Received: by 2002:ac0:a591:0:0:0:0:0 with SMTP id m17-v6csp294744imm; Thu, 5 Jul 2018 00:00:53 -0700 (PDT) X-Google-Smtp-Source: AAOMgpecG5OH/X/xOoXuZi0UkS92gzo30L/wVXOwpE9aZeMmQ9msvpT46nDXWYTnI/UC+Oj+Qo2C X-Received: by 2002:a63:121a:: with SMTP id h26-v6mr4556729pgl.316.1530774053018; Thu, 05 Jul 2018 00:00:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530774052; cv=none; d=google.com; s=arc-20160816; b=W4ump+lfk2YEGvvi+FLle4uz7H8KkTsvZp0SMfTUPXhVad4GWWqgx4ULNqpdA/umxj BsFsHQYIs2Jz7gmlumj0fEbbvYHVqNYDlsGqrVosdFopHcuak0n+HsH0n68TsPzSKM7E a6lieGhaqF2tUvOmSlKXaTV7YyX6kqiMSGtouhx0U3sVA5DdhjaxR02tJLkABqZHKups k8wGNwLgd+BaGQUx+IDu9YwATJLXtM1XIvGSB2bjzh/3S3QX4pDmy8iHRPE+RvdnP28l ylau4Mb3HloLflYO/K32GTzCtebFPI4q+u6w39kwSURkfme0XyyqJdW2MacDawZZUu6d mdzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject:arc-authentication-results; bh=M1d9CuZzJQWETviYhPe2Jk16dDbQtS6C5JiA2N9PlPE=; b=B6RNU3FymZ4wvZYIimLYcQ/kcZ3EEnjaaiKFhOaDTdfvH82w4/V0brQGVtnugmgV0Y /KBW5w+uIKhRHYfzqMv+5bbibLvvWaAstfRNfTUYKax7NWS412NfQ0sBDRQQfeIl9h+v /QX8SoAfN+/gBB8MhG8X/6Aw+0HOeWjYXXSiXr/Xq/wva/w+PgtjfOS2uWPvcL5F8ZqP LpKASrvpv+QuV02XYchkZ5xjxQGlzN8VUF3CCJbjhch9qylbT+Lf+A9TkmG7HNF5uur1 iLcNaPlAZWxADMY2NpOuktg6AiBTDmljysNXJAraA2mm+fA7hhtdWABOBxxdc4IIs/xz vVOA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r9-v6si4750788pgp.591.2018.07.05.00.00.38; Thu, 05 Jul 2018 00:00:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753476AbeGEG7d (ORCPT + 99 others); Thu, 5 Jul 2018 02:59:33 -0400 Received: from mga05.intel.com ([192.55.52.43]:54549 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753401AbeGEG7a (ORCPT ); Thu, 5 Jul 2018 02:59:30 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by fmsmga105.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 04 Jul 2018 23:59:29 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.51,311,1526367600"; d="scan'208";a="52135818" Received: from dwillia2-desk3.jf.intel.com (HELO dwillia2-desk3.amr.corp.intel.com) ([10.54.39.16]) by fmsmga007.fm.intel.com with ESMTP; 04 Jul 2018 23:59:21 -0700 Subject: [PATCH 04/13] mm: Multithread ZONE_DEVICE initialization From: Dan Williams To: akpm@linux-foundation.org Cc: Michal Hocko , Vlastimil Babka , vishal.l.verma@intel.com, hch@lst.de, linux-nvdimm@lists.01.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Date: Wed, 04 Jul 2018 23:49:23 -0700 Message-ID: <153077336359.40830.13007326947037437465.stgit@dwillia2-desk3.amr.corp.intel.com> In-Reply-To: <153077334130.40830.2714147692560185329.stgit@dwillia2-desk3.amr.corp.intel.com> References: <153077334130.40830.2714147692560185329.stgit@dwillia2-desk3.amr.corp.intel.com> User-Agent: StGit/0.18-2-gc94f MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On large / multi-socket persistent memory systems it can potentially take minutes to initialize the memmap. Even though such systems have multiple persistent memory namespaces that are registered asynchronously, they serialize on the mem_hotplug_begin() lock. The method for hiding memmap initialization in the typical memory case can not be directly reused for persistent memory. In the typical / volatile memory case pages are background freed to the memory allocator as they become initialized. For persistent memory the aim is to push everything to the background, but since it is dax mapped there is no way to redirect applications to limit their usage to the initialized set. I.e. any address may be directly accessed at any time. The bulk of the work is memmap_init_zone(). Splitting