Received: by 2002:ab2:648c:0:b0:1ef:b27b:cc29 with SMTP id de12csp3375546lqb; Tue, 26 Mar 2024 11:35:57 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVNkptUD018ao51gLH0dWWjtEHzVYGluR5ZUM8z54rDtOwRPBzIpIaRWAA3+xJ4j0eO/UL/59JIL8x5t1Fey3uWBsZO086QWjeXU3Neag== X-Google-Smtp-Source: AGHT+IG/TbjfghaIuoVscwslriN58s3maCwzYkrBX8Sk2Ur2RUcs80PR4ARTzmtFEmQCaGAQXR3H X-Received: by 2002:ae9:f815:0:b0:78a:3eb8:5693 with SMTP id x21-20020ae9f815000000b0078a3eb85693mr10999424qkh.16.1711478157178; Tue, 26 Mar 2024 11:35:57 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711478157; cv=pass; d=google.com; s=arc-20160816; b=Pt3qTr8o1E3AfxXFsdtaP1cWy9zT4tRA3U7dYiRwLQyIJHJ+mFSZqL+ledDtMcJ1bP ZQ+5ePXxFHEuIc9SYKfAy8Hu5HrEZpeRBphe+NINj6HcO/JopW9635P3mvs5idE2sS4A Md3fH/dAjUyAUtzRVn0rABV/7WU1bqAjiNJEy5wxgVaxcnWfD2z4I9j2BFbPXmNN86wt yjJGr/2jWk66XV4imcV5Nu13pHNZh62zLK5Xsv3HsuqqAdUoKtmk7TPYBCxVI4LYphMk UUYl6vqpi48HR72KaKhGZQeHsQxv0GM0wWY7nCpYCmWe0YZiBJdZ3rWDN6W6981gWjUx 6EIw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:message-id:content-transfer-encoding:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:subject:date :from:dkim-signature; bh=Hb1mNiEA6rd7P2cA27eLAi3vT6WDca3+lnrOjX2xzik=; fh=gxl8w3uJW1rcvk+P4/JCCNngbln+iQd+YEo5OOdWYDk=; b=HLU5bProWRIIp49SsP8SrafWnmR+sBLWOQ4Eu6VQ6x11zCFLFwpxQnefv9EWyQgDyf Jp+Md3gshfrwP2H340Rweh7fBT3/u1xO2Wd0MZ1DDvWzWTlG35PnAy0bvIK/DRXJKNde qpnExNVLnswsbw/OdiaOqIY2xfM1kvrorvOVcA5p4BxXbjLj7+d1WJUing/HLmWHDW90 H7WJNT6WHezBdzAWqUYD62LDPp5OxO1ANIHQS5Iu4LrnJZutEiXpg8duBzEeNCQWZNia rcZJTXwMYeIkwRIpjn8GmB+aujt9vpB7ltUEmqvGGuNZ1siNsloWBrwYBjTHUFvf2C0Q 3b+Q==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OAOon+wi; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-119692-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-119692-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id bl6-20020a05620a1a8600b0078a5636e1ecsi5642733qkb.558.2024.03.26.11.35.57 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 26 Mar 2024 11:35:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-119692-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OAOon+wi; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-119692-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-119692-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id D44111C64A92 for ; Tue, 26 Mar 2024 18:35:56 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 98323127B62; Tue, 26 Mar 2024 18:35:51 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="OAOon+wi" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 360381798A for ; Tue, 26 Mar 2024 18:35:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711478150; cv=none; b=H8bwGsZ6sLLiCa46BMxldNCEJ+rM7XHhPtH2w9u6fkmLdwYNWsnv1rOqkENm9L+D9/sh23BvFygwINodk3pZrtSW6Tu89qe0tGcxiiEDlzdF3IIPdTkAIpNaGFdnizbgr7qnWE4ByPKfBisf+m2tp/Mlv7wz4rQGGBlaK0wTeyQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711478150; c=relaxed/simple; bh=+nV4dT3L0w1lwo+VKdWgblivtZUCSdjVK27rdoTZ0+Y=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:To:Cc; b=BBFl3WdYQfhqqDPuSspauPfEzi0OrCk57EjZ2ru0aThrGVRaXn0IX1E0AMNa5oATuUySjDhNfbRwpnKr4ZSQoMUplexhebhhtdK6StUkvVYegxhMDdDY+nj+AeERDjt0muaOJEiwdxGfXge7zhOvjoQULLkyQ/xFd9CHCL6Ix8k= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=OAOon+wi; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5EB89C433F1; Tue, 