Received: by 2002:ab2:3141:0:b0:1ed:23cc:44d1 with SMTP id i1csp178177lqg; Fri, 1 Mar 2024 01:38:39 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUpC0ZQAdIf53acHzpOsvLRKODuzJLmt//MpnZ12s6xrjUbyxYS/ytaAQ8B8pfYfzAf6Tvl4c3uxEpKwLorcEvWI769rthhgMg/ISK1zA== X-Google-Smtp-Source: AGHT+IFf/QFQ12fojuzxyEvu3LTnC7qI4F1Gm8tA0ZWx5tG9SZ299tsjc13UjyB0UDuKVP1xudNq X-Received: by 2002:a05:620a:40cb:b0:788:413:151d with SMTP id g11-20020a05620a40cb00b007880413151dmr1469712qko.48.1709285919518; Fri, 01 Mar 2024 01:38:39 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709285919; cv=pass; d=google.com; s=arc-20160816; b=GqR1WAl3RqNfzwrSJi4ldZanmmkJX0buDjJvqjMjZZzA7C7/1TVGzbsYApSsNbPFth WkiIjhpdQNk1uInhCVLmVtgl2v8d1/2WIZ8NqV0NDcTihzqh65Aajru3kIINBbQvdkQ/ xeF8St3fXWnDOjnIhXxRrFjbpj1tBZyCoTiHOG3RDsVWivmBU+f2xd5KUXLKFDCro5xE d69bZnsCJUzZmrqhbFkqvAtvE/Plr3HL/Vd141w8HipO/CuALdJzEpsz+AAPW2IsN5Vr 5jBX3dKKT+X5UhjDBbDdCps7IaaDgbCRB3TIe42Ore81HZcC4X6pNwT3TPfxZLe6Szni f1iQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:dkim-signature; bh=YKmEtjTnXln7/VNj8xxDI8nf+Gtv5ippRm2u0RVJG3k=; fh=YjL+G5pHeyfTSe+TVO4Ib666/L9IPR2KYnD2hMVGWao=; b=y93rWKgmq7IykEKTafym5SpkCGUQuuld0mmVmSkmY68CW9umM7m6Gv4PKMqf1N/jk8 P5Etv2srvnPVXOFH0wOixALiNUBLQPcx6dW6mKrAzMJ/4S8sm7bPFxmnYbso80+rLDrc HiKaRu1IwGpjhHNA4A04h5toGWlQpaS6uNGMx1U+V8Y8/RXfTyJwOQRdGCNcDmVQaLXj zVtaUDZ2uxzRdIj81URUkva1dwgYpPKeC/emWCsEiBijV2yhgOn5tLKyVRXhUctmGJYP +CsovufNQSOhNlQ2luvXYr6LHdM8+iIm8evT81gP3gFlw3Iv3+UQFQNchf1tKI7fHKal PjAw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=FA917maG; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-88195-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-88195-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id ya19-20020a05620a5e5300b00787b3743293si3129866qkn.236.2024.03.01.01.38.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 01 Mar 2024 01:38:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-88195-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=FA917maG; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-88195-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-88195-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id D807B1C224F4 for ; Fri, 1 Mar 2024 09:38:38 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9476C6A8B2; Fri, 1 Mar 2024 09:38:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="FA917maG" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 26CFD23BD for ; Fri, 1 Mar 2024 09:38:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709285912; cv=none; b=ZLNjYwuPLQfEfMgWRN3ovBBYz8mkg8grkmIuLayp2LNPDZG2jLN1uTjcsonQ3Oxl2S8dpvrXsUoSD6xu8mNZJh8bD2SeZLoHo9wm0zErnD59NWe171TfF400gZE47xGONF/mTSRwL+abp1PCQXBSQovNncC6Jal5omXSNeE0hz0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709285912; c=relaxed/simple; bh=12CUwUq/vKJDkJJA5cP5M8cYTr8O1/WClFwA7XF7EwI=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=UlHrFGuk9ttZ43yGgoEAIY7aAcfOYDEF0LKWngDGjPr9JcPj1MO2fRtUlQRvsKpVFAge48aQTMOKY1raa4cD9vqJWUiKFWT3EIEcXVlRyJm9YDxjW7eoOS8YzDWL7lQpJg07xbSwzuWvHAX4tc/+pYUWILwxxc4NGsmewrvxgWA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=FA917maG; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id