Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp9247950imu; Wed, 5 Dec 2018 01:21:23 -0800 (PST) X-Google-Smtp-Source: AFSGD/Xvsd/1d8OFPPLSJD1syi7uDnIdiL8VAoG7p9Fo3DAlfgIQIECYQ0nlra0hS2W6Oc3auiHq X-Received: by 2002:a62:5c41:: with SMTP id q62mr24084931pfb.171.1544001683813; Wed, 05 Dec 2018 01:21:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544001683; cv=none; d=google.com; s=arc-20160816; b=wxh8qboc07He9sPJNJLSHMjua7lMQIuuOMoq24vgDROSCi55Xc8EiV2sgOIPHS7Rrr gdKV/nJoCAp3R1LJCZo8b8NB2qtsnyRwe3AT+qUg3Ni6pwTFz+72TUDWBmq0pwrq80v8 TjE0ZiPDlMx2ciXMQaiPePXWAw63AN3oGN1FHD81BI9C2eCYSWGOb8MK4eBFtcQtx4iV FOEy71p3bPFdQp9aVfvKuzVOJhTwZLU3PKYxSMXvOQ1IvSD0hje6K7iZsNCI/cCjfiw6 fLbkZegGKUtVqShqJ0eMMiKBUvXZyjogmktVC0x9d8nt+2PNF+beT0AOehPVw9B1UQaO ryng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=k4x4HIua/ebWA4ICeAcRKBy/h5TWt5GAp0PQqy5ul3Y=; b=pYfCJ01SXkjyc0NaKFVq9XMu0dMYOhMLM/hbHFdpd7GRSD/R81FtjDe8nIYU2vGzi+ xCuoiDuGPWnBoId3VUbhzfesPdnGJ1TfduyEC7NEA7g0gNrpTZiC56lt45fHyXbKwk/n J2r6VsrWOlVup8eukMtkOa/h43ex4muyObbw6407ciRbRCMQ+dV/av2NQZvyAJ+0Ynem lGGB+L9sK/Z/nQQRuh4KFizNlsXqtqMBwTvyx/8xhJLhnz3kJX37r9tgEZVkvmlWyLHg TtYOItYFHmPEvWclbuw7DQOGQBHWaqweCDTxbAz80PW3KC02pqeh4JMhcgYNSiS2xUyd DamA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=M+MN+WYP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e89si21274608plb.401.2018.12.05.01.21.09; Wed, 05 Dec 2018 01:21:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=M+MN+WYP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727387AbeLEJSu (ORCPT + 99 others); Wed, 5 Dec 2018 04:18:50 -0500 Received: from mail-ed1-f67.google.com ([209.85.208.67]:41435 "EHLO mail-ed1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726171AbeLEJSt (ORCPT ); Wed, 5 Dec 2018 04:18:49 -0500 Received: by mail-ed1-f67.google.com with SMTP id z28so16358776edi.8 for ; Wed, 05 Dec 2018 01:18:48 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:reply-to:references:mime-version :content-disposition:in-reply-to:user-agent; bh=k4x4HIua/ebWA4ICeAcRKBy/h5TWt5GAp0PQqy5ul3Y=; b=M+MN+WYPfm4NNV7wX75sanY6/CZSWnWn8H81lBGRO5Bo7XhoaVGvXqaFkNmZStyyNG n9r7FfxZ8QJHvyJhIv0AZbF8hcofPrKxOK12Pov2Zr7ZXM2Zj5wc0Ewdh5v7e+oh1irY tIzD9masPGRs0AeZt5H4pPC201rZttbIFVlz9mqmVzSj/DfDryV1Yu7VrPQigK6g9zQi 02F1uKFtNsO810mU+AqnuB8oZKTmqRyFFBg8lX2pufsq52v6rho1E8diZPqX8m2FnOfh 4fBGdDLWaeHt5sPOg7ZksSmsNiSA0fLU9oPxYDdsih8f/4Q2khYXjeGSEdRWFyfnrBih kXlg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:reply-to :references:mime-version:content-disposition:in-reply-to:user-agent; bh=k4x4HIua/ebWA4ICeAcRKBy/h5TWt5GAp0PQqy5ul3Y=; b=ZweOU3BTRVNfLKE1q/gRhR0OS27LkS65uL0iCU43XOIpkVVbEFmGJpTslYzCE23JuT +xAo9astDGyzP/LdRXOY7xXWgLqXkWMpZJkRfD20yQ5X+tjkSXd1yoLaA5ba+4uZ2saI t02dkWQxtPHJTg8CRvfZyf5IqkC9xOBxrX7QxvkyBMb34+feEub5/ZsFbz7BTeMY8BYT