Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp1742877iog; Tue, 14 Jun 2022 12:15:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz04s252DzsLkM4cYzthvuk+YYsTlUr3vkY3t3eUKUjOfKn0/9xYXltFcM0Q5CSRHW/6QTb X-Received: by 2002:a65:4689:0:b0:3fd:c5b6:4064 with SMTP id h9-20020a654689000000b003fdc5b64064mr5744309pgr.208.1655234147225; Tue, 14 Jun 2022 12:15:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655234147; cv=none; d=google.com; s=arc-20160816; b=mRYY14L/g3d10Zgus6hfsNr6/DgIeoTKRifFdQMTGPKssN+V0hR7FIjpmtOvguJnEh AzKI2wglFPipivKPunjSTn1OeYJpPNEtuar9DLsbBREMnp3izVAqXarkN+qDiHtIo2FH cbm0bf5LCHqHJU7Lk6K2YHAVrHRGwcy05Sx/SOvuQUjCQZnnCx8W+KhoJKu8YuEyApF0 IQBg3qYsU4QR3nIVoWRCbCgqMqzm4zIjRE5Nj0qgbDQP2YC7DIlBYbAKDCY26hKhMAzQ 6JKtf07+TPc1BJr0tAOyeJldzU1mQeptgosVzKw00N7IiHVDynJkHS5DF1/gph/+xXhy 8rGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=AiuPwobel2QHrq/tyDTbC+81Q4mi80xBn9pTcm++km8=; b=Weh/IRj0z8cdnQLAgxMQA3i7orSW1YN/dUa+0+sL71ILaf3sZoCX6QNMWNasBV07pO 8F/NQcNrRyfN93t2+M4xEgUSwHvZxrakqCfsqkK6asRXnt+EdsQqecM/9QNLvlZifh6x AhjoNYaCG+L3dKSfnp6qKbPS0JtLdXp58tEcqULwz6JCJ4eI6WfyqqIEMC3v76V8Op0m d2zBjiSYmn4hlINYRoNpef7m7qokCIPL+b4IlVUxDWx1PJa5Id0O3EVblhGJWI7f7eZF OTLRTMUFBQHvvs5i/GSkdS2rbwzX4JShtTeQzoSr7ceOIP5MmwnFD/IXgb6ZHyz+jw13 s+fw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=Miz9xkx+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gi12-20020a17090b110c00b001e589a828a1si17739288pjb.75.2022.06.14.12.15.32; Tue, 14 Jun 2022 12:15:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=Miz9xkx+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345544AbiFNS7y (ORCPT + 99 others); Tue, 14 Jun 2022 14:59:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34668 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1359010AbiFNS7P (ORCPT ); Tue, 14 Jun 2022 14:59:15 -0400 Received: from mail-pf1-x42a.google.com (mail-pf1-x42a.google.com [IPv6:2607:f8b0:4864:20::42a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C07395000F for ; Tue, 14 Jun 2022 11:52:08 -0700 (PDT) Received: by mail-pf1-x42a.google.com with SMTP id bo5so9361445pfb.4 for ; Tue, 14 Jun 2022 11:52:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=AiuPwobel2QHrq/tyDTbC+81Q4mi80xBn9pTcm++km8=; b=Miz9xkx+FwjhFR0QKQg5U4vNcLPg6I/MDFds0Zvxa5PzFzQgTL7P/82/QiUKTlhTpl +5S1JaxTyLoOKKrO5NB1r6Mlq5wj9gNiTPmHCCmzSU+MXJBL/NeEcEAg02KqpYolqLkt 0AnyAfZI8CSKoKYdVRczfuZJKWz8Bp933L7Ki2y/xsoY5lAWQpSXe3ee+0YIe+NAJeHw FzsYpRk/99XaLp3VFq1OteGimRNK0E+sHZI0II21pj+huru8lt+byKxAhLaSH0+pRMJR K8x/iXM6zkukzNTEUkQpbaSoo80r9XZn47TCqxokDJDGCKIrkbBVxi1qq82AeIizYve3 epyg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=AiuPwobel2QHrq/tyDTbC+81Q4mi80xBn9pTcm++km8=; b=rNcXLxFAsnthcsbew6oKj/xxzHEKNo2eraH6fSf4FjApE+q6UT3HRAcmRBWbGITQmo VqJmfJ7PZJnAvfymDPH28aCrBJfCqaYEOQBnK2i4zxL7fP7wzIi+dzMxjsK662kp0XCc k7ncRu36NJ8Hbp/qu9jWjDLaIoNDp81QvJX8uu1C2F65apWWQqAEzbk048BLHNLsBeIu FJXP0FjgGfTFwt4BYcRJnlea9/nRlkgxG8a3jKDosmX3lpsNL/H1u3Rq4I2YVSWyEweQ IOz944xrzWoTFMpFFJqOV6RnVWoQLL1bG4vLFSAmoxM8G97rBVaDNpDRpD2FShEsa6E8 oNvQ== X-Gm-Message-State: