Received: by 10.213.65.68 with SMTP id h4csp1651387imn; Thu, 5 Apr 2018 01:06:54 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/t4Qdu5zT04padchcI/qxyWeEjRu+n+XQdxIsURfZ0bSBbJnfwSDEu9NND5ds8jvapcS05 X-Received: by 10.98.10.23 with SMTP id s23mr16565416pfi.204.1522915614230; Thu, 05 Apr 2018 01:06:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522915614; cv=none; d=google.com; s=arc-20160816; b=wlDwt9dpWk5T5ClCRJKtUkOogSjWerWpr2z5Z1LiC4XIAro9SXopfn7hdbxefW6Tra kWKivC/nvH5UW0Um09xMpcjFoN+diziqlqaol2Edg5FP4SI9EsOTCTXS7J/sdBkNaa67 EARYHyUNAjuCnWwzNfRwaNSruY41Yn/5qswC76B+iWS6s60BbzTaBXMIZ6gIiil35nLl gH6ptF3ugR72Vna7dI2x2gdLIHgGvdCqy9/JC6K5Kq2EGaHlyOTUMcBpIWTr8KmKgg4H 1jo0h+1g1/kOkPEUh5N6SMGd8z0vhyknr85G1G6T+3JAXUIQu/t2S1c0Zg7JKD3pIK0U w8hQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=cbkps0E4Uj8hjeJYIslDwEKVqraBu9Yd02GLBMIAU+k=; b=yr0wXH2gqbUZo/iMZ4b0mk8jd5zjn7ovLkLVrQisLNdTK8UVO03d1dAM5RuxZnx5DG hqVXQ2G/kfMJLPs+RtfT7EbcrvDS/sFUlp/H9oXIBlUo0hqjaMMpeyWo4q1k0PMvJ7Ea y+I3zmmfeFKE2o6WXzqHJRv4HRm2cxSIrHBgy/DMBf1MYJmp4ekw3Hc1+gc6eaf0G3qT 3zAEkbYHZX9eJ+PHM3WfmKkd/16m2QpVfD4Cy6gYw2Uw/aSnfVWYaI2DX+H/AH7MZPa8 baBX3mDguJ0ejXCt6qoA2doHbqm2THR7CHCKXBWvn23m4DsVQuQXKNOAk+gLEKFl9QYd re6A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=NeyX0+aZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 207si5666288pfz.108.2018.04.05.01.06.40; Thu, 05 Apr 2018 01:06:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=NeyX0+aZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751525AbeDEIFT (ORCPT + 99 others); Thu, 5 Apr 2018 04:05:19 -0400 Received: from mail-pl0-f65.google.com ([209.85.160.65]:40036 "EHLO mail-pl0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751249AbeDEIFN (ORCPT ); Thu, 5 Apr 2018 04:05:13 -0400 Received: by mail-pl0-f65.google.com with SMTP id x4-v6so18051082pln.7 for ; Thu, 05 Apr 2018 01:05:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=cbkps0E4Uj8hjeJYIslDwEKVqraBu9Yd02GLBMIAU+k=; b=NeyX0+aZa6Wklkxgyq8epCuk02OjybR6YTYRjWhpU86fXEk6VmcyNEu+j0actrukSf LlGo0K7KHfe5LI8rnBnrwyJ2NLeJ7PyPu+77FPM/kRKXH8RplohfMe07tIFdkaB8Rr9B zDK68UioYdPBaUM61bJjcTC0obks/ObtzuyLfWoIO8VwZm0YZSQguhQsfNTJSuEade0h je1IcBoDeMEmsw0d/9J+ONN4wOaVzSNGnfQeZ2ThCFm8/bbML6AuzOp8m2ua7i/6Npt/ uW0pPnUlIOSuiY8I6cyKyKjI8pZdMwfaWeeZAv7fYhUw0Dp5Xqi1UcDNar0iWGB9HqBp D27g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=cbkps0E4Uj8hjeJYIslDwEKVqraBu9Yd02GLBMIAU+k=; b=bkDUVXNb1sou259tVP8TOoyAfOOXvMuGfvBXdOl2vKZYbr/POxwmZPOUX0mTKwaxzc 6BKBps0Ri3pzU7jiLbrSLxzKrtlt9MSiJZpVp6oxASFDDJCHqt/Q/KuVjR3xmRTQPhF2 aWLmK00TAz6izJd1NcHH9TW4CtNxMb1nWjT1AzcLTULZ3/g7NUotk0cYYKPEfda5oJts jo90qfj3vz+CBhEA/LgQsDQhDMR0bSUvQhqjg2K1ootOdRXLY26uBqFVA+MesQJpS+b3 GmPUVJqh1cV2jT9omx/6S2jtThPojsFW6zd03eXDC0kDfyT6EqgKcoYN0iMqIOCTMqbX MYWg== X-Gm-Message-State: AElRT7Fh6XQrOOATS71FojM7Ds1ZB83MK2JU4LIE7d1tjlK6pR+4EYHt