rJMgjzlpdsiUKc+DkWZnfHNN0iG9jKp4eN5+xplUpeKudQM3GhR1gKpBy6CeuzDiNb7O Cyw5lPrSb/NG+W3R5rpRXSht4Tm/YgDSgMQ1bmwaVsppBCUQhNdmXDq74kH4Lqip7OTX IPWg== X-Gm-Message-State: AA+aEWZd0Ax5y3L+RzPVpOGHa/5/y6tIKahvFR2WnljDruWsxZ7Rftf1 EDCUEExP8r62LPo5pRN+Yhw= X-Received: by 2002:a17:906:81cc:: with SMTP id e12-v6mr18708661ejx.138.1544001527273; Wed, 05 Dec 2018 01:18:47 -0800 (PST) Received: from localhost ([185.92.221.13]) by smtp.gmail.com with ESMTPSA id v20sm5349833edm.29.2018.12.05.01.18.46 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 05 Dec 2018 01:18:46 -0800 (PST) Date: Wed, 5 Dec 2018 09:18:45 +0000 From: Wei Yang To: Nicolas Boichat Cc: richard.weiyang@gmail.com, Will Deacon , Michal Hocko , Levin Alexander , linux-mm@kvack.org, Christoph Lameter , Huaisheng Ye , Matthew Wilcox , linux-arm Mailing List , David Rientjes , yingjoe.chen@mediatek.com, Vlastimil Babka , Tomasz Figa , Mike Rapoport , Matthias Brugger , Joonsoo Kim , Robin Murphy , lkml , Pekka Enberg , iommu@lists.linux-foundation.org, Andrew Morton , Mel Gorman Subject: Re: [PATCH v4 2/3] mm: Add support for kmem caches in DMA32 zone Message-ID: <20181205091845.kfro65nu7v4g6esa@master> Reply-To: Wei Yang References: <20181205054828.183476-1-drinkcat@chromium.org> <20181205054828.183476-3-drinkcat@chromium.org> <20181205072528.l7blg6y24ggblh4m@master> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Dec 05, 2018 at 03:39:51PM +0800, Nicolas Boichat wrote: >On Wed, Dec 5, 2018 at 3:25 PM Wei Yang wrote: >> >> On Wed, Dec 05, 2018 at 01:48:27PM +0800, Nicolas Boichat wrote: >> >In some cases (e.g. IOMMU ARMv7s page allocator), we need to allocate >> >data structures smaller than a page with GFP_DMA32 flag. >> > >> >This change makes it possible to create a custom cache in DMA32 zone >> >using kmem_cache_create, then allocate memory using kmem_cache_alloc. >> > >> >We do not create a DMA32 kmalloc cache array, as there are currently >> >no users of kmalloc(..., GFP_DMA32). The new test in check_slab_flags >> >ensures that such calls still fail (as they do before this change). >> > >> >Fixes: ad67f5a6545f ("arm64: replace ZONE_DMA with ZONE_DMA32") >> >Signed-off-by: Nicolas Boichat >> >--- >> > >> >Changes since v2: >> > - Clarified commit message >> > - Add entry in sysfs-kernel-slab to document the new sysfs file >> > >> >(v3 used the page_frag approach) >> > >> >Documentation/ABI/testing/sysfs-kernel-slab | 9 +++++++++ >> > include/linux/slab.h | 2 ++ >> > mm/internal.h | 8 ++++++-- >> > mm/slab.c | 4 +++- >> > mm/slab.h | 3 ++- >> > mm/slab_common.c | 2 +- >> > mm/slub.c | 18 +++++++++++++++++- >> > 7 files changed, 40 insertions(+), 6 deletions(-) >> > >> >diff --git a/Documentation/ABI/testing/sysfs-kernel-slab