AOAM533YWjqMK9kfw5S0eEo5InP8pjSE2gknfW4uztV3tsVF/phfXSfh jNv1ImPUu525Hk40bYmGTMn9i2C0OEtZdg1f0VY= X-Received: by 2002:a65:67c1:0:b0:3fd:ebd6:5dab with SMTP id b1-20020a6567c1000000b003fdebd65dabmr5565770pgs.75.1655232727870; Tue, 14 Jun 2022 11:52:07 -0700 (PDT) MIME-Version: 1.0 References: <20220606214414.736109-1-shy828301@gmail.com> <20220606214414.736109-7-shy828301@gmail.com> In-Reply-To: From: Yang Shi Date: Tue, 14 Jun 2022 11:51:55 -0700 Message-ID: Subject: Re: [v3 PATCH 6/7] mm: thp: kill __transhuge_page_enabled() To: "Zach O'Keefe" Cc: Vlastimil Babka , "Kirill A. Shutemov" , Matthew Wilcox , Andrew Morton , Linux MM , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 13, 2022 at 7:54 AM Zach O'Keefe wrote: > > On 10 Jun 14:07, Yang Shi wrote: > > On Fri, Jun 10, 2022 at 10:24 AM Yang Shi wrote: > > > > > > On Thu, Jun 9, 2022 at 7:22 PM Zach O'Keefe wrote: > > > > > > > > On Mon, Jun 6, 2022 at 2:44 PM Yang Shi wrote: > > > > > > > > > > The page fault path checks THP eligibility with > > > > > __transhuge_page_enabled() which does the similar thing as > > > > > hugepage_vma_check(), so use hugepage_vma_check() instead. > > > > > > > > > > However page fault allows DAX and !anon_vma cases, so added a new flag, > > > > > in_pf, to hugepage_vma_check() to make page fault work correctly. > > > > > > > > > > The in_pf flag is also used to skip shmem and file THP for page fault > > > > > since shmem handles THP in its own shmem_fault() and file THP allocation > > > > > on fault is not supported yet. > > > > > > > > > > Also remove hugepage_vma_enabled() since hugepage_vma_check() is the > > > > > only caller now, it is not necessary to have a helper function. > > > > > > > > > > Signed-off-by: Yang Shi > > > > > --- > > > > > fs/proc/task_mmu.c | 2 +- > > > > > include/linux/huge_mm.h | 57 ++------------------------------------ > > > > > include/linux/khugepaged.h | 2 +- > > > > > mm/huge_memory.c | 25 ++++++++++++----- > > > > > mm/khugepaged.c | 8 +++--- > > > > > mm/memory.c | 7 +++-- > > > > > 6 files changed, 31 insertions(+), 70 deletions(-) > > > > > > > > > > diff --git a/fs/proc/task_mmu.c b/fs/proc/task_mmu.c > > > > > index fd79566e204c..a0850303baec 100644 > > > > > --- a/fs/proc/task_mmu.c > > > > > +++ b/fs/proc/task_mmu.c > > > > > @@ -860,7 +860,7 @@ static int show_smap(struct seq_file *m, void *v) > > > > > __show_smap(m, &mss, false); > > > > > > > > > > seq_printf(m, "THPeligible: %d\n", > > > > > - hugepage_vma_check(vma, vma->vm_flags, true)); > > > > > + hugepage_vma_check(vma, vma->vm_flags, true, false)); > > > > > > > > > > if (arch_pkeys_enabled()) > > > > > seq_printf(m, "ProtectionKey: %8u\n", vma_pkey(vma)); > > > > > diff --git a/include/linux/huge_mm.h b/include/linux/huge_mm.h > > > > > index f561c3e16def..d478e8875023 100644 > > > > > --- a/include/linux/huge_mm.h > > > > > +++ b/include/linux/huge_mm.h > > > > > @@ -153,48 +153,6 @@ static inline bool transhuge_vma_suitable(struct vm_area_struct *vma, > > > > > return