C2AB2C433B1 for ; Fri, 1 Mar 2024 09:38:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1709285911; bh=12CUwUq/vKJDkJJA5cP5M8cYTr8O1/WClFwA7XF7EwI=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=FA917maGf4MBYDbGBw0rAPVgkgVEsNFrvr3JR+D+fVVNv4Lx854dlhtQK3wVZS1L1 BoOq6Q+CvEKYkqqAQmoT7tskFLRKw1rq7IUqCN+WbMnwo5davEE4qGuytwKWlaNEzi IXlG1PJI2RgPO/g1iQuB6K/wLoX/jQFvqTteQyxDDnf+qTWRbBBOd/ojQ5C/kpsZbS uCUjwH/BD3rjRj6OXEPNVpKV/84/MirgDdo15qbKkvLkFqFQl/tkX0BfBO6tE8En5O fc2FaFWIG1iq+nNeX9H5Tnzw4v+OeGhILO2xDr6wTr49cY7ojcRr6ES4ihxMctkBNA m5ST9yj6icmiA== Received: by mail-il1-f170.google.com with SMTP id e9e14a558f8ab-365b3d92354so11227325ab.1 for ; Fri, 01 Mar 2024 01:38:31 -0800 (PST) X-Forwarded-Encrypted: i=1; AJvYcCWV3c+Zj/CB9pySTPewolxdnaTCyCVpHNQSWALXvtqlkpfy7QiLe5nRjFAD5bcDGIMekWu6Wq6T+yJhyauEAtq+GpSmaK8iSifbfqwI X-Gm-Message-State: AOJu0YwpYVZhOwX20APkkxB8AOn7k2xJwqkLBUiIR7XnmTsUi99/eWkw BuqQR/ckGSQ3aOZwYhH8PZoB7PApp/Xk3Fp8JE8ZIgtXngdZ1LLw3gMRCpU9K3BtfprYyAjypaw U77ds/v/YmXsclNj6EnB7yzpyqVfpbI1kKcoB X-Received: by 2002:a05:6e02:b26:b0:365:9b65:c3c0 with SMTP id e6-20020a056e020b2600b003659b65c3c0mr1397089ilu.9.1709285910939; Fri, 01 Mar 2024 01:38:30 -0800 (PST) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <20240229-zswap-xarray-v2-1-e50284dfcdb1@kernel.org> <66a86e12-e567-4705-b683-0485276007d2@bytedance.com> <72d6388f-119d-421e-a326-3fdc2bbc373e@bytedance.com> In-Reply-To: <72d6388f-119d-421e-a326-3fdc2bbc373e@bytedance.com> From: Chris Li Date: Fri, 1 Mar 2024 01:38:18 -0800 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v2] zswap: replace RB tree with xarray To: Chengming Zhou Cc: Andrew Morton , linux-kernel@vger.kernel.org, linux-mm@kvack.org, Yosry Ahmed , Nhat Pham , Johannes Weiner , "Matthew Wilcox (Oracle)" , Barry Song Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Thu, Feb 29, 2024 at 11:24=E2=80=AFPM Chengming Zhou wrote: > > On 2024/3/1 02:58, Chris Li wrote: > > Hi Chengming, > > > > Thanks for the review and feedback. > > > > On Thu, Feb 29, 2024 at 1:44=E2=80=AFAM Chengming Zhou > > wrote: > >> > >> Hi Chris, > >> > >> On 2024/2/29 16:46, Chris Li wrote: > >>> Very deep RB tree requires rebalance at times. That > >>> contributes to the zswap fault latencies. Xarray does not > >>> need to perform tree rebalance. Replacing RB tree to xarray > >>> can have some small performance gain. > >>> > >>> One small difference is that xarray insert might fail with > >>> ENOMEM, while RB tree insert does not allocate additional > >>> memory. > >>> > >>> The zswap_entry size will reduce a bit due to removing the > >>> RB node, which has two pointers and a color field. Xarray > >>> store the pointer in the xarray tree rather than the > >>> zswap_entry. Every entry has one pointer from the xarray > >>> tree. Overall, switching to xarray should save some memory, > >>> if the swap entries are densely packed. > >>> > >>> Notice the zswap_rb_search and zswap_rb_insert always > >>> followed by zswap_rb_erase. Fold the entry erase into > >>> zswap_xa_search_and_erase and zswap_xa_insert. That