b/Documentation/ABI/testing/sysfs-kernel-slab >> >index 29601d93a1c2ea..d742c6cfdffbe9 100644 >> >--- a/Documentation/ABI/testing/sysfs-kernel-slab >> >+++ b/Documentation/ABI/testing/sysfs-kernel-slab >> >@@ -106,6 +106,15 @@ Description: >> > are from ZONE_DMA. >> > Available when CONFIG_ZONE_DMA is enabled. >> > >> >+What: /sys/kernel/slab/cache/cache_dma32 >> >+Date: December 2018 >> >+KernelVersion: 4.21 >> >+Contact: Nicolas Boichat >> >+Description: >> >+ The cache_dma32 file is read-only and specifies whether objects >> >+ are from ZONE_DMA32. >> >+ Available when CONFIG_ZONE_DMA32 is enabled. >> >+ >> > What: /sys/kernel/slab/cache/cpu_slabs >> > Date: May 2007 >> > KernelVersion: 2.6.22 >> >diff --git a/include/linux/slab.h b/include/linux/slab.h >> >index 11b45f7ae4057c..9449b19c5f107a 100644 >> >--- a/include/linux/slab.h >> >+++ b/include/linux/slab.h >> >@@ -32,6 +32,8 @@ >> > #define SLAB_HWCACHE_ALIGN ((slab_flags_t __force)0x00002000U) >> > /* Use GFP_DMA memory */ >> > #define SLAB_CACHE_DMA ((slab_flags_t __force)0x00004000U) >> >+/* Use GFP_DMA32 memory */ >> >+#define SLAB_CACHE_DMA32 ((slab_flags_t __force)0x00008000U) >> > /* DEBUG: Store the last owner for bug hunting */ >> > #define SLAB_STORE_USER ((slab_flags_t __force)0x00010000U) >> > /* Panic if kmem_cache_create() fails */ >> >diff --git a/mm/internal.h b/mm/internal.h >> >index a2ee82a0cd44ae..fd244ad716eaf8 100644 >> >--- a/mm/internal.h >> >+++ b/mm/internal.h >> >@@ -14,6 +14,7 @@ >> > #include >> > #include >> > #include >> >+#include >> > #include >> > >> > /* >> >@@ -34,9 +35,12 @@ >> > #define GFP_CONSTRAINT_MASK (__GFP_HARDWALL|__GFP_THISNODE) >> > >> > /* Check for flags that must not be used with a slab allocator */ >> >-static inline gfp_t check_slab_flags(gfp_t flags) >> >+static inline gfp_t check_slab_flags(gfp_t flags, slab_flags_t slab_flags) >> > { >> >- gfp_t bug_mask = __GFP_DMA32 | __GFP_HIGHMEM | ~__GFP_BITS_MASK; >> >+ gfp_t bug_mask = __GFP_HIGHMEM | ~__GFP_BITS_MASK; >> >+ >> >+ if (!IS_ENABLED(CONFIG_ZONE_DMA32) || !(slab_flags & SLAB_CACHE_DMA32)) >> >+ bug_mask |= __GFP_DMA32; >> >> The original version doesn't check CONFIG_ZONE_DMA32. >> >> Do we need to add this condition here? >> Could we just decide the bug_mask based on slab_flags? > >We can. The reason I did it this way is that when we don't have >CONFIG_ZONE_DMA32, the compiler should be able to simplify to: > >bug_mask = __GFP_HIGHMEM | ~__GFP_BITS_MASK; >if (true || ..) => if (true) > bug_mask |= __GFP_DMA32; > >Then just >bug_mask = __GFP_HIGHMEM | ~__GFP_BITS_MASK | __GFP_DMA32; > >And since the function is inline, slab_flags would not even need to be >accessed at all. > Thanks for explanation. This make sense to me. -- Wei Yang Help you, Help me