Received: by 2002:a05:7412:3b8b:b0:fc:a2b0:25d7 with SMTP id nd11csp3095937rdb; Tue, 13 Feb 2024 06:52:32 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCXw6Lu6WwxhcPjWmpiubkUp0XHHXNKuns7ALAWg9jHFJAsQnHFCwBmpXrR3CYoPFSy/aeppMhLuJm6opttWS+d35fWblopUWKu1dosn2w== X-Google-Smtp-Source: AGHT+IGmx2V48vvbURIDVvX9xgbUiVBHQmAVAk5iwAzSabUqBwX/5cF1YukgoEOwchRMtgyWEekl X-Received: by 2002:ac8:570f:0:b0:42c:37b1:a5f8 with SMTP id 15-20020ac8570f000000b0042c37b1a5f8mr15257323qtw.62.1707835952188; Tue, 13 Feb 2024 06:52:32 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707835952; cv=pass; d=google.com; s=arc-20160816; b=k8nTw3ao4PENcD60BkSfABqvr7hhidk0LxgpWH4eWKIhbrsi9l30YfLh3lwz/iiy8Q YR8v+z4YTbmOzpAY4WuEfTdmXjLI4dRpVmDPSpOTL6fMHaQf8KgZzSdM9/0yVtJ9wdkO zxhI7wKoUmzbNVqrQcm4llbsOrlNr2dlkTkB/pLC1Kn3yuGfMu+bDh9r7kJWaTMx6tnn Utj00mY7MhrhMPAjQXn1A+5VdAaUbW3A2zKQuqx3q+DywjoQ0ROqXaH/amE5w0yblFUJ picik3WhCnDeLqQg0nHzlLk8KuerCYj+S9PT89gbHJ+uz0Oaxzg+Q20ElS9iumzF4aXZ z/Rg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to:subject :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :date:dkim-signature:message-id; bh=7kiEddb6ZgbgAcQqtUc29c6kM6P5RdAUD0eQtc6YWJ4=; fh=fSRT6vVMiBma+fAc9kZks5lyqNuz7lBCOfhnIlRZnQc=; b=VuV+N3BQoVg1c7n+fa7pt36xZGPxSkX5WVDLG9fX77XlWzUhMNkShK90h3yRr7UR0J Q+Rf59N3k9dFEuZMz2Kk9j618JEjraUtZ+yADgucO62rHJ6WbwGU8iFLLJs2rgWgjC2E nz8zyFS3N2/85FgQTLt2ujgldu+0hV1qeeILJXJxryOfg0ja+pi5gB1jSBmVKUKbgdV1 yIxAlSlUhSLe6Z4wKJ5e2e+E5kz3SDoEbk3l4e+mcp/YdpWEVYOG/6CWms++G+S8g5L8 ZGE5wLzCsJ5UNXO3Sty72z0DYAmnZSjQVn1TW/FKzxtxr2RL41/JQ9nisWNZGDPkoZHe cShA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=HDPjwyQq; arc=pass (i=1 spf=pass spfdomain=linux.dev dkim=pass dkdomain=linux.dev dmarc=pass fromdomain=linux.dev); spf=pass (google.com: domain of linux-kernel+bounces-63721-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-63721-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev X-Forwarded-Encrypted: i=2; AJvYcCUKf+mGBNPMQotC7EnOwhN+OyVUKZP1bZ3CsZJwjWDyGaHsN/IGGfkbGkTmXHj6mvTQd7GMC3Gbe8gidR4cIJp8AEFpb6Rtb7gz5whgug== Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id dv12-20020a05620a1b8c00b0078725b29fb2si278923qkb.28.2024.02.13.06.52.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 13 Feb 2024 06:52:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-63721-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=HDPjwyQq; arc=pass (i=1 spf=pass spfdomain=linux.dev dkim=pass dkdomain=linux.dev dmarc=pass fromdomain=linux.dev); spf=pass (google.com: domain of linux-kernel+bounces-63721-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-63721-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id E77381C228CA for ; Tue, 13 Feb 2024 14:52:31 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 68D805A7B7; Tue, 13 Feb 2024 14:52:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="HDPjwyQq" Received: from out-186.mta1.migadu.com (out-186.mta1.migadu.com [95.215.58.186]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5A02757884 for ; Tue, 13 Feb 2024 14:52:20 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=95.215.58.186 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707835943; cv=none; b=oufHmSkfX9EyDbJuCP5Yi134XZzIIQ2CbsfeQWP98wEpcUhkgqTeWqbS3f8LfzgLWXxiDWMErFFqJ62HbIlaBi4ouWJ1UfuZt3CKwLcGyoLZJfm7MK7DU+g6BzEOkbvU9bItbq9INofmtMS6zCX/SgjWfERN0lJGFUkJ0U0BRQQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707835943; c=relaxed/simple; bh=4Qwjb6ZrAdOSeTS+D+f4Gq6FIh461czGIAR2cjNXXCE=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=WzTGd8be+t3NWJDBfudhi2QFtU49zvE8omtJsXGAJqzejcR2ZBWZcrtdQg8u7nBouiAdX2jShBWBkpjI5vLpRba71+wlijeUPSKHLYSgokfSFk6EmvFm+I21VRERNbTvnlaWy5LDUZnilYYkyzcAdxFuemBk47C8jNJKjB8disE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev; spf=pass smtp.mailfrom=linux.dev; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b=HDPjwyQq; arc=none smtp.client-ip=95.215.58.186 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev Message-ID: <89b3bee3-5ee3-4b75-99e3-881b759e79de@linux.dev> DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1707835938; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=7kiEddb6ZgbgAcQqtUc29c6kM6P5RdAUD0eQtc6YWJ4=; b=HDPjwyQqT5PKJchEPXB/BV8P4RY1AAtmjjCldRRg1f38Fa/Z2tJE0lRhLTsJhJaYTHeVxK zFArtqla2pFR+9kJKEqOM9UsIxtOdKxak7k1dmXdR0HuV7NGK9rcDeyrZw5Vi5JtGs0jTj s7DVNIufZ5xLN+8zHG3w2+FIQdH4txk= Date: Tue, 13 Feb 2024 22:52:11 +0800 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Subject: Re: [PATCH v1 1/2] padata: downgrade padata_do_multithreaded to serial execution for non-SMP To: Gang Li , Andrew Morton , Steffen Klassert , Daniel Jordan , Jane Chu , "Paul E . McKenney" , Randy Dunlap , kernel test robot , Gang Li Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org References: <20240213111347.3189206-1-gang.li@linux.dev> <20240213111347.3189206-2-gang.li@linux.dev> X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Muchun Song In-Reply-To: <20240213111347.3189206-2-gang.li@linux.dev> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Migadu-Flow: FLOW_OUT On 2024/2/13 19:13, Gang Li wrote: > Randy Dunlap and kernel test robot reported a warning: > > ``` > WARNING: unmet direct dependencies detected for PADATA > Depends on [n]: SMP [=n] > Selected by [y]: > - HUGETLBFS [=y] && (X86 [=y] || SPARC64 || ARCH_SUPPORTS_HUGETLBFS [=n] || BROKEN [=n]) && (SYSFS [=y] || SYSCTL [=n]) > ``` > > hugetlb parallelization depends on PADATA, and PADATA depends on SMP. > > PADATA consists of two distinct functionality: One part is > padata_do_multithreaded which disregards order and simply divides > tasks into several groups for parallel execution. Hugetlb > init parallelization depends on padata_do_multithreaded. > > The other part is composed of a set of APIs that, while handling data in > an out-of-order parallel manner, can eventually return the data with > ordered sequence. Currently Only `crypto/pcrypt.c` use them. > > All users of PADATA of non-SMP case currently only use > padata_do_multithreaded. It is easy to implement a serial one in > include/linux/padata.h. And it is not necessary to implement another > functionality unless the only user of crypto/pcrypt.c does not depend on > SMP in the future. > > Fixes: a2cefb08be66 ("hugetlb: have CONFIG_HUGETLBFS select CONFIG_PADATA") > Reported-by: Randy Dunlap > Closes: https://lore.kernel.org/lkml/ec5dc528-2c3c-4444-9e88-d2c48395b433@infradead.org/ > Reported-by: kernel test robot > Closes: https://lore.kernel.org/oe-kbuild-all/202402020454.6EPkP1hi-lkp@intel.com/ > Signed-off-by: Gang Li > --- > fs/Kconfig | 2 +- > include/linux/padata.h | 13 +++++++++---- > 2 files changed, 10 insertions(+), 5 deletions(-) > > diff --git a/fs/Kconfig b/fs/Kconfig > index 4a51331f172e5..7963939592d70 100644 > --- a/fs/Kconfig > +++ b/fs/Kconfig > @@ -261,7 +261,7 @@ menuconfig HUGETLBFS > depends on X86 || SPARC64 || ARCH_SUPPORTS_HUGETLBFS || BROKEN > depends on (SYSFS || SYSCTL) > select MEMFD_CREATE > - select PADATA > + select PADATA if SMP I'd like to drop this dependence since HugeTLB does not depend on PADATA anymore. If some users take care about the kernel image size, it also can disable PADATA individually. > help > hugetlbfs is a filesystem backing for HugeTLB pages, based on > ramfs. For architectures that support it, say Y here and read > diff --git a/include/linux/padata.h b/include/linux/padata.h > index 8f418711351bc..7b84eb7d73e7f 100644 > --- a/include/linux/padata.h > +++ b/include/linux/padata.h > @@ -180,10 +180,6 @@ struct padata_instance { > > #ifdef CONFIG_PADATA > extern void __init padata_init(void); > -#else > -static inline void __init padata_init(void) {} > -#endif > - > extern struct padata_instance *padata_alloc(const char *name); > extern void padata_free(struct padata_instance *pinst); > extern struct padata_shell *padata_alloc_shell(struct padata_instance *pinst); > @@ -194,4 +190,13 @@ extern void padata_do_serial(struct padata_priv *padata); > extern void __init padata_do_multithreaded(struct padata_mt_job *job); > extern int padata_set_cpumask(struct padata_instance *pinst, int cpumask_type, > cpumask_var_t cpumask); > +#else > +static inline void __init padata_init(void) {} > +static inline void __init padata_do_multithreaded(struct padata_mt_job *job) > +{ > + if (job->size) I think we could drop this check, at least now there is no users will pass a zero of ->size to this function, and even if someone does in the future, I think it is really a corner case, it is unnecessary to optimize it and ->thread_fn is supporsed to handle case of zero size if it dose pass a zero size. Thanks. > + job->thread_fn(job->start, job->start + job->size, job->fn_arg); > +} > +#endif > + > #endif