saves > >>> one tree lookup as well. > >>> > >>> Remove zswap_invalidate_entry due to no need to call > >>> zswap_rb_erase any more. Use zswap_free_entry instead. > >>> > >>> The "struct zswap_tree" has been replaced by "struct xarray". > >>> The tree spin lock has transferred to the xarray lock. > >>> > >>> Thanks to Chengming for providing the kernel build test number. > >>> > >>> Run the kernel build testing 5 times for each version, averages: > >>> (memory.max=3D2GB, zswap shrinker and writeback enabled, one 50GB swa= pfile.) > >>> > >>> mm-266f922c0b5e zswap-xarray-test > >>> real 63.43 63.12 > >>> user 1063.78 1062.59 > >>> sys 272.49 265.66 > >>> > >>> The sys time is about 2.5% faster. > >>> > >>> Tested-by: Chengming Zhou > >>> --- > >>> > >>> > >>> Signed-off-by: Chris Li > >>> --- > >>> Changes in v2: > >>> - Replace struct zswap_tree with struct xarray. > >>> - Remove zswap_tree spinlock, use xarray lock instead. > >>> - Fold zswap_rb_erase() into zswap_xa_search_and_delete() and zswap_x= a_insert(). > >>> - Delete zswap_invalidate_entry(), use zswap_free_entry() instead. > >>> - Link to v1: https://lore.kernel.org/r/20240117-zswap-xarray-v1-0-6d= aa86c08fae@kernel.org > >>> --- > >>> mm/zswap.c | 173 +++++++++++++++++++++++----------------------------= ---------- > >>> 1 file changed, 64 insertions(+), 109 deletions(-) > >>> > >>> diff --git a/mm/zswap.c b/mm/zswap.c > >>> index 011e068eb355..ac9ef14d88be 100644 > >>> --- a/mm/zswap.c > >>> +++ b/mm/zswap.c > >>> @@ -20,7 +20,6 @@ > >>> #include > >>> #include > >>> #include > >>> -#include > >>> #include > >>> #include > >>> #include > >>> @@ -71,6 +70,8 @@ static u64 zswap_reject_compress_poor; > >>> static u64 zswap_reject_alloc_fail; > >>> /* Store failed because the entry metadata could not be allocated (r= are) */ > >>> static u64 zswap_reject_kmemcache_fail; > >>> +/* Store failed because xarray can't insert the entry*/ > >>> +static u64 zswap_reject_xarray_fail; > >>> > >>> /* Shrinker work queue */ > >>> static struct workqueue_struct *shrink_wq; > >>> @@ -196,7 +197,6 @@ static struct { > >>> * This structure contains the metadata for tracking a single compre= ssed > >>> * page within zswap. > >>> * > >>> - * rbnode - links the entry into red-black tree for the appropriate = swap type > >>> * swpentry - associated swap entry, the offset indexes into the red= -black tree > >>> * length - the length in bytes of the compressed page data. Needed= during > >>> * decompression. For a same value filled page length is 0,= and both > >>> @@ -208,7 +208,6 @@ static struct { > >>> * lru - handle to the pool's lru used to evict pages. > >>> */ > >>> struct zswap_entry { > >>> - struct rb_node rbnode; > >>> swp_entry_t swpentry; > >>> unsigned int length; > >>> struct zswap_pool *pool; > >>> @@ -220,12 +219,7 @@ struct zswap_entry { > >>> struct list_head lru; > >>> }; > >>> > >>> -struct zswap_tree { > >>> - struct rb_root rbroot; > >>> - spinlock_t lock; > >>> -}; > >>> - > >>> -static struct zswap_tree *zswap_trees[MAX_SWAPFILES]; > >>> +static struct xarray *zswap_trees[MAX_SWAPFILES]; > >>> static