26 Mar 2024 18:35:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1711478149; bh=+nV4dT3L0w1lwo+VKdWgblivtZUCSdjVK27rdoTZ0+Y=; h=From:Date:Subject:To:Cc:From; b=OAOon+wiygBJzuKTfLGx+klopJFXyPjcmJEPWfE4BXPyIGw050DZbmfZTDMgswD/Y 3RtlWPa3QAEo8TODQwEHi+yYvF02i2xoxDtpmcxaxkFkegHGg+LlaP+oziw3CEaRic U51qdkixrTgxQIuEXbOTT68IjGI+O2gayi9cFa81UsI0VvLIa4gR3NQWB/6BDhQ3sf znJ6EAFOELocFOeuAoTzWhXSI6zyg2/gpH1eRirAMxDfLSFQhdc/Rvc8NfzO+DSdHf uXsraQxcG6Dvn4riDYDIju+LhJMnbUltxvNGXzSb+f/zTgnt7Fz+BSuxPF5vT4GXER j+Wmjvth0ltdQ== From: Chris Li Date: Tue, 26 Mar 2024 11:35:43 -0700 Subject: [PATCH v9] zswap: replace RB tree with xarray Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20240326-zswap-xarray-v9-1-d2891a65dfc7@kernel.org> X-B4-Tracking: v=1; b=H4sIAH4VA2YC/2XRTWrDMBAF4KsErasyGv1n1XuULmR5nJiWOMjFT Rp8945DIY68fBq+xzC6iZFKT6PY726i0NSP/XDiEF92Ih/T6UCybzkLBDSgwMjf8Sed5SWVkq7 SK4cOyBpFWjA5F+r6y73u/YPzsR+/h3K9t09qef0vUv65aFISpGtTCi5D6BK9fVI50dfrUA5ia ZrwoRFjpVEqSRYwmLbLbaM2Wj+0Bqy0Zm0jAFrskMcbbda6OsFkWGfTGOs85Kxho+1KK1Vpyzp pHnTUxBzsRru1rjd3rFUTeOpbD2G7uV/r+mp+uVpMoBOYSMFtdFhphEoH1i1/FlHsgjfmSc/z/ Accbm9UWwIAAA== To: Andrew Morton Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, Yosry Ahmed , Nhat Pham , Johannes Weiner , "Matthew Wilcox (Oracle)" , Chengming Zhou , Barry Song , Chris Li X-Mailer: b4 0.12.4 Very deep RB tree requires rebalance at times. That contributes to the zswap fault latencies. Xarray does not need to perform tree rebalance. Replacing RB tree to xarray can have some small performance gain. One small difference is that xarray insert might fail with ENOMEM, while RB tree insert does not allocate additional memory. The zswap_entry size will reduce a bit due to removing the RB node, which has two pointers and a color field. Xarray store the pointer in the xarray tree rather than the zswap_entry. Every entry has one pointer from the xarray tree. Overall, switching to xarray should save some memory, if the swap entries are densely packed. Notice the zswap_rb_search and zswap_rb_insert often followed by zswap_rb_erase. Use xa_erase and xa_store directly. That saves one tree lookup as well. Remove zswap_invalidate_entry due to no need to call zswap_rb_erase any more. Use zswap_free_entry instead. The "struct zswap_tree" has been replaced by "struct xarray". The tree spin lock has transferred to the xarray lock. Run the kernel build testing 5 times for each version, averages: (memory.max=2GB, zswap shrinker and writeback enabled, one 50GB swapfile, 24 HT core, 32 jobs) mm-unstable-4aaccadb5c04 xarray v9 user 3548.902 3534.375 sys 522.232 520.976 real 202.796 200.864 Signed-off-by: Chris Li --- Changes in v9: - rebase to mm-unstable 4aaccadb5c04. - Resolve conflict with Johannes's "mm: zswap: fix data loss on SWP_SYNCHRONOUS_IO devices". - Link to v8: https://lore.kernel.org/r/20240320-zswap-xarray-v8-1-dc08ee9f8744@kernel.org Changes