Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp5827050imm; Tue, 26 Jun 2018 19:43:02 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKXjx+kaDWXzGKabFTRaHVqVh/ZLMbcRYZbRE4UVOnJoYdUuwYzi4SdMVz+5Npl446tM7VT X-Received: by 2002:a65:61af:: with SMTP id i15-v6mr3520427pgv.349.1530067382470; Tue, 26 Jun 2018 19:43:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530067382; cv=none; d=google.com; s=arc-20160816; b=Sv75L95Zz9Nrqe2RXX1lUMWiQXpqm3LINm5szTDUUzZK1qnSGuMjdOSZ2ibzR5rK3h OtctdRE5zDPTdrCtAXlgQ+fz5qyaXcGdw2z/vbASX/OpWWvkZwc+yu4BgmpSodioIFgQ pJhmtntxGjN4iO9vLtN/D5KGWUUoBlwIPnHvC6VLy3XKXgNCgH6rNFWNCbWhrX3DA2v8 Ikzn74sG2Y3BYd6vTU5znwjIavJ5hflDRr/52iDcgc98G1kkgYtZR78fZNUIGDxBfm5Q IUt3EMVeDjo6KIa4tC7qj26wBM7kIuueYQtzw/hodZpZHu+xuJDVO1AmpSygFoch/NRv uhmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=77cGPGQTmsKhPS1aqo4fqoPfOktFGM38yYFNWZayAl4=; b=VY1PIjg9s2yZOcuNGcKYWMqZjRJW6TFkCOeQ6f+AQcZNd6P2AA63pkTaPKZXphHgJr NZTPA7exJxM3CRIN6LSbqWpkkGlKtU7ilLXNOT91uX7m5KFA6MeKXmX63Oh1gUse194V Ys401YC/BlKULZo5HUCxRw5ik+vOURXaMLG++QgiAJSS6jQLeYHqAD42Fdl5EgGLVapq V/UeIJfOSpKCSNWUO4lGgpW8ZbnbPY2oOdgznHW8/IbVjvgo1Fwdv2k/1BAbhg+wu/hW 6kBNJHRLW/uKae7N8izfAoV+7ecfMN4r1HBfU+6uDEK/nrWJWh2qZQJjSPoa0RGG6cRp ZDQg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g33-v6si2954289plb.297.2018.06.26.19.42.48; Tue, 26 Jun 2018 19:43:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S964862AbeF0Bbg (ORCPT + 99 others); Tue, 26 Jun 2018 21:31:36 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:39182 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S934710AbeF0Bbe (ORCPT ); Tue, 26 Jun 2018 21:31:34 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id B3D04400B455; Wed, 27 Jun 2018 01:31:33 +0000 (UTC) Received: from localhost.localdomain.com (ovpn-8-24.pek2.redhat.com [10.72.8.24]) by smtp.corp.redhat.com (Postfix) with ESMTP id F25E4111764C; Wed, 27 Jun 2018 01:31:29 +0000 (UTC) From: Baoquan He To: linux-kernel@vger.kernel.org, akpm@linux-foundation.org, dave.hansen@intel.com, pagupta@redhat.com Cc: linux-mm@kvack.org, kirill.shutemov@linux.intel.com, Baoquan He Subject: [PATCH v5 2/4] mm/sparsemem: Defer the ms->section_mem_map clearing Date: Wed, 27 Jun 2018 09:31:14 +0800 Message-Id: <20180627013116.12411-3-bhe@redhat.com> In-Reply-To: <20180627013116.12411-1-bhe@redhat.com> References: <20180627013116.12411-1-bhe@redhat.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Wed, 27 Jun 2018 01:31:33 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Wed, 27 Jun 2018 01:31:33 +0000 (UTC) for IP:'10.11.54.3' DOMAIN:'int-mx03.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'bhe@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In sparse_init(), if CONFIG_SPARSEMEM_ALLOC_MEM_MAP_TOGETHER=y, system will allocate one continuous memory chunk for mem maps on one node and populate the relevant page tables to map memory section one by one. If fail to populate for a certain mem section, print warning and its ->section_mem_map will be cleared to cancel the marking of being present. Like this, the number of mem sections marked as present could become less during sparse_init() execution. Here just defer the ms->section_mem_map clearing if failed to populate its page tables until the last for_each_present_section_nr() loop. This is in preparation for later optimizing the mem map allocation. Signed-off-by: Baoquan He --- mm/sparse-vmemmap.c | 1 - mm/sparse.c | 12 ++++++++---- 2 files changed, 8 insertions(+), 5 deletions(-) diff --git a/mm/sparse-vmemmap.c b/mm/sparse-vmemmap.c index bd0276d5f66b..640e68f8324b 100644 --- a/mm/sparse-vmemmap.c +++ b/mm/sparse-vmemmap.c @@ -303,7 +303,6 @@ void __init sparse_mem_maps_populate_node(struct page **map_map, ms = __nr_to_section(pnum); pr_err("%s: sparsemem memory map backing failed some memory will not be available\n", __func__); - ms->section_mem_map = 0; } if (vmemmap_buf_start) { diff --git a/mm/sparse.c b/mm/sparse.c index 6314303130b0..71ad53da2cd1 100644 --- a/mm/sparse.c +++ b/mm/sparse.c @@ -451,7 +451,6 @@ void __init sparse_mem_maps_populate_node(struct page **map_map, ms = __nr_to_section(pnum); pr_err("%s: sparsemem memory map backing failed some memory will not be available\n", __func__); - ms->section_mem_map = 0; } } #endif /* !CONFIG_SPARSEMEM_VMEMMAP */ @@ -479,7 +478,6 @@ static struct page __init *sparse_early_mem_map_alloc(unsigned long pnum) pr_err("%s: sparsemem memory map backing failed some memory will not be available\n", __func__); - ms->section_mem_map = 0; return NULL; } #endif @@ -583,17 +581,23 @@ void __init sparse_init(void) #endif for_each_present_section_nr(0, pnum) { + struct mem_section *ms; + ms = __nr_to_section(pnum); usemap = usemap_map[pnum]; - if (!usemap) + if (!usemap) { + ms->section_mem_map = 0; continue; + } #ifdef CONFIG_SPARSEMEM_ALLOC_MEM_MAP_TOGETHER map = map_map[pnum]; #else map = sparse_early_mem_map_alloc(pnum); #endif - if (!map) + if (!map) { + ms->section_mem_map = 0; continue; + } sparse_init_one_section(__nr_to_section(pnum), pnum, map, usemap); -- 2.13.6