true; > > > > > } > > > > > > > > > > -static inline bool transhuge_vma_enabled(struct vm_area_struct *vma, > > > > > - unsigned long vm_flags) > > > > > -{ > > > > > - /* Explicitly disabled through madvise. */ > > > > > - if ((vm_flags & VM_NOHUGEPAGE) || > > > > > - test_bit(MMF_DISABLE_THP, &vma->vm_mm->flags)) > > > > > - return false; > > > > > - return true; > > > > > -} > > > > > - > > > > > -/* > > > > > - * to be used on vmas which are known to support THP. > > > > > - * Use transparent_hugepage_active otherwise > > > > > - */ > > > > > -static inline bool __transparent_hugepage_enabled(struct vm_area_struct *vma) > > > > > -{ > > > > > - > > > > > - /* > > > > > - * If the hardware/firmware marked hugepage support disabled. > > > > > - */ > > > > > - if (transparent_hugepage_flags & (1 << TRANSPARENT_HUGEPAGE_NEVER_DAX)) > > > > > - return false; > > > > > - > > > > > - if (!transhuge_vma_enabled(vma, vma->vm_flags)) > > > > > - return false; > > > > > - > > > > > - if (vma_is_temporary_stack(vma)) > > > > > - return false; > > > > > - > > > > > - if (transparent_hugepage_flags & (1 << TRANSPARENT_HUGEPAGE_FLAG)) > > > > > - return true; > > > > > - > > > > > - if (vma_is_dax(vma)) > > > > > - return true; > > > > > - > > > > > - if (transparent_hugepage_flags & > > > > > - (1 << TRANSPARENT_HUGEPAGE_REQ_MADV_FLAG)) > > > > > - return !!(vma->vm_flags & VM_HUGEPAGE); > > > > > - > > > > > - return false; > > > > > -} > > > > > - > > > > > static inline bool file_thp_enabled(struct vm_area_struct *vma) > > > > > { > > > > > struct inode *inode; > > > > > @@ -211,7 +169,7 @@ static inline bool file_thp_enabled(struct vm_area_struct *vma) > > > > > > > > > > bool hugepage_vma_check(struct vm_area_struct *vma, > > > > > unsigned long vm_flags, > > > > > - bool smaps); > > > > > + bool smaps, bool in_pf); > > > > > > > > > > #define transparent_hugepage_use_zero_page() \ > > > > > (transparent_hugepage_flags & \ > > > > > @@ -355,11 +313,6 @@ static inline bool folio_test_pmd_mappable(struct folio *folio) > > > > > return false; > > > > > } > > > > > > > > > > -static inline bool __transparent_hugepage_enabled(struct vm_area_struct *vma) > > > > > -{ > > > > > - return false; > > > > > -} > > > > > - > > > > > static inline bool transhuge_vma_size_ok(struct vm_area_struct *vma) > > > > > { > > > > > return false; > > > > > @@ -371,15 +324,9 @@ static inline bool transhuge_vma_suitable(struct vm_area_struct *vma, > > > > > return false; > > > > > } > > > > > > > > > > -static inline bool transhuge_vma_enabled(struct vm_area_struct *vma, > > > > > - unsigned long vm_flags) > > > > > -{ > > > > > - return false; > > > > > -} > > > > > - > > > > > static inline bool hugepage_vma_check(struct vm_area_struct *vma, > > > > > unsigned long vm_flags, > > > > > - bool smaps) > > > > > + bool smaps, bool in_pf) > > > > > { > > > > > return false; > > > > > } > > > > > diff --git a/include/linux/khugepaged.h b/include/linux/khugepaged.h > > > > > index 8a6452e089ca..e047be601268 100644 > > > > > --- a/include/linux/khugepaged.h > > > > > +++ b/include/linux/khugepaged.h > > > > > @@ -55,7 +55,7 @@ static inline void khugepaged_enter(struct vm_area_struct *vma, > > > > > { > > > > > if (!test_bit(MMF_VM_HUGEPAGE, &vma->vm_mm->flags) && > > > > > khugepaged_enabled()) { > > > > > - if (hugepage_vma_check(vma, vm_flags, false)) > > > > > + if (hugepage_vma_check(vma, vm_flags, false, false)) > > > > > __khugepaged_enter(vma->vm_mm); > > > > > } > > > > > } > > > > > diff --git a/mm/huge_memory.c b/mm/huge_memory.c > > > > > index bc8370856e85..b95786ada466 100644 > > > > > --- a/mm/huge_memory.c > > > > > +++ b/mm/huge_memory.c > > > > > @@ -71,17 +71,25 @@ unsigned long huge_zero_pfn __read_mostly = ~0UL; > > > > > > > > > > bool hugepage_vma_check(struct vm_area_struct *vma, > > > > > unsigned long vm_flags, > > > > > - bool smaps) > > > > > + bool smaps, bool in_pf) > > > > > { > > > > > - if (!transhuge_vma_enabled(vma, vm_flags)) > > > > > + /* Explicitly disabled through madvise or prctl. */ > > > > > > > > Or s390 kvm (not that this has to be exhaustively maintained). > > > > > > > > > + if ((vm_flags & VM_NOHUGEPAGE) || > > > > > + test_bit(MMF_DISABLE_THP, &vma->vm_mm->flags)) > > > > > + return false; > > > > > + /* > > > > > + * If the hardware/firmware marked hugepage support disabled. > > > > > + */ > > > > > + if (transparent_hugepage_flags & (1 << TRANSPARENT_HUGEPAGE_NEVER_DAX)) > > > > > return false; > > > > > > > > This introduces an extra check for khugepaged path. I don't know > > > > enough about TRANSPARENT_HUGEPAGE_NEVER_DAX, but I assume this is ok? > > > > What would have happened previously if khugepaged tried to collapse > > > > this memory? > > > > > > Please refer to commit bae849538157 ("mm/pmem: avoid inserting > > > hugepage PTE entry with fsdax if hugepage support is disabled") for > > > why this flag was introduced. > > > > > > It is set if hardware doesn't support hugepages, and khugepaged > > > doesn't collapse since khugepaged won't be started at all. > > > > > > But this flag needs to be checked in the page fault path. > > > > > Thanks for the ref to the commit. I'm not sure I understand it in its entirety, > but at least I can tell khugepaged won't be started :) > > > > > > > > > > + /* Special VMA and hugetlb VMA */ > > > > > if (vm_flags & VM_NO_KHUGEPAGED) > > > > > return false; > > > > > > > > This adds an extra check along the fault path. Is it also safe to add? > > > > > > I think it is safe since hugepage_vma_check() is just used by THP. > > > Hugetlb has its own page fault handler. > > > > I just found one exception. The fuse dax has VM_MIXEDMAP set for its > > vmas, so this check should be moved after vma_is_dax() check. > > > > AFAICT, only dax supports huge_fault() and dax vmas don't have any > > VM_SPECIAL flags set other than fuse. > > > > Ordering wrt VM_NO_KHUGEPAGED check seems fine. We could always use in_pf to opt > out of this check, but I think itemizing where collapse and fault paths are > different would be