From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from out-178.mta0.migadu.com (out-178.mta0.migadu.com [91.218.175.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7E7661C3F0C for ; Wed, 11 Feb 2026 12:55:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=91.218.175.178 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770814537; cv=none; b=SteZNP7baB3sEZwN8K6tQJ1wr/BK+tX37UY75af8mVdz1zrogeTA2FFCeG8NCsZ938eVP6R6hs8EsjnJBk5EWFXIw5wsb+Okx9SRCag/JNAe0G0iKXVQBJmnny+7+XQx16iyNaVNkSbxp7Npr3D1H56+zCYS9Yv6/e8bO23lzDk= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770814537; c=relaxed/simple; bh=kvbgrBr+tPgCLWMLG8oFUxSLZsf0+O3epU4T+XZrhH0=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=XlQCJASxaPBKGG6N/puFquKKRcI+Pl3calMyKbQtMh7n+QatZWTEydCK2wm18TCDkeftTFFpn8dTlB+iddL9jcL264ze+lH8ZwPRoyWpRKfccbtukTbIALZYivLlRvQeP2zyXUzxOHIZKx8fbGajDYRRfpGDB83lA7E9v8pxyAw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev; spf=pass smtp.mailfrom=linux.dev; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b=uvvqK0Md; arc=none smtp.client-ip=91.218.175.178 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="uvvqK0Md" X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1770814532; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=mcD//BzEPgHjV/7gQ+qWY8N5xTNYLgnhdP8UluiR/nY=; b=uvvqK0Mdl50ffxRUuAdNTTtwZnIgx4kywsWnCecVkOw1sPX/CLAQhQlR+XHlGQSmHqHUvo MJLBGpxZpgLZyOuM1dsK1lMXjZE3Fmd14RzlAWiNSx7z2iG4N6sdfbSzBFM3Js4CAxlxqn v2Nl88eeip/zkmRQHn4hFB1PwB1STkM= From: Usama Arif To: Andrew Morton , david@kernel.org, lorenzo.stoakes@oracle.com, willy@infradead.org, linux-mm@kvack.org Cc: fvdl@google.com, hannes@cmpxchg.org, riel@surriel.com, shakeel.butt@linux.dev, kas@kernel.org, baohua@kernel.org, dev.jain@arm.com, baolin.wang@linux.alibaba.com, npache@redhat.com, Liam.Howlett@oracle.com, ryan.roberts@arm.com, vbabka@suse.cz, lance.yang@linux.dev, linux-kernel@vger.kernel.org, kernel-team@meta.com, Usama Arif Subject: [RFC 2/2] mm: thp: add THP_SPLIT_PMD_PTE_ALLOC_FAILED counter Date: Wed, 11 Feb 2026 04:49:46 -0800 Message-ID: <20260211125507.4175026-3-usama.arif@linux.dev> In-Reply-To: <20260211125507.4175026-1-usama.arif@linux.dev> References: <20260211125507.4175026-1-usama.arif@linux.dev> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT Add a vmstat counter to track PTE allocation failures during PMD split. This enables monitoring of split failures due to memory pressure after the lazy PTE page table allocation change. The counter is incremented in three places: - __split_huge_pmd(): Main entry point for splitting a PMD - try_to_unmap_one(): When reclaim needs to split a PMD-mapped THP - try_to_migrate_one(): When migration needs to split a PMD-mapped THP Visible via /proc/vmstat as thp_split_pmd_pte_alloc_failed. Signed-off-by: Usama Arif --- include/linux/vm_event_item.h | 1 + mm/huge_memory.c | 1 + mm/rmap.c | 3 +++ mm/vmstat.c | 1 + 4 files changed, 6 insertions(+) diff --git a/include/linux/vm_event_item.h b/include/linux/vm_event_item.h index 22a139f82d75f..827c9a8c251de 100644 --- a/include/linux/vm_event_item.h +++ b/include/linux/vm_event_item.h @@ -111,6 +111,7 @@ enum vm_event_item { PGPGIN, PGPGOUT, PSWPIN, PSWPOUT, THP_DEFERRED_SPLIT_PAGE, THP_UNDERUSED_SPLIT_PAGE, THP_SPLIT_PMD, + THP_SPLIT_PMD_PTE_ALLOC_FAILED, THP_SCAN_EXCEED_NONE_PTE, THP_SCAN_EXCEED_SWAP_PTE, THP_SCAN_EXCEED_SHARED_PTE, diff --git a/mm/huge_memory.c b/mm/huge_memory.c index 4c9a8d89fc8aa..8d7c9f67f8a1d 100644 --- a/mm/huge_memory.c +++ b/mm/huge_memory.c @@ -3332,6 +3332,7 @@ void __split_huge_pmd(struct vm_area_struct *vma, pmd_t *pmd, if (vma_is_anonymous(vma) && !arch_needs_pgtable_deposit()) { pgtable = pte_alloc_one(vma->vm_mm); if (!pgtable) { + count_vm_event(THP_SPLIT_PMD_PTE_ALLOC_FAILED); mmu_notifier_invalidate_range_end(&range); return; } diff --git a/mm/rmap.c b/mm/rmap.c index c6ff23fc12944..5c4afedb29d5a 100644 --- a/mm/rmap.c +++ b/mm/rmap.c @@ -2070,8 +2070,10 @@ static bool try_to_unmap_one(struct folio *folio, struct vm_area_struct *vma, pgtable_t pgtable = prealloc_pte; prealloc_pte = NULL; + if (!arch_needs_pgtable_deposit() && !pgtable && vma_is_anonymous(vma)) { + count_vm_event(THP_SPLIT_PMD_PTE_ALLOC_FAILED); page_vma_mapped_walk_done(&pvmw); ret = false; break; @@ -2474,6 +2476,7 @@ static bool try_to_migrate_one(struct folio *folio, struct vm_area_struct *vma, prealloc_pte = NULL; if (!arch_needs_pgtable_deposit() && !pgtable && vma_is_anonymous(vma)) { + count_vm_event(THP_SPLIT_PMD_PTE_ALLOC_FAILED); page_vma_mapped_walk_done(&pvmw); ret = false; break; diff --git a/mm/vmstat.c b/mm/vmstat.c index 99270713e0c13..473edfa624a41 100644 --- a/mm/vmstat.c +++ b/mm/vmstat.c @@ -1408,6 +1408,7 @@ const char * const vmstat_text[] = { [I(THP_DEFERRED_SPLIT_PAGE)] = "thp_deferred_split_page", [I(THP_UNDERUSED_SPLIT_PAGE)] = "thp_underused_split_page", [I(THP_SPLIT_PMD)] = "thp_split_pmd", + [I(THP_SPLIT_PMD_PTE_ALLOC_FAILED)] = "thp_split_pmd_pte_alloc_failed", [I(THP_SCAN_EXCEED_NONE_PTE)] = "thp_scan_exceed_none_pte", [I(THP_SCAN_EXCEED_SWAP_PTE)] = "thp_scan_exceed_swap_pte", [I(THP_SCAN_EXCEED_SHARED_PTE)] = "thp_scan_exceed_share_pte", -- 2.47.3