in v8: - Fix some white space damage discovered by Yosry. No actual code change. - Collect review tags. - Link to v7: https://lore.kernel.org/r/20240319-zswap-xarray-v7-1-e9a03a049e86@kernel.org Changes in v7: - update comment suggested by Johannes and Yosry - Simplify some error handling code, suggested by Johannes. - Link to v6: https://lore.kernel.org/r/20240312-zswap-xarray-v6-1-1b82027d7082@kernel.org Changes in v6: - Add WARN_ONCE() for xa_store failed other than -ENOMEM. - Collect review tags. - Link to v5: https://lore.kernel.org/r/20240311-zswap-xarray-v5-1-a3031feb9c85@kernel.org Changes in v5: - Remove zswap_xa_insert(), call xa_store and xa_erase directly. - Remove zswap_reject_xarray_fail. - Link to v4: https://lore.kernel.org/r/20240304-zswap-xarray-v4-1-c4b45670cc30@kernel.org Changes in v4: - Remove zswap_xa_search_and_earse, use xa_erase directly. - Move charge of objcg after zswap_xa_insert. - Avoid erase old entry on insert fail error path. - Remove not needed swap_zswap_tree change - Link to v3: https://lore.kernel.org/r/20240302-zswap-xarray-v3-1-5900252f2302@kernel.org Changes in v3: - Use xa_cmpxchg instead of zswap_xa_search_and_delete in zswap_writeback_entry. - Use xa_store in zswap_xa_insert directly. Reduce the scope of spinlock. - Fix xa_store error handling for same page fill case. - Link to v2: https://lore.kernel.org/r/20240229-zswap-xarray-v2-1-e50284dfcdb1@kernel.org Changes in v2: - Replace struct zswap_tree with struct xarray. - Remove zswap_tree spinlock, use xarray lock instead. - Fold zswap_rb_erase() into zswap_xa_search_and_delete() and zswap_xa_insert(). - Delete zswap_invalidate_entry(), use zswap_free_entry() instead. - Link to v1: https://lore.kernel.org/r/20240117-zswap-xarray-v1-0-6daa86c08fae@kernel.org --- mm/zswap.c | 185 +++++++++++++++++++------------------------------------------ 1 file changed, 58 insertions(+), 127 deletions(-) diff --git a/mm/zswap.c b/mm/zswap.c index 1e1224dbade3..bc821df62c62 100644 --- a/mm/zswap.c +++ b/mm/zswap.c @@ -20,7 +20,6 @@ #include #include #include -#include #include #include #include @@ -194,7 +193,6 @@ static struct shrinker *zswap_shrinker; * This structure contains the metadata for tracking a single compressed * page within zswap. * - * rbnode - links the entry into red-black tree for the appropriate swap type * swpentry - associated swap entry, the offset indexes into the red-black tree * length - the length in bytes of the compressed page data. Needed during * decompression. For a same value filled page length is 0, and both @@ -206,7 +204,6 @@ static struct shrinker *zswap_shrinker; * lru - handle to the pool's lru used to evict pages. */ struct zswap_entry { - struct rb_node rbnode; swp_entry_t swpentry; unsigned int length; struct zswap_pool *pool; @@ -218,12 +215,7 @@ struct zswap_entry { struct list_head lru; }; -struct zswap_tree { - struct rb_root rbroot; - spinlock_t lock; -}; - -static struct zswap_tree *zswap_trees[MAX_SWAPFILES]; +static struct xarray *zswap_trees[MAX_SWAPFILES]; static unsigned int nr_zswap_trees[MAX_SWAPFILES]; /* RCU-protected