Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp3329702imm; Sun, 1 Jul 2018 18:47:12 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdd4yrA05hDhaURRn2Zrl4PwhzFjkMX/lQpUekFDcHhuTe4mFFyWl0pIOCIf4yaq4vAV7Iw X-Received: by 2002:a65:41c6:: with SMTP id b6-v6mr6544121pgq.174.1530496032483; Sun, 01 Jul 2018 18:47:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530496032; cv=none; d=google.com; s=arc-20160816; b=LMUvjjI21Kl7yLxm0qHJxNeNhD5qwNetfiPvBbeqCa/Y17p80RQTvZyIN8SkPTeARd 3TOMNXcRtSrWRHtjj/TjKYk1CaydrLTI27PUXY1L5At8eteEq7alhnwWLjmgJco41TmX ULqGuw0rLwaLCdUvUW+gcTDRBTcgUc74df+70ci/+wVHfCXD0YprYodPQXA0Ze7ndfXX XTBpmzIcwaDBDWGfJuqtBNB7iQwbFOC4fND/ZgaJNoxsrkmvpD+qpA8gvf3QpRzR1mtN 2HxfbKfgG+I7hFVuudSipPZ4jHDLP8CWePahYSRzvMpP0fhy4TnsJFUEo/sPOaP9zJDZ K3bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=tscyRn92ymzgok3JSTmKroc3mjIKRsgQ4wVIH6D/6Ow=; b=pVCK3FawT2luPUbTvcHCLU8Katel1y9WgTaQZBH3SRN2vb5aU7KAEKi9ue/Qexdail v/wcSsZeb74dXwZ9WoIHr2Pe0bsLl2UYnUA5fMFDzNQTdI2lqvmp2n/vPG64Is78xZki btkoOdyeExVOm1WLB04U9PfaUqfw87dBt01rXMpb25sD6Mj+5wKDsStie8QufGi5DWqR gWpEym/JMqjsdHQc1s/o5Bwzojx7ZyU707sTXEI2qW/ccItkVc22P2wRyPK8L/0aa9Tl Mzb2UC82mQvM+evUwBM9VfAAVITZcynSfKkJAJb5GkhKHXPKjP+FYtHqutd8ePeMdx/D M5dQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=bkBbMW6R; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b19-v6si14554958pls.439.2018.07.01.18.46.57; Sun, 01 Jul 2018 18:47:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=bkBbMW6R; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932395AbeGBBoE (ORCPT + 99 others); Sun, 1 Jul 2018 21:44:04 -0400 Received: from userp2120.oracle.com ([156.151.31.85]:53400 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752843AbeGBBoB (ORCPT ); Sun, 1 Jul 2018 21:44:01 -0400 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w621erd0062695 for ; Mon, 2 Jul 2018 01:44:00 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=mime-version : references : in-reply-to : from : date : message-id : subject : to : cc : content-type; s=corp-2017-10-26; bh=tscyRn92ymzgok3JSTmKroc3mjIKRsgQ4wVIH6D/6Ow=; b=bkBbMW6RKmQzIso71dy2gZAkgMS3eQ2OgYxfQCM9a+RqhjzoSNbJI7kWIGR6JW+oMPGw 1JQYW/OL8RDEkO8MT8WAsyQsA8MaYWPT9hxklwBwUTpMCcdLRulrr6lakwdzrvNTNy1A U6PGtYh0WDwxiZ7krxW4JpBCkifQsDsEfsJlwXtAsxE+MntqkpoQnOvw4vNJBZKinOKm R2maI9Hm4+pweXoZ3S89GK6qg/tgyiw+DDVrM1Q+yIn5pmzNAA4rFQCvLBkDpebfFy2u cSkX+TiODpO/lmQDTzYTmDNl2xV/nvVUFvl2galEchr9CZejSLNPfWd+QJnhrj3SPsmC 7A== Received: from aserv0021.oracle.com (aserv0021.oracle.com [141.146.126.233]) by userp2120.oracle.com with ESMTP id 2jx2gptg5s-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Mon, 02 Jul 2018 01:44:00 +0000 Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by aserv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w621hwR1009338 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Mon, 2 Jul 2018 01:43:58 GMT Received: from abhmp0018.oracle.com (abhmp0018.oracle.com [141.146.116.24]) by aserv0122.oracle.com (8.14.4/8.14.4) with ESMTP id w621hw9P026281 for ; Mon, 2 Jul 2018 01:43:58 GMT Received: from mail-oi0-f50.google.com (/209.85.218.50) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Sun, 01 Jul 2018 18:43:58 -0700 Received: by mail-oi0-f50.google.com with SMTP id i12-v6so9051262oik.2 for ; Sun, 01 Jul 2018 18:43:58 -0700 (PDT) X-Gm-Message-State: APt69E2uo6R3pXd53Byj97Y4T2jlJH0gqMNsOwUG9rdmqXot2HssOoy6 1CE9hqrF37i4U0vBzYFag0cHkhmI4LsVgyMGxeE= X-Received: by 2002:aca:3243:: with SMTP id y64-v6mr14514185oiy.136.1530495837827; Sun, 01 Jul 2018 18:43:57 -0700 (PDT) MIME-Version: 1.0 References: <20180630030944.9335-1-pasha.tatashin@oracle.com> <20180630030944.9335-2-pasha.tatashin@oracle.com> <20180702012933.GH3223@MiWiFi-R3L-srv> In-Reply-To: <20180702012933.GH3223@MiWiFi-R3L-srv> From: Pavel Tatashin Date: Sun, 1 Jul 2018 21:43:20 -0400 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v2 1/2] mm/sparse: add sparse_init_nid() To: bhe@redhat.com Cc: Steven Sistare , Daniel Jordan , LKML , Andrew Morton , kirill.shutemov@linux.intel.com, Michal Hocko , Linux Memory Management List , dan.j.williams@intel.com, jack@suse.cz, jglisse@redhat.com, Souptick Joarder , gregkh@linuxfoundation.org, Vlastimil Babka , Wei Yang , dave.hansen@intel.com, rientjes@google.com, mingo@kernel.org, osalvador@techadventures.net Content-Type: text/plain; charset="UTF-8" X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8941 signatures=668704 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=10 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1806210000 definitions=main-1807020018 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Jul 1, 2018 at 9:29 PM Baoquan He wrote: > > On 06/29/18 at 11:09pm, Pavel Tatashin wrote: > > sparse_init() requires to temporary allocate two large buffers: > > usemap_map and map_map. Baoquan He has identified that these buffers are so > > large that Linux is not bootable on small memory machines, such as a kdump > > boot. > > These two temporary buffers are large when CONFIG_X86_5LEVEL is enabled. > Otherwise it's OK. Thank you. I will add CONFIG_X86_5LEVEL to the commit log. Pavel > > > > > Baoquan provided a fix, which reduces these sizes of these buffers, but it > > is much better to get rid of them entirely. > > > > Add a new way to initialize sparse memory: sparse_init_nid(), which only > > operates within one memory node, and thus allocates memory either in large > > contiguous block or allocates section by section. This eliminates the need > > for use of temporary buffers. > > > > For simplified bisecting and review, the new interface is going to be > > enabled as well as old code removed in the next patch. > > > > Signed-off-by: Pavel Tatashin > > Reviewed-by: Oscar Salvador > > --- > > include/linux/mm.h | 8 ++++ > > mm/sparse-vmemmap.c | 49 ++++++++++++++++++++++++ > > mm/sparse.c | 91 +++++++++++++++++++++++++++++++++++++++++++++ > > 3 files changed, 148 insertions(+) > > > > diff --git a/include/linux/mm.h b/include/linux/mm.h > > index a0fbb9ffe380..85530fdfb1f2 100644 > > --- a/include/linux/mm.h > > +++ b/include/linux/mm.h > > @@ -2651,6 +2651,14 @@ void sparse_mem_maps_populate_node(struct page **map_map, > > unsigned long pnum_end, > > unsigned long map_count, > > int nodeid); > > +struct page * sparse_populate_node(unsigned long pnum_begin, > > + unsigned long pnum_end, > > + unsigned long map_count, > > + int nid); > > +struct page * sparse_populate_node_section(struct page *map_base, > > + unsigned long map_index, > > + unsigned long pnum, > > + int nid); > > > > struct page *sparse_mem_map_populate(unsigned long pnum, int nid, > > struct vmem_altmap *altmap); > > diff --git a/mm/sparse-vmemmap.c b/mm/sparse-vmemmap.c > > index e1a54ba411ec..b3e325962306 100644 > > --- a/mm/sparse-vmemmap.c > > +++ b/mm/sparse-vmemmap.c > > @@ -311,3 +311,52 @@ void __init sparse_mem_maps_populate_node(struct page **map_map, > > vmemmap_buf_end = NULL; > > } > > } > > + > > +struct page * __init sparse_populate_node(unsigned long pnum_begin, > > + unsigned long pnum_end, > > + unsigned long map_count, > > + int nid) > > +{ > > + unsigned long size = sizeof(struct page) * PAGES_PER_SECTION; > > + unsigned long pnum, map_index = 0; > > + void *vmemmap_buf_start; > > + > > + size = ALIGN(size, PMD_SIZE) * map_count; > > + vmemmap_buf_start = __earlyonly_bootmem_alloc(nid, size, > > + PMD_SIZE, > > + __pa(MAX_DMA_ADDRESS)); > > + if (vmemmap_buf_start) { > > + vmemmap_buf = vmemmap_buf_start; > > + vmemmap_buf_end = vmemmap_buf_start + size; > > + } > > + > > + for (pnum = pnum_begin; map_index < map_count; pnum++) { > > + if (!present_section_nr(pnum)) > > + continue; > > + if (!sparse_mem_map_populate(pnum, nid, NULL)) > > + break; > > + map_index++; > > + BUG_ON(pnum >= pnum_end); > > + } > > + > > + if (vmemmap_buf_start) { > > + /* need to free left buf */ > > + memblock_free_early(__pa(vmemmap_buf), > > + vmemmap_buf_end - vmemmap_buf); > > + vmemmap_buf = NULL; > > + vmemmap_buf_end = NULL; > > + } > > + return pfn_to_page(section_nr_to_pfn(pnum_begin)); > > +} > > + > > +/* > > + * Return map for pnum section. sparse_populate_node() has populated memory map > > + * in this node, we simply do pnum to struct page conversion. > > + */ > > +struct page * __init sparse_populate_node_section(struct page *map_base, > > + unsigned long map_index, > > + unsigned long pnum, > > + int nid) > > +{ > > + return pfn_to_page(section_nr_to_pfn(pnum)); > > +} > > diff --git a/mm/sparse.c b/mm/sparse.c > > index d18e2697a781..c18d92b8ab9b 100644 > > --- a/mm/sparse.c > > +++ b/mm/sparse.c > > @@ -456,6 +456,43 @@ void __init sparse_mem_maps_populate_node(struct page **map_map, > > __func__); > > } > > } > > + > > +static unsigned long section_map_size(void) > > +{ > > + return PAGE_ALIGN(sizeof(struct page) * PAGES_PER_SECTION); > > +} > > + > > +/* > > + * Try to allocate all struct pages for this node, if this fails, we will > > + * be allocating one section at a time in sparse_populate_node_section(). > > + */ > > +struct page * __init sparse_populate_node(unsigned long pnum_begin, > > + unsigned long pnum_end, > > + unsigned long map_count, > > + int nid) > > +{ > > + return memblock_virt_alloc_try_nid_raw(section_map_size() * map_count, > > + PAGE_SIZE, __pa(MAX_DMA_ADDRESS), > > + BOOTMEM_ALLOC_ACCESSIBLE, nid); > > +} > > + > > +/* > > + * Return map for pnum section. map_base is not NULL if we could allocate map > > + * for this node together. Otherwise we allocate one section at a time. > > + * map_index is the index of pnum in this node counting only present sections. > > + */ > > +struct page * __init sparse_populate_node_section(struct page *map_base, > > + unsigned long map_index, > > + unsigned long pnum, > > + int nid) > > +{ > > + if (map_base) { > > + unsigned long offset = section_map_size() * map_index; > > + > > + return (struct page *)((char *)map_base + offset); > > + } > > + return sparse_mem_map_populate(pnum, nid, NULL); > > +} > > #endif /* !CONFIG_SPARSEMEM_VMEMMAP */ > > > > static void __init sparse_early_mem_maps_alloc_node(void *data, > > @@ -520,6 +557,60 @@ static void __init alloc_usemap_and_memmap(void (*alloc_func) > > map_count, nodeid_begin); > > } > > > > +/* > > + * Initialize sparse on a specific node. The node spans [pnum_begin, pnum_end) > > + * And number of present sections in this node is map_count. > > + */ > > +void __init sparse_init_nid(int nid, unsigned long pnum_begin, > > + unsigned long pnum_end, > > + unsigned long map_count) > > +{ > > + unsigned long pnum, usemap_longs, *usemap, map_index; > > + struct page *map, *map_base; > > + > > + usemap_longs = BITS_TO_LONGS(SECTION_BLOCKFLAGS_BITS); > > + usemap = sparse_early_usemaps_alloc_pgdat_section(NODE_DATA(nid), > > + usemap_size() * > > + map_count); > > + if (!usemap) { > > + pr_err("%s: usemap allocation failed", __func__); > > + goto failed; > > + } > > + map_base = sparse_populate_node(pnum_begin, pnum_end, > > + map_count, nid); > > + map_index = 0; > > + for_each_present_section_nr(pnum_begin, pnum) { > > + if (pnum >= pnum_end) > > + break; > > + > > + BUG_ON(map_index == map_count); > > + map = sparse_populate_node_section(map_base, map_index, > > + pnum, nid); > > + if (!map) { > > + pr_err("%s: memory map backing failed. Some memory will not be available.", > > + __func__); > > + pnum_begin = pnum; > > + goto failed; > > If one memmap is unavailable, do we need to jump to 'failed' to mark all > sections of the node as not present? E.g the last section of one node > failed to populate memmap? > > > > + } > > + check_usemap_section_nr(nid, usemap); > > + sparse_init_one_section(__nr_to_section(pnum), pnum, map, > > + usemap); > > + map_index++; > > + usemap += usemap_longs; > > + } > > + return; > > +failed: > > + /* We failed to allocate, mark all the following pnums as not present */ > > + for_each_present_section_nr(pnum_begin, pnum) { > > + struct mem_section *ms; > > + > > + if (pnum >= pnum_end) > > + break; > > + ms = __nr_to_section(pnum); > > + ms->section_mem_map = 0; > > + } > > +} > > + > > /* > > * Allocate the accumulated non-linear sections, allocate a mem_map > > * for each and record the physical to section mapping. > > -- > > 2.18.0 > > >