Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp6953212imm; Wed, 27 Jun 2018 16:53:52 -0700 (PDT) X-Google-Smtp-Source: ADUXVKI9U5r4SIcsxwOR+d2uoaRSnWMDFpfbCHETHg7nCMKh/6MXOPBmuu2HE1zrYxZAJk97EcI3 X-Received: by 2002:a17:902:b907:: with SMTP id bf7-v6mr8209813plb.331.1530143632869; Wed, 27 Jun 2018 16:53:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530143632; cv=none; d=google.com; s=arc-20160816; b=PZ2aBBOLstGYZ41V2baQuKgyUOJawzPPDN/M0QnIeTwyVMXFG1BBpQNX/UhzK5MF7u Mpx2FCdrxd3iI37odn7szChTcmL/QA1++vXr/dTPLWwL9SXnbarUtyx7/bUtfpfWv8wt uGfQm+LCjYVE42M1gEg1ggIDcSpcnxgXUoJk/DC09vWgCZp2Riqfen3vFNk6IAdR0b3j eCscS404tzjJe2vrQmgo280F78I96vcR+4j3BftMMBbbobVBd7Uz2UmVUWMXMFY9650X Dov+ns/sNSGlYNVxLcmYRKwgYrBD+8VNr1fpdTjTj9NXmjYGS17+8uVOEE5fCYUu+VKW SScg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=XPLAw+lteAmda/Q1Idsz1/AoeFDTxtJjOwqT/VH1hm8=; b=tAM7wrzHpqQUlBZ/de0W0nSWQa95vZkU8fWSXUsFTSq5OQE4lQYR5DZ+6//uWU6BPU 33OmL/2zzUzx/CXlR0CIiq7Bn1xEmWx2ZXlo9sMLWYlyIPSRHba2+BMmm+x2mssFi03l 9AENFvx6GrFgLgKBsr460gFkCEsnwCE8v4uAbT+EkdWLv4bWG7IzCaz5/yjr7SW+IyHS D9ql7IHtF/CBh6QpD1NqJ0ZZKX0kmD6iagZqvgxCk1DH6Y4Elm1xTimvVMrpmqf7l/Hx uxmjnJfH2ToFgyDwMR0CN2P8/T/h1nCMx8NfdMqcFSuNaOJPvtzd5FdZh0vxc57n39/K NmuQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f1-v6si966229pli.358.2018.06.27.16.53.38; Wed, 27 Jun 2018 16:53:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752005AbeF0W7v (ORCPT + 99 others); Wed, 27 Jun 2018 18:59:51 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:57824 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751668AbeF0W7v (ORCPT ); Wed, 27 Jun 2018 18:59:51 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 7C2CA4075647; Wed, 27 Jun 2018 22:59:50 +0000 (UTC) Received: from localhost (ovpn-8-16.pek2.redhat.com [10.72.8.16]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 50DE62156880; Wed, 27 Jun 2018 22:59:48 +0000 (UTC) Date: Thu, 28 Jun 2018 06:59:45 +0800 From: Baoquan He To: Oscar Salvador Cc: linux-kernel@vger.kernel.org, akpm@linux-foundation.org, dave.hansen@intel.com, pagupta@redhat.com, linux-mm@kvack.org, kirill.shutemov@linux.intel.com Subject: Re: [PATCH v5 2/4] mm/sparsemem: Defer the ms->section_mem_map clearing Message-ID: <20180627225945.GD8970@localhost.localdomain> References: <20180627013116.12411-1-bhe@redhat.com> <20180627013116.12411-3-bhe@redhat.com> <20180627095439.GA5924@techadventures.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180627095439.GA5924@techadventures.net> User-Agent: Mutt/1.9.1 (2017-09-22) X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Wed, 27 Jun 2018 22:59:50 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Wed, 27 Jun 2018 22:59:50 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'bhe@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 06/27/18 at 11:54am, Oscar Salvador wrote: > On Wed, Jun 27, 2018 at 09:31:14AM +0800, Baoquan He wrote: > > In sparse_init(), if CONFIG_SPARSEMEM_ALLOC_MEM_MAP_TOGETHER=y, system > > will allocate one continuous memory chunk for mem maps on one node and > > populate the relevant page tables to map memory section one by one. If > > fail to populate for a certain mem section, print warning and its > > ->section_mem_map will be cleared to cancel the marking of being present. > > Like this, the number of mem sections marked as present could become > > less during sparse_init() execution. > > > > Here just defer the ms->section_mem_map clearing if failed to populate > > its page tables until the last for_each_present_section_nr() loop. This > > is in preparation for later optimizing the mem map allocation. > > > > Signed-off-by: Baoquan He > > --- > > mm/sparse-vmemmap.c | 1 - > > mm/sparse.c | 12 ++++++++---- > > 2 files changed, 8 insertions(+), 5 deletions(-) > > > > diff --git a/mm/sparse-vmemmap.c b/mm/sparse-vmemmap.c > > index bd0276d5f66b..640e68f8324b 100644 > > --- a/mm/sparse-vmemmap.c > > +++ b/mm/sparse-vmemmap.c > > @@ -303,7 +303,6 @@ void __init sparse_mem_maps_populate_node(struct page **map_map, > > ms = __nr_to_section(pnum); > > pr_err("%s: sparsemem memory map backing failed some memory will not be available\n", > > __func__); > > - ms->section_mem_map = 0; > > Since we are deferring the clearing of section_mem_map, I guess we do not need > > struct mem_section *ms; > ms = __nr_to_section(pnum); > > anymore, right? Right, good catch, thanks. I will post a new round to fix this. > > > } > > > > if (vmemmap_buf_start) { > > diff --git a/mm/sparse.c b/mm/sparse.c > > index 6314303130b0..71ad53da2cd1 100644 > > --- a/mm/sparse.c > > +++ b/mm/sparse.c > > @@ -451,7 +451,6 @@ void __init sparse_mem_maps_populate_node(struct page **map_map, > > ms = __nr_to_section(pnum); > > pr_err("%s: sparsemem memory map backing failed some memory will not be available\n", > > __func__); > > - ms->section_mem_map = 0; > > The same goes here. > > > > -- > Oscar Salvador > SUSE L3