the work into threads yields a 1.5x to 2x performance in the time to initialize a 128GB namespace. However, the work is still serialized when there are multiple namespaces and the work is ultimately limited by memory-media write bandwidth. So, this commie is only a preparation step towards ultimately moving all memmap initialization completely into the background. Cc: Andrew Morton Cc: Michal Hocko Cc: Vlastimil Babka Signed-off-by: Dan Williams --- include/linux/memmap_async.h | 17 +++++ mm/page_alloc.c | 145 ++++++++++++++++++++++++++++-------------- 2 files changed, 113 insertions(+), 49 deletions(-) diff --git a/include/linux/memmap_async.h b/include/linux/memmap_async.h index 11aa9f3a523e..d2011681a910 100644 --- a/include/linux/memmap_async.h +++ b/include/linux/memmap_async.h @@ -2,12 +2,24 @@ #ifndef __LINUX_MEMMAP_ASYNC_H #define __LINUX_MEMMAP_ASYNC_H #include +#include +struct dev_pagemap; struct vmem_altmap; +/* + * Regardless of how many threads we request here the workqueue core may + * limit based on the amount of other concurrent 'async' work in the + * system, see WQ_MAX_ACTIVE + */ +#define NR_MEMMAP_THREADS 16 + struct memmap_init_env { struct vmem_altmap *altmap; + struct dev_pagemap *pgmap; bool want_memblock; + unsigned long zone; + int context; int nid; }; @@ -19,6 +31,11 @@ struct memmap_init_memmap { int result; }; +struct memmap_init_pages { + struct resource res; + struct memmap_init_env *env; +}; + struct memmap_async_state { struct memmap_init_env env; struct memmap_init_memmap memmap; diff --git a/mm/page_alloc.c b/mm/page_alloc.c index fb45cfeb4a50..6d0ed17cf305 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -38,6 +38,7 @@ #include #include #include +#include #include #include #include @@ -5455,6 +5456,68 @@ void __ref build_all_zonelists(pg_data_t *pgdat) ASYNC_DOMAIN_EXCLUSIVE(memmap_init_domain); +static void __meminit memmap_init_one(unsigned long pfn, unsigned long zone, + int nid, enum memmap_context context, struct dev_pagemap *pgmap) +{ + struct page *page = pfn_to_page(pfn); + + __init_single_page(page, pfn, zone, nid); + if (context == MEMMAP_HOTPLUG) + SetPageReserved(page); + + /* + * Mark the block movable so that blocks are reserved for + * movable at startup. This will force kernel allocations to + * reserve their blocks rather than leaking throughout the + * address space during boot when many long-lived kernel + * allocations are made. + * + * bitmap is created for zone's valid pfn range. but memmap can + * be created for invalid pages (for alignment) check here not + * to call set_pageblock_migratetype() against pfn out of zone. + * + * Please note that MEMMAP_HOTPLUG path doesn't clear memmap + * because this is done early in sparse_add_one_section + */ + if (!(pfn & (pageblock_nr_pages - 1))) { + set_pageblock_migratetype(page, MIGRATE_MOVABLE); + cond_resched(); + } + + if (is_zone_device_page(page)) { + struct vmem_altmap *altmap = &pgmap->altmap; + + if (WARN_ON_ONCE(!pgmap)) + return; + + /* skip invalid device pages */ + if (pgmap->altmap_valid && (pfn < (altmap->base_pfn + + vmem_altmap_offset(altmap)))) + return; + /* + * ZONE_DEVICE pages union ->lru with a ->pgmap back + * pointer. It is a bug if a ZONE_DEVICE page is ever + * freed or placed on a driver-private list. Seed the + * storage with poison. + */ + page->lru.prev = LIST_POISON2; + page->pgmap = pgmap; + percpu_ref_get(pgmap->ref); + } +} + +static void __ref memmap_init_async(void *data, async_cookie_t