iteration */ @@ -251,7 +243,7 @@ static bool zswap_has_pool; * helpers and fwd declarations **********************************/ -static inline struct zswap_tree *swap_zswap_tree(swp_entry_t swp) +static inline struct xarray *swap_zswap_tree(swp_entry_t swp) { return &zswap_trees[swp_type(swp)][swp_offset(swp) >> SWAP_ADDRESS_SPACE_SHIFT]; @@ -790,63 +782,6 @@ void zswap_memcg_offline_cleanup(struct mem_cgroup *memcg) spin_unlock(&zswap_shrink_lock); } -/********************************* -* rbtree functions -**********************************/ -static struct zswap_entry *zswap_rb_search(struct rb_root *root, pgoff_t offset) -{ - struct rb_node *node = root->rb_node; - struct zswap_entry *entry; - pgoff_t entry_offset; - - while (node) { - entry = rb_entry(node, struct zswap_entry, rbnode); - entry_offset = swp_offset(entry->swpentry); - if (entry_offset > offset) - node = node->rb_left; - else if (entry_offset < offset) - node = node->rb_right; - else - return entry; - } - return NULL; -} - -/* - * In the case that a entry with the same offset is found, a pointer to - * the existing entry is stored in dupentry and the function returns -EEXIST - */ -static int zswap_rb_insert(struct rb_root *root, struct zswap_entry *entry, - struct zswap_entry **dupentry) -{ - struct rb_node **link = &root->rb_node, *parent = NULL; - struct zswap_entry *myentry; - pgoff_t myentry_offset, entry_offset = swp_offset(entry->swpentry); - - while (*link) { - parent = *link; - myentry = rb_entry(parent, struct zswap_entry, rbnode); - myentry_offset = swp_offset(myentry->swpentry); - if (myentry_offset > entry_offset) - link = &(*link)->rb_left; - else if (myentry_offset < entry_offset) - link = &(*link)->rb_right; - else { - *dupentry = myentry; - return -EEXIST; - } - } - rb_link_node(&entry->rbnode, parent, link); - rb_insert_color(&entry->rbnode, root); - return 0; -} - -static void zswap_rb_erase(struct rb_root *root, struct zswap_entry *entry) -{ - rb_erase(&entry->rbnode, root); - RB_CLEAR_NODE(&entry->rbnode); -} - /********************************* * zswap entry functions **********************************/ @@ -858,7 +793,6 @@ static struct zswap_entry *zswap_entry_cache_alloc(gfp_t gfp, int nid) entry = kmem_cache_alloc_node(zswap_entry_cache, gfp, nid); if (!entry) return NULL; - RB_CLEAR_NODE(&entry->rbnode); return entry; } @@ -893,17 +827,6 @@ static void zswap_entry_free(struct zswap_entry *entry) atomic_dec(&zswap_stored_pages); } -/* - * The caller hold the tree lock and search the entry from the tree, - * so it must be on the tree, remove it from the tree and free it. - */ -static void zswap_invalidate_entry(struct zswap_tree *tree, - struct zswap_entry *entry) -{ - zswap_rb_erase(&tree->rbroot, entry); - zswap_entry_free(entry); -} - /********************************* * compressed storage functions **********************************/ @@ -1103,7 +1026,8 @@ static void zswap_decompress(struct zswap_entry *entry, struct page *page) static int zswap_writeback_entry(struct zswap_entry *entry, swp_entry_t swpentry) { - struct zswap_tree *tree; + struct xarray *tree; + pgoff_t offset = swp_offset(swpentry); struct folio *folio; struct mempolicy *mpol; bool folio_was_allocated; @@ -1140,19 +1064,13 @@ static int zswap_writeback_entry(struct zswap_entry *entry, * be dereferenced. */ tree = swap_zswap_tree(swpentry); - spin_lock(&tree->lock); - if (zswap_rb_search(&tree->rbroot, swp_offset(swpentry)) != entry) { - spin_unlock(&tree->lock); + if (entry != xa_cmpxchg(tree, offset, entry, NULL, GFP_KERNEL)) { delete_from_swap_cache(folio); folio_unlock(folio); folio_put(folio); return -ENOMEM; } - /* Safe to deref entry after the entry is verified above. */ - zswap_rb_erase(&tree->rbroot, entry); - spin_unlock(&tree->lock); - zswap_decompress(entry, &folio->page); count_vm_event(ZSWPWB); @@ -1477,8 +1395,8 @@ bool zswap_store(struct folio *folio) { swp_entry_t swp = folio->swap; pgoff_t offset = swp_offset(swp); - struct zswap_tree *tree = swap_zswap_tree(swp); - struct zswap_entry *entry, *dupentry; + struct xarray *tree = swap_zswap_tree(swp); + struct zswap_entry *entry, *old; struct obj_cgroup *objcg = NULL; struct mem_cgroup *memcg = NULL; unsigned long max_pages, cur_pages; @@ -1566,27 +1484,43 @@ bool zswap_store(struct folio *folio) insert_entry: entry->swpentry = swp; entry->objcg = objcg; + + old = xa_store(tree, offset, entry, GFP_KERNEL); + if (xa_is_err(old)) { + int err = xa_err(old); + + WARN_ONCE(err != -ENOMEM, "unexpected xarray error: %d\n", err); + zswap_reject_alloc_fail++; + goto store_failed; + } + + /* + * We may have had an existing entry that became stale when + * the folio was redirtied and now the new version is being + * swapped out. Get rid of the old. + */ + if (old) + zswap_entry_free(old); + if (objcg) { obj_cgroup_charge_zswap(objcg, entry->length); - /* Account before objcg ref is moved to tree */ count_objcg_event(objcg, ZSWPOUT); } - /* map */ - spin_lock(&tree->lock); /* - * The folio may have been dirtied again, invalidate the - * possibly stale entry before inserting the new entry. + * We finish initializing the entry while it's already in xarray. + * This is safe because: + * + * 1. Concurrent stores and invalidations are excluded by folio lock. + * + * 2. Writeback is excluded by the entry not being on the LRU yet. + * The publishing order matters to prevent writeback from seeing + * an incoherent entry. */ - if (zswap_rb_insert(&tree->rbroot, entry, &dupentry) == -EEXIST) { - zswap_invalidate_entry(tree, dupentry); - WARN_ON(zswap_rb_insert(&tree->rbroot, entry, &dupentry)); - } if (entry->length) { INIT_LIST_HEAD(&entry->lru); zswap_lru_add(&zswap_list_lru, entry); } - spin_unlock(&tree->lock); /* update stats */ atomic_inc(&zswap_stored_pages); @@ -1594,8 +1528,14 @@ bool zswap_store(struct folio *folio) return true; +store_failed: + if (!entry->length) + atomic_dec(&zswap_same_filled_pages); + else { + zpool_free(zswap_find_zpool(entry), entry->handle); put_pool: - zswap_pool_put(entry->pool); + zswap_pool_put(entry->pool); + } freepage: zswap_entry_cache_free(entry); reject: @@ -1606,11 +1546,9 @@ bool zswap_store(struct folio *folio) * possibly stale entry which was