unsigned int nr_zswap_trees[MAX_SWAPFILES]; > >>> > >>> /* RCU-protected iteration */ > >>> @@ -253,10 +247,10 @@ static bool zswap_has_pool; > >>> * helpers and fwd declarations > >>> **********************************/ > >>> > >>> -static inline struct zswap_tree *swap_zswap_tree(swp_entry_t swp) > >>> +static inline struct xarray *swap_zswap_tree(swp_entry_t swp) > >>> { > >>> - return &zswap_trees[swp_type(swp)][swp_offset(swp) > >>> - >> SWAP_ADDRESS_SPACE_SHIFT]; > >>> + return zswap_trees[swp_type(swp)] + (swp_offset(swp) > >>> + >> SWAP_ADDRESS_SPACE_SHIFT); > >>> } > >>> > >>> #define zswap_pool_debug(msg, p) \ > >>> @@ -805,60 +799,38 @@ void zswap_memcg_offline_cleanup(struct mem_cgr= oup *memcg) > >>> } > >>> > >>> /********************************* > >>> -* rbtree functions > >>> +* xarray functions > >>> **********************************/ > >>> -static struct zswap_entry *zswap_rb_search(struct rb_root *root, pgo= ff_t offset) > >>> +static struct zswap_entry *zswap_xa_search_and_erase(struct xarray *= tree, pgoff_t offset) > >>> { > >>> - struct rb_node *node =3D root->rb_node; > >>> - struct zswap_entry *entry; > >>> - pgoff_t entry_offset; > >>> - > >>> - while (node) { > >>> - entry =3D rb_entry(node, struct zswap_entry, rbnode); > >>> - entry_offset =3D swp_offset(entry->swpentry); > >>> - if (entry_offset > offset) > >>> - node =3D node->rb_left; > >>> - else if (entry_offset < offset) > >>> - node =3D node->rb_right; > >>> - else > >>> - return entry; > >>> - } > >>> - return NULL; > >>> + return xa_erase(tree, offset); > >>> } > >>> > >>> /* > >>> + * Expects xa_lock to be held on entry. > >>> * In the case that a entry with the same offset is found, a pointer= to > >>> - * the existing entry is stored in dupentry and the function returns= -EEXIST > >>> + * the existing entry is stored in old and erased from the tree. > >>> + * Function return error on insert. > >>> */ > >>> -static int zswap_rb_insert(struct rb_root *root, struct zswap_entry = *entry, > >>> - struct zswap_entry **dupentry) > >>> +static int zswap_xa_insert(struct xarray *tree, struct zswap_entry *= entry, > >>> + struct zswap_entry **old) > >>> { > >>> - struct rb_node **link =3D &root->rb_node, *parent =3D NULL; > >>> - struct zswap_entry *myentry; > >>> - pgoff_t myentry_offset, entry_offset =3D swp_offset(entry->swpe= ntry); > >>> - > >>> - while (*link) { > >>> - parent =3D *link; > >>> - myentry =3D rb_entry(parent, struct zswap_entry, rbnode= ); > >>> - myentry_offset =3D swp_offset(myentry->swpentry); > >>> - if (myentry_offset > entry_offset) > >>> - link =3D &(*link)->rb_left; > >>> - else if (myentry_offset < entry_offset) > >>> - link =3D &(*link)->rb_right; > >>> - else { > >>> - *dupentry =3D myentry; > >>> - return -EEXIST; > >>> - } > >>> - } > >>> - rb_link_node(&entry->rbnode, parent, link); > >>> - rb_insert_color(&entry->rbnode, root); > >>> - return 0; > >>> -} > >>> + int err; > >>> + struct zswap_entry *e; > >>> + pgoff_t offset =3D swp_offset(entry->swpentry); > >>> > >>> -static void zswap_rb_erase(struct rb_root *root, struct zswap_entry = *entry) > >>> -{ > >>> - rb_erase(&entry->rbnode, root); > >>> - RB_CLEAR_NODE(&entry->rbnode); > >>> + e =3D __xa_store(tree, offset, entry, GFP_KERNEL); > >>> + err =3D xa_err(e); > >>> + > >>> + if (err) { > >>> + e =3D __xa_erase(tree, offset); > > > > zswap_xa_insert will always erase the old entry, even when __xa_store f= ails. > > > >>> + if (err =3D=3D -ENOMEM) > >>> + zswap_reject_alloc_fail++; > >>> + else > >>> + zswap_reject_xarray_fail++; > >>> + } > >>> + *old =3D e; > > > > Old pointer is set regardless of the error. > > Ok, I get it. The "old" pointer is always set on return. > > > > >>> + return err; > >>> } > >>> > >>> /********************************* > >>> @@ -872,7 +844,6 @@ static struct zswap_entry *zswap_entry_cache_allo= c(gfp_t gfp, int nid) > >>> entry =3D kmem_cache_alloc_node(zswap_entry_cache, gfp, nid); > >>> if (!entry) > >>> return NULL; > >>> - RB_CLEAR_NODE(&entry->rbnode); > >>> return entry; > >>> } > >>> > >>> @@ -914,17 +885,6 @@ static void zswap_entry_free(struct zswap_entry = *entry) > >>> zswap_update_total_size(); > >>> } > >>> > >>> -/* > >>> - * The caller hold the tree lock and search the entry from the tree, > >>> - * so it must be on the tree, remove it from the tree and free it. > >>> - */ > >>> -static void zswap_invalidate_entry(struct zswap_tree *tree, > >>> - struct zswap_entry *entry) > >>> -{ > >>> - zswap_rb_erase(&tree->rbroot, entry); > >>> - zswap_entry_free(entry); > >>> -} > >>> - > >>> /********************************* > >>> * compressed storage functions > >>> **********************************/ > >>> @@ -1113,7 +1073,9 @@ static void zswap_decompress(struct zswap_entry= *entry, struct page *page) > >>> static int zswap_writeback_entry(struct zswap_entry *entry, > >>> swp_entry_t swpentry) > >>> { > >>> - struct zswap_tree *tree; > >>> + struct xarray *tree; > >>> + pgoff_t offset =3D swp_offset(swpentry); > >>> + struct zswap_entry *e; > >>> struct folio *folio; > >>> struct mempolicy *mpol; > >>> bool folio_was_allocated; > >>> @@ -1150,19 +1112,14 @@ static int zswap_writeback_entry(struct zswap= _entry *entry, > >>> * be dereferenced. > >>> */ > >>> tree =3D swap_zswap_tree(swpentry); > >>> - spin_lock(&tree->lock); > >>> - if (zswap_rb_search(&tree->rbroot, swp_offset(swpentry)) !=3D e= ntry) { > >>> - spin_unlock(&tree->lock); > >>> + e =3D zswap_xa_search_and_erase(tree, offset); > >>> + if (e !=3D entry) { > >> > >> IIUC, here we should use xa_cmpxchg() instead of erasing it unconditio= nally. > > > > Good catch, I agree with your suggestion. I will spin a V3 to correct t= hat. > > > >> > >>> delete_from_swap_cache(folio); > >>> folio_unlock(folio); > >>> folio_put(folio); > >>> return -ENOMEM; > >>> } > >>> > >>> - /* Safe to deref entry after the entry is verified above. */ > >>> - zswap_rb_erase(&tree->rbroot, entry); > >>> - spin_unlock(&tree->lock); > >>> - > >>> zswap_decompress(entry, &folio->page); > >>> > >>> count_vm_event(ZSWPWB); > >>> @@ -1471,10 +1428,11 @@ bool zswap_store(struct folio *folio) > >>> { > >>> swp_entry_t swp =3D folio->swap; > >>> pgoff_t offset =3D