Received: by 10.223.176.5 with SMTP id f5csp8954wra; Tue, 30 Jan 2018 07:18:05 -0800 (PST) X-Google-Smtp-Source: AH8x226n4TMDS1fB16gGXyHf/fbUs57w3xJGg12HXt0lDqjCoe6fg04QpOyqZmvpF9ekBt7dqfLS X-Received: by 10.99.113.15 with SMTP id m15mr25373357pgc.236.1517325485047; Tue, 30 Jan 2018 07:18:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517325485; cv=none; d=google.com; s=arc-20160816; b=ppVBR9VTbfGDOwc+lszANP63mBFFPSEFg3W59KcRlbfOMhF7oZxW/l12tR5712+QG4 9tKgxH6zDs6wwqkzFUDVGowfhHHNowt9U606LufMmyyEaFIkRl/oLyYSXEzTAVp7Wia9 f91nkBZ4v8x8Pqos3kAIfKKZomodnl57VXQ5Cy/RJOH+tfrRSawssI9smQZ3yKXPBBLI T7aeYI3W8rDN4fchUgLMYLRNkiXpph9siOeEpN8g1EA7CzT6mo7BaJXsCrDR3vpViG9Y A0q4J8T8ZAt4dSBCJaVrJcTR308tzx/uklmO64kKisIPEpZu9WgVfpLHEVM5hURDfNQO o3gw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:arc-authentication-results; bh=GQb5G9RwL5C66VIon6xkDpjmUFYjHTJ1l1QWQZfuOGE=; b=TG4RCM0sHQzetjR6D5kaGs+Zjr2glldhukun3rdRqfyBTy980Mc/RwpMUoH4QM4t6m s9RuzZ1jUPKogjY3ynC5aWVuj4+z4sbBUrRoYhWAysOglP6hVryFnNWRlnrfeyOl8pYF Q/aPHTlUFvzPeDb6DYcgp6BDRHut7p4+/d6KpGzjjwzWRFGMWrOniEQ+bfPN5/kB1vGZ aCZGm55+0efJFi0E2HhdYFVZ/KlouMcWMjvq25c3kv1ReW7NzuIr+lIkDz2Rc9BmXD2R zTnAZK1myT1vThzvHQ1zUZ3sie4qqfYa6rYzEnFKDsNe60KPb2licOxck8TNW26qn3sU xiPg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 66-v6si12167123pla.131.2018.01.30.07.17.50; Tue, 30 Jan 2018 07:18:05 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752933AbeA3PQr (ORCPT + 99 others); Tue, 30 Jan 2018 10:16:47 -0500 Received: from lhrrgout.huawei.com ([194.213.3.17]:23928 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751377AbeA3PQq (ORCPT ); Tue, 30 Jan 2018 10:16:46 -0500 Received: from LHREML714-CAH.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id A076D27FA8B9A; Tue, 30 Jan 2018 15:16:41 +0000 (GMT) Received: from localhost.localdomain (10.122.225.51) by smtpsuk.huawei.com (10.201.108.37) with Microsoft SMTP Server (TLS) id 14.3.361.1; Tue, 30 Jan 2018 15:16:37 +0000 From: Igor Stoppa To: , , , , , CC: , , , , , Igor Stoppa Subject: [PATCH 3/6] struct page: add field for vm_struct Date: Tue, 30 Jan 2018 17:14:43 +0200 Message-ID: <20180130151446.24698-4-igor.stoppa@huawei.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20180130151446.24698-1-igor.stoppa@huawei.com> References: <20180130151446.24698-1-igor.stoppa@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.122.225.51] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When a page is used for virtual memory, it is often necessary to obtian a handler to the corresponding vm_struct, which refers to the virtually continuous area generated when invoking vmalloc. The struct page has a "mapping" field, which can be re-used, to store a pointer to the parent area. This will avoid more expensive searches. As example, the function find_vm_area is reimplemented, to take advantage of the newly introduced field. Signed-off-by: Igor Stoppa --- include/linux/mm_types.h | 1 + mm/vmalloc.c | 18 +++++++++++++----- 2 files changed, 14 insertions(+), 5 deletions(-) diff --git a/include/linux/mm_types.h b/include/linux/mm_types.h index cfd0ac4..2abd540 100644 --- a/include/linux/mm_types.h +++ b/include/linux/mm_types.h @@ -56,6 +56,7 @@ struct page { void *s_mem; /* slab first object */ atomic_t compound_mapcount; /* first tail page */ /* page_deferred_list().next -- second tail page */ + struct vm_struct *area; }; /* Second double word */ diff --git a/mm/vmalloc.c b/mm/vmalloc.c index 6739420..44c5dfc 100644 --- a/mm/vmalloc.c +++ b/mm/vmalloc.c @@ -1466,13 +1466,16 @@ struct vm_struct *get_vm_area_caller(unsigned long size, unsigned long flags, */ struct vm_struct *find_vm_area(const void *addr) { - struct vmap_area *va; + struct page *page; - va = find_vmap_area((unsigned long)addr); - if (va && va->flags & VM_VM_AREA) - return va->vm; + if (unlikely(!is_vmalloc_addr(addr))) + return NULL; - return NULL; + page = vmalloc_to_page(addr); + if (unlikely(!page)) + return NULL; + + return page->area; } /** @@ -1536,6 +1539,7 @@ static void __vunmap(const void *addr, int deallocate_pages) struct page *page = area->pages[i]; BUG_ON(!page); + page->area = NULL; __free_pages(page, 0); } @@ -1744,6 +1748,7 @@ void *__vmalloc_node_range(unsigned long size, unsigned long align, const void *caller) { struct vm_struct *area; + unsigned int page_counter; void *addr; unsigned long real_size = size; @@ -1769,6 +1774,9 @@ void *__vmalloc_node_range(unsigned long size, unsigned long align, kmemleak_vmalloc(area, size, gfp_mask); + for (page_counter = 0; page_counter < area->nr_pages; page_counter++) + area->pages[page_counter]->area = area; + return addr; fail: -- 2.9.3