previously stored at this offset. * Otherwise, writeback could overwrite the new data in the swapfile. */ - spin_lock(&tree->lock); - entry = zswap_rb_search(&tree->rbroot, offset); + entry = xa_erase(tree, offset); if (entry) - zswap_invalidate_entry(tree, entry); - spin_unlock(&tree->lock); + zswap_entry_free(entry); return false; shrink: @@ -1624,20 +1562,14 @@ bool zswap_load(struct folio *folio) pgoff_t offset = swp_offset(swp); struct page *page = &folio->page; bool swapcache = folio_test_swapcache(folio); - struct zswap_tree *tree = swap_zswap_tree(swp); + struct xarray *tree = swap_zswap_tree(swp); struct zswap_entry *entry; u8 *dst; VM_WARN_ON_ONCE(!folio_test_locked(folio)); - spin_lock(&tree->lock); - entry = zswap_rb_search(&tree->rbroot, offset); - if (!entry) { - spin_unlock(&tree->lock); - return false; - } /* - * When reading into the swapcache, invalidate our entry. The + * When reading into the swapcache, erase our entry. The * swapcache can be the authoritative owner of the page and * its mappings, and the pressure that results from having two * in-memory copies outweighs any benefits of caching the @@ -1649,8 +1581,12 @@ bool zswap_load(struct folio *folio) * the fault fails. We remain the primary owner of the entry.) */ if (swapcache) - zswap_rb_erase(&tree->rbroot, entry); - spin_unlock(&tree->lock); + entry = xa_erase(tree, offset); + else + entry = xa_load(tree, offset); + + if (!entry) + return false; if (entry->length) zswap_decompress(entry, page); @@ -1675,19 +1611,17 @@ bool zswap_load(struct folio *folio) void zswap_invalidate(swp_entry_t swp) { pgoff_t offset = swp_offset(swp); - struct zswap_tree *tree = swap_zswap_tree(swp); + struct xarray *tree = swap_zswap_tree(swp); struct zswap_entry *entry; - spin_lock(&tree->lock); - entry = zswap_rb_search(&tree->rbroot, offset); + entry = xa_erase(tree, offset); if (entry) - zswap_invalidate_entry(tree, entry); - spin_unlock(&tree->lock); + zswap_entry_free(entry); } int zswap_swapon(int type, unsigned long nr_pages) { - struct zswap_tree *trees, *tree; + struct xarray *trees, *tree; unsigned int nr, i; nr = DIV_ROUND_UP(nr_pages, SWAP_ADDRESS_SPACE_PAGES); @@ -1697,11 +1631,8 @@ int zswap_swapon(int type, unsigned long nr_pages) return -ENOMEM; } - for (i = 0; i < nr; i++) { - tree = trees + i; - tree->rbroot = RB_ROOT; - spin_lock_init(&tree->lock); - } + for (i = 0; i < nr; i++) + xa_init(trees + i); nr_zswap_trees[type] = nr; zswap_trees[type] = trees; @@ -1710,7 +1641,7 @@ int zswap_swapon(int type, unsigned long nr_pages) void zswap_swapoff(int type) { - struct zswap_tree *trees = zswap_trees[type]; + struct xarray *trees = zswap_trees[type]; unsigned int i; if (!trees) @@ -1718,7 +1649,7 @@ void zswap_swapoff(int type) /* try_to_unuse() invalidated all the entries already */ for (i = 0; i < nr_zswap_trees[type]; i++) - WARN_ON_ONCE(!RB_EMPTY_ROOT(&trees[i].rbroot)); + WARN_ON_ONCE(!xa_empty(trees + i)); kvfree(trees); nr_zswap_trees[type] = 0; --- base-commit: 4aaccadb5c04dd4d4519c8762a38010a32d904a3 change-id: 20240104-zswap-xarray-716260e541e3 Best regards, -- Chris Li