swp_offset(swp); > >>> - struct zswap_tree *tree =3D swap_zswap_tree(swp); > >>> - struct zswap_entry *entry, *dupentry; > >>> + struct xarray *tree =3D swap_zswap_tree(swp); > >>> + struct zswap_entry *entry, *old; > >>> struct obj_cgroup *objcg =3D NULL; > >>> struct mem_cgroup *memcg =3D NULL; > >>> + int err; > >>> > >>> VM_WARN_ON_ONCE(!folio_test_locked(folio)); > >>> VM_WARN_ON_ONCE(!folio_test_swapcache(folio)); > >>> @@ -1562,21 +1520,25 @@ bool zswap_store(struct folio *folio) > >>> } > >>> > >>> /* map */ > >>> - spin_lock(&tree->lock); > >>> + xa_lock(tree); > >>> /* > >>> * The folio may have been dirtied again, invalidate the > >>> * possibly stale entry before inserting the new entry. > >>> */ > >>> - if (zswap_rb_insert(&tree->rbroot, entry, &dupentry) =3D=3D -EE= XIST) { > >>> - zswap_invalidate_entry(tree, dupentry); > >>> - WARN_ON(zswap_rb_insert(&tree->rbroot, entry, &dupentry= )); > >>> + err =3D zswap_xa_insert(tree, entry, &old); > >>> + if (old) > >>> + zswap_entry_free(old); > >> > >> Maybe it's safer to check old after !err, since "old" variable is not = initialized > >> to NULL, and zswap_xa_insert() maybe won't overwrite "old" to NULL whe= n err return? > > > > That is the intended behavior. > > > > See the above in zswap_xa_insert(). It will always erase and return > > "old" even when the __xa_store() has an error. > > That is because by the time zswap needs to store a new entry at this > > swap entry. The old data is already outdated. We should just remove > > the old data. If __xa_store failed due to out of memory. That is the > > same as allocating an entry out of memory. It is fine to fail > > swap_store. Then the folio will just stay in the swap cache for the > > next time. > > > > Do you see any ill effects can be caused by deleting the old entry on > > xa_insert error? > > No, you're right, we should always delete/free old zswap entry no matter > store success or fail. > > > > >>> + if (err) { > >>> + xa_unlock(tree); > >>> + goto free_zpool; > >>> } > >>> + > >>> if (entry->length) { > >>> INIT_LIST_HEAD(&entry->lru); > >>> zswap_lru_add(&zswap.list_lru, entry); > >>> atomic_inc(&zswap.nr_stored); > >>> } > >> > >> It seems that we can put this part out of the xarray lock section, the= n it's enough to > >> just use xa_insert(). > > I wanted to mean xa_store() here. > > > > > It is not enough protection. Consider this race: > > > > CPU1 CPU2 > > > > xa_insert() > > entry =3D swap_xa_search_and_erase() > > zswap_free_entry(entry) > > > > if (entry->length) > > ... > > CPU1 is using entry after free. > > Hmm, right, but I don't know how could this race happen? Since the folio = we store is > the owner of swap entry, which couldn't be deleted meanwhile, right? I will need to think about it more. Agree the current folio can't delete itself. It is possible the folio lock was enough to prevent the race. > > Another problem I just notice is that if xa_store() failed, zswap_same_fi= lled_pages > won't be correct. (Maybe we should move zswap_same_filled_pages inc) You are right, I miss the same filled pages. Will address that in V3. Chris