From patchwork Fri Sep 8 19:52:15 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jane Chu X-Patchwork-Id: 13377780 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 68771EEB566 for ; Fri, 8 Sep 2023 19:53:08 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 6DBD66B00ED; Fri, 8 Sep 2023 15:53:07 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 68BC86B00EF; Fri, 8 Sep 2023 15:53:07 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 553DE6B00F2; Fri, 8 Sep 2023 15:53:07 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 463316B00ED for ; Fri, 8 Sep 2023 15:53:07 -0400 (EDT) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 142D7C0E73 for ; Fri, 8 Sep 2023 19:53:07 +0000 (UTC) X-FDA: 81214478814.07.FA84922 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by imf06.hostedemail.com (Postfix) with ESMTP id 627F0180012 for ; Fri, 8 Sep 2023 19:53:05 +0000 (UTC) Authentication-Results: imf06.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-03-30 header.b=zNMNShdp; spf=pass (imf06.hostedemail.com: domain of jane.chu@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=jane.chu@oracle.com; dmarc=pass (policy=none) header.from=oracle.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1694202785; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:references:dkim-signature; bh=kUiZ5r4t+hxzPPGJ7LIQG9W0+FalRtmlfoj/bAGU40w=; b=PI1pUytBG+vC/3HDXWmJwNfqoB8tWeXR48tj+0nCjjJH0FnfJGEoCDDuP5y4PwIyCVwTnP LH57WXeQht4H8Cd1W2/yI1XP65qFYraRrSQ+GN9+pSxIMs7JsDwljg+bpFiZXbq8Ee7D/F GO4/CWTcOCwumLm71JdPhzTPGZ2ChyM= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1694202785; a=rsa-sha256; cv=none; b=RK16UgA9qQ96L6pifZnPo+CXq/Z3q/RJsEH9oRbpJ9fH+FilhI7vMiosOTmRJBFCh9P7Kv xcfpRzXiDChcjGNwF4MGRnrGgulfWzHdjON9FpAteNV9OldY/ScbalTo//2GfxyvE+RdOI XXw13FlPU4jX5RJoSoZ6mJAow6+qk5s= ARC-Authentication-Results: i=1; imf06.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-03-30 header.b=zNMNShdp; spf=pass (imf06.hostedemail.com: domain of jane.chu@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=jane.chu@oracle.com; dmarc=pass (policy=none) header.from=oracle.com Received: from pps.filterd (m0333520.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 388JYwxu022380; Fri, 8 Sep 2023 19:52:35 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : subject : date : message-id; s=corp-2023-03-30; bh=kUiZ5r4t+hxzPPGJ7LIQG9W0+FalRtmlfoj/bAGU40w=; b=zNMNShdpzfax1lwjavlr150Jt39LZMXSVTVpMcJRkVrPzO3Qaf2GprustFr0YnmvZwio 9SgVhGYuo3sVMPWA2FVs7J8BMuLC1yt0cXihDOO81ZahUFbqzU5+lo22d7hnLITJPuyj G/PgxWMmVkPbK7RDjLbiPjBLpOOI0UYw2nD1hXb7DcSVbLaSGLS2cwjdm1HstQIAnXPS Fw1yq7+g6JSyCC4Jle7+S9n+mDZThttM1ggaq74xLBJyywysQx5b+HSbKl+mJowliSi1 hrRU5qBwOAjgk66Mll0zm4O6pn7VvgpPRz21Gzm5UAquMRB1oLmL+KJdvKsVaszWBksl /A== Received: from phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta03.appoci.oracle.com [138.1.37.129]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3t09w0816b-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 08 Sep 2023 19:52:34 +0000 Received: from pps.filterd (phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com (8.17.1.19/8.17.1.19) with ESMTP id 388INr3n017274; Fri, 8 Sep 2023 19:52:33 GMT Received: from brm-x62-16.us.oracle.com (brm-x62-16.us.oracle.com [10.80.150.37]) by phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTP id 3suuga2etm-1; Fri, 08 Sep 2023 19:52:33 +0000 From: Jane Chu To: willy@infradead.org, akpm@linux-foundation.org, nvdimm@lists.linux.dev, dan.j.williams@intel.com, naoya.horiguchi@nec.com, linux-mm@kvack.org Subject: [PATCH v2] mm: Convert DAX lock/unlock page to lock/unlock folio Date: Fri, 8 Sep 2023 13:52:15 -0600 Message-Id: <20230908195215.176586-1-jane.chu@oracle.com> X-Mailer: git-send-email 2.18.4 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.267,Aquarius:18.0.957,Hydra:6.0.601,FMLib:17.11.176.26 definitions=2023-09-08_15,2023-09-05_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 phishscore=0 bulkscore=0 adultscore=0 suspectscore=0 malwarescore=0 spamscore=0 mlxlogscore=999 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2308100000 definitions=main-2309080180 X-Proofpoint-GUID: SD0FvxhVkT6_fIBvgkRl-oXpTKMbZSSS X-Proofpoint-ORIG-GUID: SD0FvxhVkT6_fIBvgkRl-oXpTKMbZSSS X-Rspamd-Queue-Id: 627F0180012 X-Rspam-User: X-Stat-Signature: kta96czkfkyjftunnkqmoj6gweo4ahr7 X-Rspamd-Server: rspam03 X-HE-Tag: 1694202785-319166 X-HE-Meta: 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 MadAKQn6 fta+0j6o7JBz2mLHYEYlcmt6Xkdqr79pGlQj8xjahwOg9yIkBH/UyO/+91jI5jBFGMbYIwitalCFuVzyTZqZpWkU8OD7euKNm7CcfA2GXI695irveEBHAo4cyGu5t7/KsGvnsa/ng6HuxwcKkj4l+D6MRuGsYFiuXusvIzKeVHLITqUxQVT4plvZ1M9OzZ1SogKqnnMTVLIUcar+Chbd70n8gXhQkegtfw2ch2GzRyXnYxGbXr213COgDhvfBJnknZLaZbLwu3TWKuK7AvpRtTAN3KQ== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: The one caller of DAX lock/unlock page already calls compound_head(), so use page_folio() instead, then use a folio throughout the DAX code to remove uses of page->mapping and page->index. Signed-off-by: Matthew Wilcox (Oracle) Signed-off-by: Jane Chu --- fs/dax.c | 24 ++++++++++++------------ include/linux/dax.h | 10 +++++----- mm/memory-failure.c | 29 ++++++++++++++++------------- 3 files changed, 33 insertions(+), 30 deletions(-) base-commit: 727dbda16b83600379061c4ca8270ef3e2f51922 diff --git a/fs/dax.c b/fs/dax.c index 906ecbd541a3..c70d4da047db 100644 --- a/fs/dax.c +++ b/fs/dax.c @@ -426,23 +426,23 @@ static struct page *dax_busy_page(void *entry) return NULL; } -/* - * dax_lock_page - Lock the DAX entry corresponding to a page - * @page: The page whose entry we want to lock +/** + * dax_lock_folio - Lock the DAX entry corresponding to a folio + * @folio: The folio whose entry we want to lock * * Context: Process context. - * Return: A cookie to pass to dax_unlock_page() or 0 if the entry could + * Return: A cookie to pass to dax_unlock_folio() or 0 if the entry could * not be locked. */ -dax_entry_t dax_lock_page(struct page *page) +dax_entry_t dax_lock_folio(struct folio *folio) { XA_STATE(xas, NULL, 0); void *entry; - /* Ensure page->mapping isn't freed while we look at it */ + /* Ensure folio->mapping isn't freed while we look at it */ rcu_read_lock(); for (;;) { - struct address_space *mapping = READ_ONCE(page->mapping); + struct address_space *mapping = READ_ONCE(folio->mapping); entry = NULL; if (!mapping || !dax_mapping(mapping)) @@ -461,11 +461,11 @@ dax_entry_t dax_lock_page(struct page *page) xas.xa = &mapping->i_pages; xas_lock_irq(&xas); - if (mapping != page->mapping) { + if (mapping != folio->mapping) { xas_unlock_irq(&xas); continue; } - xas_set(&xas, page->index); + xas_set(&xas, folio->index); entry = xas_load(&xas); if (dax_is_locked(entry)) { rcu_read_unlock(); @@ -481,10 +481,10 @@ dax_entry_t dax_lock_page(struct page *page) return (dax_entry_t)entry; } -void dax_unlock_page(struct page *page, dax_entry_t cookie) +void dax_unlock_folio(struct folio *folio, dax_entry_t cookie) { - struct address_space *mapping = page->mapping; - XA_STATE(xas, &mapping->i_pages, page->index); + struct address_space *mapping = folio->mapping; + XA_STATE(xas, &mapping->i_pages, folio->index); if (S_ISCHR(mapping->host->i_mode)) return; diff --git a/include/linux/dax.h b/include/linux/dax.h index 261944ec0887..711deb72c109 100644 --- a/include/linux/dax.h +++ b/include/linux/dax.h @@ -159,8 +159,8 @@ int dax_writeback_mapping_range(struct address_space *mapping, struct page *dax_layout_busy_page(struct address_space *mapping); struct page *dax_layout_busy_page_range(struct address_space *mapping, loff_t start, loff_t end); -dax_entry_t dax_lock_page(struct page *page); -void dax_unlock_page(struct page *page, dax_entry_t cookie); +dax_entry_t dax_lock_folio(struct folio *folio); +void dax_unlock_folio(struct folio *folio, dax_entry_t cookie); dax_entry_t dax_lock_mapping_entry(struct address_space *mapping, unsigned long index, struct page **page); void dax_unlock_mapping_entry(struct address_space *mapping, @@ -182,14 +182,14 @@ static inline int dax_writeback_mapping_range(struct address_space *mapping, return -EOPNOTSUPP; } -static inline dax_entry_t dax_lock_page(struct page *page) +static inline dax_entry_t dax_lock_folio(struct folio *folio) { - if (IS_DAX(page->mapping->host)) + if (IS_DAX(folio->mapping->host)) return ~0UL; return 0; } -static inline void dax_unlock_page(struct page *page, dax_entry_t cookie) +static inline void dax_unlock_folio(struct folio *folio, dax_entry_t cookie) { } diff --git a/mm/memory-failure.c b/mm/memory-failure.c index fe121fdb05f7..90e04fedebbc 100644 --- a/mm/memory-failure.c +++ b/mm/memory-failure.c @@ -1710,20 +1710,23 @@ static void unmap_and_kill(struct list_head *to_kill, unsigned long pfn, kill_procs(to_kill, flags & MF_MUST_KILL, false, pfn, flags); } +/* + * Only dev_pagemap pages get here, such as fsdax when the filesystem + * either do not claim or fails to claim a hwpoison event, or devdax. + * The fsdax pages are initialized per base page, and the devdax pages + * could be initialized either as base pages, or as compound pages with + * vmemmap optimization enabled. Devdax is simplistic in its dealing with + * hwpoison, such that, if a subpage of a compound page is poisoned, + * simply mark the compound head page is by far sufficient. + */ static int mf_generic_kill_procs(unsigned long long pfn, int flags, struct dev_pagemap *pgmap) { - struct page *page = pfn_to_page(pfn); + struct folio *folio = page_folio(pfn_to_page(pfn)); LIST_HEAD(to_kill); dax_entry_t cookie; int rc = 0; - /* - * Pages instantiated by device-dax (not filesystem-dax) - * may be compound pages. - */ - page = compound_head(page); - /* * Prevent the inode from being freed while we are interrogating * the address_space, typically this would be handled by @@ -1731,11 +1734,11 @@ static int mf_generic_kill_procs(unsigned long long pfn, int flags, * also prevents changes to the mapping of this pfn until * poison signaling is complete. */ - cookie = dax_lock_page(page); + cookie = dax_lock_folio(folio); if (!cookie) return -EBUSY; - if (hwpoison_filter(page)) { + if (hwpoison_filter(&folio->page)) { rc = -EOPNOTSUPP; goto unlock; } @@ -1757,7 +1760,7 @@ static int mf_generic_kill_procs(unsigned long long pfn, int flags, * Use this flag as an indication that the dax page has been * remapped UC to prevent speculative consumption of poison. */ - SetPageHWPoison(page); + SetPageHWPoison(&folio->page); /* * Unlike System-RAM there is no possibility to swap in a @@ -1766,11 +1769,11 @@ static int mf_generic_kill_procs(unsigned long long pfn, int flags, * SIGBUS (i.e. MF_MUST_KILL) */ flags |= MF_ACTION_REQUIRED | MF_MUST_KILL; - collect_procs(page, &to_kill, true); + collect_procs(&folio->page, &to_kill, true); - unmap_and_kill(&to_kill, pfn, page->mapping, page->index, flags); + unmap_and_kill(&to_kill, pfn, folio->mapping, folio->index, flags); unlock: - dax_unlock_page(page, cookie); + dax_unlock_folio(folio, cookie); return rc; }