From: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
To: willy@infradead.org
Cc: wei.w.wang@intel.com, virtio-dev@lists.oasis-open.org,
linux-kernel@vger.kernel.org, qemu-devel@nongnu.org,
virtualization@lists.linux-foundation.org, kvm@vger.kernel.org,
linux-mm@kvack.org, mst@redhat.com, mhocko@kernel.org,
akpm@linux-foundation.org, mawilcox@microsoft.com
Subject: Re: [PATCH v20 3/7 RESEND] xbitmap: add more operations
Date: Sat, 23 Dec 2017 23:33:45 +0900 [thread overview]
Message-ID: <201712232333.BAH82874.FFFtOMHSLVQOOJ@I-love.SAKURA.ne.jp> (raw)
In-Reply-To: <20171223032959.GA11578@bombadil.infradead.org>
Matthew Wilcox wrote:
> On Sat, Dec 23, 2017 at 11:59:54AM +0900, Tetsuo Handa wrote:
> > Matthew Wilcox wrote:
> > > + bit %= IDA_BITMAP_BITS;
> > > + radix_tree_iter_init(&iter, index);
> > > + slot = idr_get_free_cmn(root, &iter, GFP_NOWAIT | __GFP_NOWARN, index);
> > > + if (IS_ERR(slot)) {
> > > + if (slot == ERR_PTR(-ENOSPC))
> > > + return 0; /* Already set */
> >
> > Why already set? I guess something is there, but is it guaranteed that
> > there is a bitmap with the "bit" set?
>
> Yes. For radix trees tagged with IDR_RT_MARKER, newly created slots
> have the IDR_FREE tag set. We only clear the IDR_FREE tag once the
> bitmap is full. So if we try to find a free slot and the tag is clear,
> we know the bitmap is full.
>
OK. But does using IDR_FREE tag have more benefit than cost?
You are doing
if (bitmap_full(bitmap->bitmap, IDA_BITMAP_BITS))
radix_tree_iter_tag_clear(root, &iter, IDR_FREE);
for each xb_set_bit() call. How likely do we hit ERR_PTR(-ENOSPC) path?
Isn't removing both bitmap_full() and ERR_PTR(-ENOSPC) better?
> > > + bitmap = rcu_dereference_raw(*slot);
> > > + if (!bitmap) {
> > > + bitmap = this_cpu_xchg(ida_bitmap, NULL);
> > > + if (!bitmap)
> > > + return -ENOMEM;
> >
> > I can't understand this. I can understand if it were
> >
> > BUG_ON(!bitmap);
> >
> > because you called xb_preload().
> >
> > But
> >
> > /*
> > * Regular test 2
> > * set bit 2000, 2001, 2040
> > * Next 1 in [0, 2048) --> 2000
> > * Next 1 in [2000, 2002) --> 2000
> > * Next 1 in [2002, 2041) --> 2040
> > * Next 1 in [2002, 2040) --> none
> > * Next 0 in [2000, 2048) --> 2002
> > * Next 0 in [2048, 2060) --> 2048
> > */
> > xb_preload(GFP_KERNEL);
> > assert(!xb_set_bit(&xb1, 2000));
> > assert(!xb_set_bit(&xb1, 2001));
> > assert(!xb_set_bit(&xb1, 2040));
> [...]
> > xb_preload_end();
> >
> > you are not calling xb_preload() prior to each xb_set_bit() call.
> > This means that, if each xb_set_bit() is not surrounded with
> > xb_preload()/xb_preload_end(), there is possibility of hitting
> > this_cpu_xchg(ida_bitmap, NULL) == NULL.
>
> This is just a lazy test. We "know" that the bits in the range 1024-2047
> will all land in the same bitmap, so there's no need to preload for each
> of them.
Testcases also serves as how to use that API.
Assuming such thing leads to incorrect usage.
>
> > If bitmap == NULL at this_cpu_xchg(ida_bitmap, NULL) is allowed,
> > you can use kzalloc(sizeof(*bitmap), GFP_NOWAIT | __GFP_NOWARN)
> > and get rid of xb_preload()/xb_preload_end().
>
> No, we can't. GFP_NOWAIT | __GFP_NOWARN won't try very hard to allocate
> memory. There's no reason to fail the call if the user is in a context
> where they can try harder to free memory.
But there is no reason to use GFP_NOWAIT at idr_get_free_cmn() if it is
safe to use GFP_KERNEL. If we don't require xb_preload() which forces
idr_get_free_cmn() to use GFP_NOWAIT due to possibility of preemption
disabled by xb_preload(), we can allow passing gfp flags to xb_set_bit().
>
> > You are using idr_get_free_cmn(GFP_NOWAIT | __GFP_NOWARN), which
> > means that the caller has to be prepared for allocation failure
> > when calling xb_set_bit(). Thus, there is no need to use preload
> > in order to avoid failing to allocate "bitmap".
>
> xb_preload also preloads radix tree nodes.
>
But it after all forces idr_get_free_cmn() to use GFP_NOWAIT, doesn't it?
Speak of initial user (i.e. virtio-balloon), xb_preload() won't be able to
use GFP_KERNEL in order to avoid OOM lockup. Therefore, I don't see
advantages with using xb_preload(). If xb_set_bit() receives gfp flags,
the caller can pass GFP_KERNEL if it is safe to use GFP_KERNEL.
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
next prev parent reply other threads:[~2017-12-23 14:34 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-12-21 2:30 Wei Wang
2017-12-21 14:18 ` Matthew Wilcox
2017-12-21 14:37 ` Tetsuo Handa
2017-12-22 8:45 ` Wei Wang
2017-12-21 21:03 ` Matthew Wilcox
2017-12-22 8:49 ` Wei Wang
2018-01-02 14:09 ` Matthew Wilcox
2018-01-03 8:56 ` Wei Wang
2017-12-23 2:59 ` Tetsuo Handa
2017-12-23 3:29 ` Matthew Wilcox
2017-12-23 14:33 ` Tetsuo Handa [this message]
2017-12-23 14:58 ` Matthew Wilcox
2017-12-24 7:31 ` Wei Wang
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=201712232333.BAH82874.FFFtOMHSLVQOOJ@I-love.SAKURA.ne.jp \
--to=penguin-kernel@i-love.sakura.ne.jp \
--cc=akpm@linux-foundation.org \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=mawilcox@microsoft.com \
--cc=mhocko@kernel.org \
--cc=mst@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=virtio-dev@lists.oasis-open.org \
--cc=virtualization@lists.linux-foundation.org \
--cc=wei.w.wang@intel.com \
--cc=willy@infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox