.51.01 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 10 May 2022 08:51:02 -0700 (PDT) Subject: Re: [PATCH 3/3] mm: delete unused MMF_OOM_VICTIM flag To: Suren Baghdasaryan , akpm@linux-foundation.org Cc: mhocko@suse.com, rientjes@google.com, willy@infradead.org, hannes@cmpxchg.org, guro@fb.com, minchan@kernel.org, kirill@shutemov.name, aarcange@redhat.com, brauner@kernel.org, hch@infradead.org, oleg@redhat.com, david@redhat.com, jannh@google.com, shakeelb@google.com, peterx@redhat.com, jhubbard@nvidia.com, shuah@kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, kernel-team@android.com, Shuah Khan References: <20220510030014.3842475-1-surenb@google.com> <20220510030014.3842475-3-surenb@google.com> From: Shuah Khan Message-ID: <008de890-7fe1-aeae-345e-0cd3fcd32352@linuxfoundation.org> Date: Tue, 10 May 2022 09:51:01 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 MIME-Version: 1.0 In-Reply-To: <20220510030014.3842475-3-surenb@google.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-3.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/9/22 9:00 PM, Suren Baghdasaryan wrote: > With the last usage of MMF_OOM_VICTIM in exit_mmap gone, this flag is > now unused and can be removed. > > Signed-off-by: Suren Baghdasaryan > --- > include/linux/oom.h | 9 --------- > include/linux/sched/coredump.h | 1 - > mm/oom_kill.c | 4 +--- > 3 files changed, 1 insertion(+), 13 deletions(-) > > diff --git a/include/linux/oom.h b/include/linux/oom.h > index 6cdf0772dbae..25990e9d9e15 100644 > --- a/include/linux/oom.h > +++ b/include/linux/oom.h > @@ -77,15 +77,6 @@ static inline bool tsk_is_oom_victim(struct task_struct * tsk) > return tsk->signal->oom_mm; > } > > -/* > - * Use this helper if tsk->mm != mm and the victim mm needs a special > - * handling. This is guaranteed to stay true after once set. > - */ > -static inline bool mm_is_oom_victim(struct mm_struct *mm) > -{ > - return test_bit(MMF_OOM_VICTIM, &mm->flags); > -} > - > /* > * Checks whether a page fault on the given mm is still reliable. > * This is no longer true if the oom reaper started to reap the > diff --git a/include/linux/sched/coredump.h b/include/linux/sched/coredump.h > index 4d9e3a656875..746f6cb07a20 100644 > --- a/include/linux/sched/coredump.h > +++ b/include/linux/sched/coredump.h > @@ -70,7 +70,6 @@ static inline int get_dumpable(struct mm_struct *mm) > #define MMF_UNSTABLE 22 /* mm is unstable for copy_from_user */ > #define MMF_HUGE_ZERO_PAGE 23 /* mm has ever used the global huge zero page */ > #define MMF_DISABLE_THP 24 /* disable THP for all VMAs */ > -#define MMF_OOM_VICTIM 25 /* mm is the oom victim */ > #define MMF_OOM_REAP_QUEUED 26 /* mm was queued for oom_reaper */ > #define MMF_MULTIPROCESS 27 /* mm is shared between processes */ > /* > diff --git a/mm/oom_kill.c b/mm/oom_kill.c > index 36355b162727..11291b99599f 100644 > --- a/mm/oom_kill.c > +++ b/mm/oom_kill.c > @@ -732,10 +732,8 @@ static void mark_oom_victim(struct task_struct *tsk) > return; > > /* oom_mm is bound to the signal struct life time. */ > - if (!cmpxchg(&tsk->signal->oom_mm, NULL, mm)) { > + if (!cmpxchg(&tsk->signal->oom_mm, NULL, mm)) > mmgrab(tsk->signal->oom_mm); > - set_bit(MMF_OOM_VICTIM, &mm->flags); > - } > > /* > * Make sure that the task is woken up from uninterruptible sleep > Thank you for working on the new tests and cleanups. This series needs a cover-letter that explains why this series is needed that includes the information from this last patch. Please send v2 with a proper cover letter starting with why this series is necessary. If you did that, it would have reviewers job is lot easier. Also it appears you are combining new tests with cleanup patches. I think patches 2/3 and 3/3 can be a separate series and the new test can be a separate patch. thanks, -- Shuah