Received: by 2002:a05:7412:b795:b0:e2:908c:2ebd with SMTP id iv21csp4431rdb; Wed, 1 Nov 2023 14:57:26 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEqaoy+VUXHzxXwfluKK30YutnnoGODS4nit1gXj+dRSqvWH/z6CGjGw/fOWImu1Yd/aMX9 X-Received: by 2002:a54:4588:0:b0:3b2:dd36:dec0 with SMTP id z8-20020a544588000000b003b2dd36dec0mr18761951oib.4.1698875846711; Wed, 01 Nov 2023 14:57:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698875846; cv=none; d=google.com; s=arc-20160816; b=td/YNNwCM93rmJNEdV1r7AZ2zUfxG67nn6gbP27dHfCnkMSv9R8VIVvXj1Sz5gcpap 5Qtp5gmmIez06D+BgKATtCgWduRXMyvYmmxEvYSrYYr4wV93Wc0UPl9Jrn+hM1CwyfA9 J2hP3/GlupWYdROAipSYkzW+cc/Qgs2DQv6FQ7tWn25DZo6tNfvPxcWIiTmTGRp8Mfrd Qfm+ZyCxyCKoxp/GLw93+HzBb62mITiye5uQtin7VVq8wEPqAtsAUs6bBTzN0cKYLygJ G6iuQI/H4paLtl1aRA7b2RNmP3ygjdWtovNyDv+OlfG78i/ZqDGRWthVFvu7ZCBi2W2s skAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:to:from:date :dkim-signature; bh=OXKg7iP77CusroG9lg9fQPh6opCVjYUl9CRe3reT2o4=; fh=L2B4DrlN0wUkQJYiupSsseYtG31BcMhvfY56/nmrc9c=; b=uS7QfXOSLPs6QVZ4LVZL8dP3Yo9Btuyz+eu3eZVMcOSjhEN8Hnau9JQ7/gjvyuTM8t oeaWS68TEf/7fr7njN34iblgcOfqshC195O5Qk5kekmP1uGuTf/1IMQirJmTNSnhzu8m xYm7zzouOGV1IVfz7Khp7rC+Duc2xXozOpi1blWXsDVX9rUNmWpwzvPNhU+E0xDlxauN NnyQ2amL8f2ppt6hbGbvk7VA0k0SwVrP8xNhFlAQFqX7lQvvf4QoMB4kSJcAchhr3vtL 2YZb8cc/JykBSyhDDbHdlr4P2eFPo6WAMvxkktd1hqmJEHSmoF4EADUB+Qv4Q/K4NKy4 WZNg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=bnATcLlH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id s21-20020a056a0008d500b0068a65b26fc6si2530270pfu.43.2023.11.01.14.57.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 01 Nov 2023 14:57:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=bnATcLlH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 0329B8027162; Wed, 1 Nov 2023 14:57:22 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232007AbjKAV5A (ORCPT + 99 others); Wed, 1 Nov 2023 17:57:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37808 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231281AbjKAV47 (ORCPT ); Wed, 1 Nov 2023 17:56:59 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 153B6119; Wed, 1 Nov 2023 14:56:54 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 88281C433C7; Wed, 1 Nov 2023 21:56:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1698875813; bh=gno+Qq/S9t9Xx5vxCvbTys4gMgigrQ0DXVdnE3+iPpM=; h=Date:From:To:Subject:In-Reply-To:References:From; b=bnATcLlHnN/ATGsZYeuY1BQo/UULv5rGPJqin6da2KuPN1eZf/fcyMERYs8hh4hNv j09w+KxpI7ufcxWwezOQHRobfvkvcaotLlJuxFgx6neniBvAwKlVD96CGvykoZbP2P gJ3lR+JBYvKB0YmtJz9aLa46axH3ZqmVmwNFVKo8= Date: Wed, 1 Nov 2023 14:56:52 -0700 From: Andrew Morton To: Linus Torvalds , linux-mm@kvack.org, mm-commits@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [GIT PULL] MM updates for 6.7-rc1 Message-Id: <20231101145652.8ff234ca6c327c5e49e2b21f@linux-foundation.org> In-Reply-To: <20231101145447.60320c9044e7db4dba2d93e3@linux-foundation.org> References: <20231101145447.60320c9044e7db4dba2d93e3@linux-foundation.org> X-Mailer: Sylpheed 3.8.0beta1 (GTK+ 2.24.33; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.6 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Wed, 01 Nov 2023 14:57:22 -0700 (PDT) On Wed, 1 Nov 2023 14:54:47 -0700 Andrew Morton wrote: > vs bcachefs tree > https://lkml.kernel.org/r/20230913093553.4290421e@canb.auug.org.au > I shall send Stephen's conversion patch in reply to this email. From: Stephen Rothwell Subject: bcachefs: convert to dynamically allocated shrinkers Date: Tue, 12 Sep 2023 11:27:22 +1000 Link: https://lkml.kernel.org/r/20230913093553.4290421e@canb.auug.org.au Signed-off-by: Stephen Rothwell Reviewed-by: Qi Zheng Cc: Kent Overstreet Signed-off-by: Andrew Morton --- fs/bcachefs/btree_cache.c | 22 ++++++++++++---------- fs/bcachefs/btree_key_cache.c | 21 ++++++++++++--------- fs/bcachefs/btree_types.h | 4 ++-- fs/bcachefs/fs.c | 2 +- fs/bcachefs/sysfs.c | 2 +- 5 files changed, 28 insertions(+), 23 deletions(-) --- a/fs/bcachefs/btree_cache.c~bcachefs-convert-to-dynamically-allocated-shrinkers +++ a/fs/bcachefs/btree_cache.c @@ -285,8 +285,7 @@ static int btree_node_write_and_reclaim( static unsigned long bch2_btree_cache_scan(struct shrinker *shrink, struct shrink_control *sc) { - struct bch_fs *c = container_of(shrink, struct bch_fs, - btree_cache.shrink); + struct bch_fs *c = shrink->private_data; struct btree_cache *bc = &c->btree_cache; struct btree *b, *t; unsigned long nr = sc->nr_to_scan; @@ -384,8 +383,7 @@ out_nounlock: static unsigned long bch2_btree_cache_count(struct shrinker *shrink, struct shrink_control *sc) { - struct bch_fs *c = container_of(shrink, struct bch_fs, - btree_cache.shrink); + struct bch_fs *c = shrink->private_data; struct btree_cache *bc = &c->btree_cache; if (bch2_btree_shrinker_disabled) @@ -400,7 +398,7 @@ void bch2_fs_btree_cache_exit(struct bch struct btree *b; unsigned i, flags; - unregister_shrinker(&bc->shrink); + shrinker_free(bc->shrink); /* vfree() can allocate memory: */ flags = memalloc_nofs_save(); @@ -454,6 +452,7 @@ void bch2_fs_btree_cache_exit(struct bch int bch2_fs_btree_cache_init(struct bch_fs *c) { struct btree_cache *bc = &c->btree_cache; + struct shrinker *shrink; unsigned i; int ret = 0; @@ -473,12 +472,15 @@ int bch2_fs_btree_cache_init(struct bch_ mutex_init(&c->verify_lock); - bc->shrink.count_objects = bch2_btree_cache_count; - bc->shrink.scan_objects = bch2_btree_cache_scan; - bc->shrink.seeks = 4; - ret = register_shrinker(&bc->shrink, "%s/btree_cache", c->name); - if (ret) + shrink = shrinker_alloc(0, "%s/btree_cache", c->name); + if (!shrink) goto err; + bc->shrink = shrink; + shrink->count_objects = bch2_btree_cache_count; + shrink->scan_objects = bch2_btree_cache_scan; + shrink->seeks = 4; + shrink->private_data = c; + shrinker_register(shrink); return 0; err: --- a/fs/bcachefs/btree_key_cache.c~bcachefs-convert-to-dynamically-allocated-shrinkers +++ a/fs/bcachefs/btree_key_cache.c @@ -834,8 +834,7 @@ void bch2_btree_key_cache_drop(struct bt static unsigned long bch2_btree_key_cache_scan(struct shrinker *shrink, struct shrink_control *sc) { - struct bch_fs *c = container_of(shrink, struct bch_fs, - btree_key_cache.shrink); + struct bch_fs *c = shrink->private_data; struct btree_key_cache *bc = &c->btree_key_cache; struct bucket_table *tbl; struct bkey_cached *ck, *t; @@ -932,8 +931,7 @@ out: static unsigned long bch2_btree_key_cache_count(struct shrinker *shrink, struct shrink_control *sc) { - struct bch_fs *c = container_of(shrink, struct bch_fs, - btree_key_cache.shrink); + struct bch_fs *c = shrink->private_data; struct btree_key_cache *bc = &c->btree_key_cache; long nr = atomic_long_read(&bc->nr_keys) - atomic_long_read(&bc->nr_dirty); @@ -953,7 +951,7 @@ void bch2_fs_btree_key_cache_exit(struct int cpu; #endif - unregister_shrinker(&bc->shrink); + shrinker_free(bc->shrink); mutex_lock(&bc->lock); @@ -1027,6 +1025,7 @@ void bch2_fs_btree_key_cache_init_early( int bch2_fs_btree_key_cache_init(struct btree_key_cache *bc) { struct bch_fs *c = container_of(bc, struct bch_fs, btree_key_cache); + struct shrinker *shrink; #ifdef __KERNEL__ bc->pcpu_freed = alloc_percpu(struct btree_key_cache_freelist); @@ -1039,11 +1038,15 @@ int bch2_fs_btree_key_cache_init(struct bc->table_init_done = true; - bc->shrink.seeks = 0; - bc->shrink.count_objects = bch2_btree_key_cache_count; - bc->shrink.scan_objects = bch2_btree_key_cache_scan; - if (register_shrinker(&bc->shrink, "%s/btree_key_cache", c->name)) + shrink = shrinker_alloc(0, "%s/btree_key_cache", c->name); + if (!shrink) return -BCH_ERR_ENOMEM_fs_btree_cache_init; + bc->shrink = shrink; + shrink->seeks = 0; + shrink->count_objects = bch2_btree_key_cache_count; + shrink->scan_objects = bch2_btree_key_cache_scan; + shrink->private_data = c; + shrinker_register(shrink); return 0; } --- a/fs/bcachefs/btree_types.h~bcachefs-convert-to-dynamically-allocated-shrinkers +++ a/fs/bcachefs/btree_types.h @@ -163,7 +163,7 @@ struct btree_cache { unsigned used; unsigned reserve; atomic_t dirty; - struct shrinker shrink; + struct shrinker *shrink; /* * If we need to allocate memory for a new btree node and that @@ -321,7 +321,7 @@ struct btree_key_cache { bool table_init_done; struct list_head freed_pcpu; struct list_head freed_nonpcpu; - struct shrinker shrink; + struct shrinker *shrink; unsigned shrink_iter; struct btree_key_cache_freelist __percpu *pcpu_freed; --- a/fs/bcachefs/fs.c~bcachefs-convert-to-dynamically-allocated-shrinkers +++ a/fs/bcachefs/fs.c @@ -1904,7 +1904,7 @@ got_sb: sb->s_flags |= SB_POSIXACL; #endif - sb->s_shrink.seeks = 0; + sb->s_shrink->seeks = 0; vinode = bch2_vfs_inode_get(c, BCACHEFS_ROOT_SUBVOL_INUM); ret = PTR_ERR_OR_ZERO(vinode); --- a/fs/bcachefs/sysfs.c~bcachefs-convert-to-dynamically-allocated-shrinkers +++ a/fs/bcachefs/sysfs.c @@ -494,7 +494,7 @@ STORE(bch2_fs) sc.gfp_mask = GFP_KERNEL; sc.nr_to_scan = strtoul_or_return(buf); - c->btree_cache.shrink.scan_objects(&c->btree_cache.shrink, &sc); + c->btree_cache.shrink->scan_objects(c->btree_cache.shrink, &sc); } if (attr == &sysfs_btree_wakeup) _