From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 20674C433EF for ; Thu, 28 Apr 2022 20:19:53 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 4BF016B0082; Thu, 28 Apr 2022 16:19:52 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 46DC76B0085; Thu, 28 Apr 2022 16:19:52 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 30F9D6B0087; Thu, 28 Apr 2022 16:19:52 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (relay.hostedemail.com [64.99.140.25]) by kanga.kvack.org (Postfix) with ESMTP id 1E3D36B0082 for ; Thu, 28 Apr 2022 16:19:52 -0400 (EDT) Received: from smtpin01.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id E659622791 for ; Thu, 28 Apr 2022 20:19:51 +0000 (UTC) X-FDA: 79407403782.01.5578641 Received: from mail-oi1-f182.google.com (mail-oi1-f182.google.com [209.85.167.182]) by imf01.hostedemail.com (Postfix) with ESMTP id 19AD24004B for ; Thu, 28 Apr 2022 20:19:45 +0000 (UTC) Received: by mail-oi1-f182.google.com with SMTP id a10so6509324oif.9 for ; Thu, 28 Apr 2022 13:19:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=mP2dZIg49i0nx6hN/uSu0sPbA4AamYLAjMK1jPC0V3w=; b=S7y8kcdcygzpAizHWfOc2pPFnbYhQfyNg4+kSYrCKxGfkJSzDYH5ZTPwbyVcd5KEKp 5M9o2TjpjxJX7gUd8AkFHeef71gPMrfTxgucCazyOIleU5BPkTzFAGD00s1UwvaKj3Z9 PJr+7847FK6QFfMOIm68Yad2EMWziKPo+oekA+3r4qYJj5I9VmKuUZIZcA+wERAylSmR gvY0swhDrGr8iFuFUnp8wHV3wlz+TJ1aHo4Hmjxnh2gxKZ+PFZbFXIaa0l46QvU4+mch deje8jLXAHdreTQZjo16PIBxX23X+3F6mIMlOMEUsvR/EyrQEHN1Wfmrc0dFiNRUvPrq +zxw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to; bh=mP2dZIg49i0nx6hN/uSu0sPbA4AamYLAjMK1jPC0V3w=; b=xffbaQmJBF6RVM1X8Jd9sw9641a0EysCA5tyD7M5niYz7Ou8bZ8Pn0Lxvb0tu4weFm SyPletj7el8lj5jXUy+1rgcouuY//u1r2IDH3jP3sbBY+tLrBJsNmi8Wubm0jmYGyiM5 kka7MJP5p8frR3J7SSvWA1eC0BFYqLkubZcXTO1rx330KYTOvryZQ8KckkEFHOt+d5yo M1cB17sJ4tUjvybrp9FI/iX5NiLB25nk2V9UxvjtLyWdivAaoY5ZGBgsj0aBv8w79m9i yc7bgbtfsdLaif4ybgSI/2ou7zCDOEcKx3toM3O+ae+RCHOuNQ5omT2B7MNR4wGjv8Ec h+3w== X-Gm-Message-State: AOAM533DzzHVNqagaDzeCTZIPXJOnbUcxTwlcNBMSzuDAYuCTZX/1tiU +5FsY/OTID9UNKQzET+b+yo= X-Google-Smtp-Source: ABdhPJwD9CTmFzKeUdj2tI/XXpF/h3vLn0q0cKXhcXLsGZ6knga/3qdO3GVT45ODKBxnhB57vLnDGA== X-Received: by 2002:a05:6808:1244:b0:2f9:e450:4bc4 with SMTP id o4-20020a056808124400b002f9e4504bc4mr16771429oiv.290.1651177190506; Thu, 28 Apr 2022 13:19:50 -0700 (PDT) Received: from server.roeck-us.net ([2600:1700:e321:62f0:329c:23ff:fee3:9d7c]) by smtp.gmail.com with ESMTPSA id bt30-20020a0568201a9e00b0035ea84682b9sm459598oob.45.2022.04.28.13.19.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 28 Apr 2022 13:19:49 -0700 (PDT) Date: Thu, 28 Apr 2022 13:19:47 -0700 From: Guenter Roeck To: Liam Howlett Cc: "maple-tree@lists.infradead.org" , "linux-mm@kvack.org" , "linux-kernel@vger.kernel.org" , Andrew Morton , Yu Zhao Subject: Re: [PATCH v8 23/70] mm/mmap: change do_brk_flags() to expand existing VMA and add do_brk_munmap() Message-ID: <20220428201947.GA1912192@roeck-us.net> References: <20220426150616.3937571-1-Liam.Howlett@oracle.com> <20220426150616.3937571-24-Liam.Howlett@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220426150616.3937571-24-Liam.Howlett@oracle.com> Authentication-Results: imf01.hostedemail.com; dkim=pass header.d=gmail.com header.s=20210112 header.b=S7y8kcdc; dmarc=none; spf=pass (imf01.hostedemail.com: domain of groeck7@gmail.com designates 209.85.167.182 as permitted sender) smtp.mailfrom=groeck7@gmail.com X-Rspamd-Server: rspam06 X-Rspamd-Queue-Id: 19AD24004B X-Rspam-User: X-Stat-Signature: kurouh6otetosuhgaozwk6ajsbg4j1fn X-HE-Tag: 1651177185-97122 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Tue, Apr 26, 2022 at 03:06:35PM +0000, Liam Howlett wrote: > From: "Liam R. Howlett" > > Avoid allocating a new VMA when it a vma modification can occur. When a > brk() can expand or contract a VMA, then the single store operation will > only modify one index of the maple tree instead of causing a node to split > or coalesce. This avoids unnecessary allocations/frees of maple tree > nodes and VMAs. > > Move some limit & flag verifications out of the do_brk_flags() function to > use only relevant checks in the code path of bkr() and vm_brk_flags(). > > Set the vma to check if it can expand in vm_brk_flags() if extra criteria > are met. > > Drop userfaultfd from do_brk_flags() path and only use it in > vm_brk_flags() path since that is the only place a munmap will happen. > > Signed-off-by: Liam R. Howlett A build failure seen when building ppc64:corenet64_smp_defconfig also biscects to this patch. mm/mmap.c: In function 'do_brk_flags': mm/mmap.c:2908:17: error: implicit declaration of function 'khugepaged_enter_vma_merge'; did you mean 'khugepaged_enter_vma'? It appears that this is later fixed, but it hurts bisectability (and prevents me from finding the actual build failure in linux-next when trying to build corenet64_smp_defconfig). While looking into the patch, I noticed the following. [ ... ] > @@ -2773,30 +2888,52 @@ static int do_brk_flags(unsigned long addr, unsigned long len, > if (security_vm_enough_memory_mm(mm, len >> PAGE_SHIFT)) > return -ENOMEM; > > out: > perf_event_mmap(vma); > mm->total_vm += len >> PAGE_SHIFT; > @@ -2807,18 +2944,21 @@ static int do_brk_flags(unsigned long addr, unsigned long len, > validate_mm_mt(mm); > return 0; > > -no_vma_link: > vm_area_free(vma); That really looks wrong. vm_area_free(vma) can not be reached after this patch has been applied. Guenter > +vma_alloc_fail: > + vm_unacct_memory(len >> PAGE_SHIFT); > return -ENOMEM; > } >