RCsatvJh3O66jlZDBQgO+S8= X-Received: by 2002:a17:902:8a93:: with SMTP id p19-v6mr22531885plo.256.1522915512970; Thu, 05 Apr 2018 01:05:12 -0700 (PDT) Received: from localhost.localdomain ([38.106.11.25]) by smtp.gmail.com with ESMTPSA id 2sm14983690pft.33.2018.04.05.01.05.00 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 05 Apr 2018 01:05:12 -0700 (PDT) From: Jia He To: Russell King , Catalin Marinas , Will Deacon , Mark Rutland , Ard Biesheuvel , Andrew Morton , Michal Hocko Cc: Wei Yang , Kees Cook , Laura Abbott , Vladimir Murzin , Philip Derrin , AKASHI Takahiro , James Morse , Steve Capper , Pavel Tatashin , Gioh Kim , Vlastimil Babka , Mel Gorman , Johannes Weiner , Kemi Wang , Petr Tesarik , YASUAKI ISHIMATSU , Andrey Ryabinin , Nikolay Borisov , Daniel Jordan , Daniel Vacek , Eugeniu Rosca , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, Jia He , Jia He Subject: [PATCH v7 1/5] mm: page_alloc: remain memblock_next_valid_pfn() on arm and arm64 Date: Thu, 5 Apr 2018 01:04:34 -0700 Message-Id: <1522915478-5044-2-git-send-email-hejianet@gmail.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1522915478-5044-1-git-send-email-hejianet@gmail.com> References: <1522915478-5044-1-git-send-email-hejianet@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit b92df1de5d28 ("mm: page_alloc: skip over regions of invalid pfns where possible") optimized the loop in memmap_init_zone(). But it causes possible panic bug. So Daniel Vacek reverted it later. But as suggested by Daniel Vacek, it is fine to using memblock to skip gaps and finding next valid frame with CONFIG_HAVE_ARCH_PFN_VALID. On arm and arm64, memblock is used by default. But generic version of pfn_valid() is based on mem sections and memblock_next_valid_pfn() does not always return the next valid one but skips more resulting in some valid frames to be skipped (as if they were invalid). And that's why kernel was eventually crashing on some !arm machines. And as verified by Eugeniu Rosca, arm can benifit from commit b92df1de5d28. So remain the memblock_next_valid_pfn on arm/arm64 and move the related codes to one file include/linux/arm96_common.h Suggested-by: Daniel Vacek Signed-off-by: Jia He --- arch/arm/mm/init.c | 1 + arch/arm64/mm/init.c | 1 + include/linux/arm96_common.h | 37 +++++++++++++++++++++++++++++++++++++ include/linux/mmzone.h | 11 +++++++++++ mm/page_alloc.c | 2 +- 5 files changed, 51 insertions(+), 1 deletion(-) create mode 100644 include/linux/arm96_common.h diff --git a/arch/arm/mm/init.c b/arch/arm/mm/init.c index a1f11a7..296cc52 100644 --- a/arch/arm/mm/init.c +++ b/arch/arm/mm/init.c @@ -25,6 +25,7 @@ #include #include #include +#include #include #include diff --git a/arch/arm64/mm/init.c b/arch/arm64/mm/init.c index 00e7b90..6efab80 100644 --- a/arch/arm64/mm/init.c +++ b/arch/arm64/mm/init.c @@ -40,6 +40,7 @@ #include #include #include +#include #include #include diff --git a/include/linux/arm96_common.h b/include/linux/arm96_common.h new file mode 100644 index 0000000..a6f68ea --- /dev/null +++ b/include/linux/arm96_common.h @@ -0,0 +1,37 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +/* Common definitions of arm and arm64 + * Copyright (C) 2018 HXT-semitech Corp. + */ +#ifndef __ARM96_COMMON_H +#define __ARM96_COMMON_H +#ifdef CONFIG_HAVE_ARCH_PFN_VALID +/* HAVE_MEMBLOCK is always enabled on arm and arm64 */ +ulong __init_memblock memblock_next_valid_pfn(ulong pfn) +{ + struct memblock_type *type = &memblock.memory; + unsigned int right = type->cnt; + unsigned int mid, left = 0; + phys_addr_t addr = PFN_PHYS(++pfn); + + do { + mid = (right + left) / 2; + + if (addr < type->regions[mid].base) + right = mid; + else if (addr >= (type->regions[mid].base + + type->regions[mid].size)) + left = mid + 1; + else { + /* addr is within the region, so pfn is valid */ + return pfn; + } + } while (left < right); + + if (right == type->cnt) + return -1UL; + else + return PHYS_PFN(type->regions[right].base); +} +EXPORT_SYMBOL(memblock_next_valid_pfn); +#endif /*CONFIG_HAVE_ARCH_PFN_VALID*/ +#endif /*__ARM96_COMMON_H*/ diff --git a/include/linux/mmzone.h b/include/linux/mmzone.h index d797716..eb56071 100644 --- a/include/linux/mmzone.h +++ b/include/linux/mmzone.h @@ -1245,6 +1245,8 @@ static inline int pfn_valid(unsigned long pfn) return 0; return valid_section(__nr_to_section(pfn_to_section_nr(pfn))); } + +#define next_valid_pfn(pfn) (pfn++) #endif static inline int pfn_present(unsigned long pfn) @@ -1270,6 +1272,10 @@ static inline int pfn_present(unsigned long pfn) #endif #define early_pfn_valid(pfn) pfn_valid(pfn) +#ifdef CONFIG_HAVE_ARCH_PFN_VALID +extern ulong memblock_next_valid_pfn(ulong pfn); +#define next_valid_pfn(pfn) memblock_next_valid_pfn(pfn) +#endif void sparse_init(void); #else #define sparse_init() do {} while (0) @@ -1291,6 +1297,11 @@ struct mminit_pfnnid_cache { #define early_pfn_valid(pfn) (1) #endif +/* fallback to default defitions*/ +#ifndef next_valid_pfn +#define next_valid_pfn(pfn) (pfn++) +#endif + void memory_present(int nid, unsigned long start, unsigned long end); unsigned long __init node_memmap_size_bytes(int, unsigned long, unsigned long); diff --git a/mm/page_alloc.c b/mm/page_alloc.c index c19f5ac..9d05f29 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -5475,7 +5475,7 @@ void __meminit memmap_init_zone(unsigned long size, int nid, unsigned long zone, if (altmap && start_pfn == altmap->base_pfn) start_pfn += altmap->reserve; - for (pfn = start_pfn; pfn < end_pfn; pfn++) { + for (pfn = start_pfn; pfn < end_pfn; next_valid_pfn(pfn)) { /* * There can be holes in boot-time mem_map[]s handed to this * function. They do not exist on hotplugged memory. -- 2.7.4