good. Maybe using "in_pf" is easier to follow? Depending on the order of check seems subtle although we already did so for shmem (shmem check must be done before hugepage flags check). > > > > > > > > > > > > > - /* Don't run khugepaged against DAX vma */ > > > > > + /* khugepaged doesn't collapse DAX vma, but page fault is fine. */ > > > > > if (vma_is_dax(vma)) > > > > > - return false; > > > > > + return in_pf; > > > > > > > > I assume vma_is_temporary_stack() and vma_is_dax() is mutually exclusive. > > > > > > I think so. > > > > > > > > > > > > if (vma->vm_file && !IS_ALIGNED((vma->vm_start >> PAGE_SHIFT) - > > > > > vma->vm_pgoff, HPAGE_PMD_NR)) > > > > > @@ -91,7 +99,7 @@ bool hugepage_vma_check(struct vm_area_struct *vma, > > > > > return false; > > > > > > > > > > /* Enabled via shmem mount options or sysfs settings. */ > > > > > - if (shmem_file(vma->vm_file)) > > > > > + if (!in_pf && shmem_file(vma->vm_file)) > > > > > return shmem_huge_enabled(vma); > > > > > > > > Will shmem_file() ever be true in the fault path? Or is this just an > > > > optimization? > > > > > > It could be true. But shmem has its own implementation for huge page > > > fault and doesn't implement huge_fault() in its vm_operations, so it > > > will fallback even though "in_pf" is not checked. > > > > > > But xfs does have huge_fault() implemented, so it may try to allocate > > > THP for non-DAX xfs files. So the "in_pf" flag is introduced to handle > > > this. Since we need this flag anyway, why not use it to return earlier > > > for shmem instead of relying on fallback. > > > > > > Anyway this is all because __transparent_huge_enabled() is replaced by > > > hugepage_vma_check(). > > > > > Thanks for the explanation. Admittedly I don't fully understand the involvement > of xfs in the shmem case, but general "fail early" logic seems fine to me. > > > > > if (!khugepaged_enabled()) > > > > > @@ -102,7 +110,7 @@ bool hugepage_vma_check(struct vm_area_struct *vma, > > > > > return false; > > > > > > > > > > /* Only regular file is valid */ > > > > > - if (file_thp_enabled(vma)) > > > > > + if (!in_pf && file_thp_enabled(vma)) > > > > > return true; > > > > > > > > Likewise for file_thp_enabled() > > > > > > Yes, same as the above. > > Ditto. > > > > > > > > > > if (!vma_is_anonymous(vma)) > > > > > @@ -114,9 +122,12 @@ bool hugepage_vma_check(struct vm_area_struct *vma, > > > > > /* > > > > > * THPeligible bit of smaps should show 1 for proper VMAs even > > > > > * though anon_vma is not initialized yet. > > > > > + * > > > > > + * Allow page fault since anon_vma may be not initialized until > > > > > + * the first page fault. > > > > > */ > > > > > if (!vma->anon_vma) > > > > > - return smaps; > > > > > + return (smaps || in_pf); > > > > > > > > > > return true; > > > > > } > > > > > diff --git a/mm/khugepaged.c b/mm/khugepaged.c > > > > > index aa0769e3b0d9..ab6183c5489f 100644 > > > > > --- a/mm/khugepaged.c > > > > > +++ b/mm/khugepaged.c > > > > > @@ -473,7 +473,7 @@ void khugepaged_enter_vma(struct vm_area_struct *vma, > > > > > { > > > > > if (!test_bit(MMF_VM_HUGEPAGE, &vma->vm_mm->flags) && > > > > > khugepaged_enabled()) { > > > > > - if (hugepage_vma_check(vma, vm_flags, false)) > > > > > + if (hugepage_vma_check(vma, vm_flags, false, false)) > > > > > __khugepaged_enter(vma->vm_mm); > > > > > } > > > > > } > > > > > @@ -918,7 +918,7 @@ static int hugepage_vma_revalidate(struct mm_struct *mm, unsigned long address, > > > > > > > > > > if (!transhuge_vma_suitable(vma, address)) > > > > > return SCAN_ADDRESS_RANGE; > > > > > - if (!hugepage_vma_check(vma, vma->vm_flags, false)) > > > > > + if (!hugepage_vma_check(vma, vma->vm_flags, false, false)) > > > > > return SCAN_VMA_CHECK; > > > > > return 0; > > > > > } > > > > > @@ -1399,7 +1399,7 @@ void collapse_pte_mapped_thp(struct mm_struct *mm, unsigned long addr) > > > > > * the valid THP. Add extra VM_HUGEPAGE so hugepage_vma_check() > > > > > * will not fail the vma for missing VM_HUGEPAGE > > > > > */ > > > > > - if (!hugepage_vma_check(vma, vma->vm_flags | VM_HUGEPAGE, false)) > > > > > + if (!hugepage_vma_check(vma, vma->vm_flags | VM_HUGEPAGE, false, false)) > > > > > return; > > > > > > > > > > /* Keep pmd pgtable for uffd-wp; see comment in retract_page_tables() */ > > > > > @@ -2089,7 +2089,7 @@ static unsigned int khugepaged_scan_mm_slot(unsigned int pages, > > > > > progress++; > > > > > break; > > > > > } > > > > > - if (!hugepage_vma_check(vma, vma->vm_flags, false)) { > > > > > + if (!hugepage_vma_check(vma, vma->vm_flags, false, false)) { > > > > > skip: > > > > > progress++; > > > > > continue; > > > > > diff --git a/mm/memory.c b/mm/memory.c > > > > > index bc5d40eec5d5..673f7561a30a 100644 > > > > > --- a/mm/memory.c > > > > > +++ b/mm/memory.c > > > > > @@ -4962,6 +4962,7 @@ static vm_fault_t __handle_mm_fault(struct vm_area_struct *vma, > > > > > .gfp_mask = __get_fault_gfp_mask(vma), > > > > > }; > > > > > struct mm_struct *mm = vma->vm_mm; > > > > > + unsigned long vm_flags = vma->vm_flags; > > > > > pgd_t *pgd; > > > > > p4d_t *p4d; > > > > > vm_fault_t ret; > > > > > @@ -4975,7 +4976,8 @@ static vm_fault_t __handle_mm_fault(struct vm_area_struct *vma, > > > > > if (!vmf.pud) > > > > > return VM_FAULT_OOM; > > > > > retry_pud: > > > > > - if (pud_none(*vmf.pud) && __transparent_hugepage_enabled(vma)) { > > > > > + if (pud_none(*vmf.pud) && > > > > > + hugepage_vma_check(vma, vm_flags, false, true)) { > > > > > ret = create_huge_pud(&vmf); > > > > > if (!(ret & VM_FAULT_FALLBACK)) > > > > > return ret; > > > > > @@ -5008,7 +5010,8 @@ static vm_fault_t __handle_mm_fault(struct vm_area_struct *vma, > > > > > if (pud_trans_unstable(vmf.pud)) > > > > > goto retry_pud; > > > > > > > > > > - if (pmd_none(*vmf.pmd) && __transparent_hugepage_enabled(vma)) { > > > > > + if (pmd_none(*vmf.pmd) && > > > > > + hugepage_vma_check(vma, vm_flags, false, true)) { > > > > > ret = create_huge_pmd(&vmf); > > > > > if (!(ret & VM_FAULT_FALLBACK)) > > > > > return ret; > > > > > -- > > > > > 2.26.3 > > > > > > > > > >