cookie) +{ + struct memmap_init_pages *args = data; + struct memmap_init_env *env = args->env; + struct resource *res = &args->res; + unsigned long pfn; + + for (pfn = PHYS_PFN(res->start); pfn < PHYS_PFN(res->end+1); pfn++) + memmap_init_one(pfn, env->zone, env->nid, env->context, + env->pgmap); +} + /* * Initially all pages are reserved - free ones are freed * up by free_all_bootmem() once the early boot process is @@ -5469,7 +5532,6 @@ void __meminit memmap_init_zone(unsigned long size, int nid, unsigned long zone, struct vmem_altmap *altmap = NULL; unsigned long pfn; unsigned long nr_initialised = 0; - struct page *page; #ifdef CONFIG_HAVE_MEMBLOCK_NODE_MAP struct memblock_region *r = NULL, *tmp; #endif @@ -5486,14 +5548,43 @@ void __meminit memmap_init_zone(unsigned long size, int nid, unsigned long zone, if (altmap && start_pfn == altmap->base_pfn) start_pfn += altmap->reserve; - for (pfn = start_pfn; pfn < end_pfn; pfn++) { + if (context != MEMMAP_EARLY) { /* * There can be holes in boot-time mem_map[]s handed to this * function. They do not exist on hotplugged memory. */ - if (context != MEMMAP_EARLY) - goto not_early; + ASYNC_DOMAIN_EXCLUSIVE(local); + struct memmap_init_pages args[NR_MEMMAP_THREADS]; + struct memmap_init_env env = { + .nid = nid, + .zone = zone, + .pgmap = pgmap, + .context = context, + }; + unsigned long step, rem; + int i; + + size = end_pfn - start_pfn; + step = size / NR_MEMMAP_THREADS; + rem = size % NR_MEMMAP_THREADS; + for (i = 0; i < NR_MEMMAP_THREADS; i++) { + struct memmap_init_pages *t = &args[i]; + + t->env = &env; + t->res.start = PFN_PHYS(start_pfn); + t->res.end = PFN_PHYS(start_pfn + step) - 1; + if (i == NR_MEMMAP_THREADS-1) + t->res.end += PFN_PHYS(rem); + + async_schedule_domain(memmap_init_async, t, &local); + + start_pfn += step; + } + async_synchronize_full_domain(&local); + return; + } + for (pfn = start_pfn; pfn < end_pfn; pfn++) { if (!early_pfn_valid(pfn)) continue; if (!early_pfn_in_nid(pfn, nid)) @@ -5522,51 +5613,7 @@ void __meminit memmap_init_zone(unsigned long size, int nid, unsigned long zone, } } #endif - -not_early: - page = pfn_to_page(pfn); - __init_single_page(page, pfn, zone, nid); - if (context == MEMMAP_HOTPLUG) - SetPageReserved(page); - - /* - * Mark the block movable so that blocks are reserved for - * movable at startup. This will force kernel allocations - * to reserve their blocks rather than leaking throughout - * the address space during boot when many long-lived - * kernel allocations are made. - * - * bitmap is created for zone's valid pfn range. but memmap - * can be created for invalid pages (for alignment) - * check here not to call set_pageblock_migratetype() against - * pfn out of zone. - * - * Please note that MEMMAP_HOTPLUG path doesn't clear memmap - * because this is done early in sparse_add_one_section - */ - if (!(pfn & (pageblock_nr_pages - 1))) { - set_pageblock_migratetype(page, MIGRATE_MOVABLE); - cond_resched(); - } - - if (is_zone_device_page(page)) { - if (WARN_ON_ONCE(!pgmap)) - continue; - - /* skip invalid device pages */ - if (altmap && (pfn < (altmap->base_pfn - + vmem_altmap_offset(altmap)))) - continue; - /* - * ZONE_DEVICE pages union ->lru with a ->pgmap back - * pointer. It is a bug if a ZONE_DEVICE page is ever - * freed or placed on a driver-private list. Seed the - * storage with poison. - */ - page->lru.prev = LIST_POISON2; - page->pgmap = pgmap; - percpu_ref_get(pgmap->ref); - } + memmap_init_one(pfn, zone, nid, context, NULL); } }