Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1129121imu; Wed, 9 Jan 2019 12:10:33 -0800 (PST) X-Google-Smtp-Source: ALg8bN4oF2Zp1cCrHKvCVFW9qlzZd0W0bOr81q69bt8pHZUvHwOGNEzYD3TOc2BIjhzCWFDRTabr X-Received: by 2002:a62:2c81:: with SMTP id s123mr7272670pfs.174.1547064633277; Wed, 09 Jan 2019 12:10:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547064633; cv=none; d=google.com; s=arc-20160816; b=LGnQ+wIf6KFlIUZqCbyfRZrg/DZ6+b11FeXKnzDx2r7wATUdkr0jUEqQi1edyr/19E SwmUyyAZreVFgSINPErCfMvMX6AkheTOxHg8gT25K6Y0cEbXTurI1kQlDBVDu5jwoGTX ITm+/QCCJWVIDWvr9ucfrnp6ZNpMeWSTRIo7y/rO5XKa+MMe8E3F0OJmUF1vEU6Vpm2E hi1hkRlLGSaxnzE6OM6yJmoS+MtP+WpUBst6+Kq1SiIAlsX/GOvgwkTC79Syr9CDYdjq mTjlufq81C89xZAiaJ3N+spLLYhk+m0+6lciNOJ7ZRqmlTH1GT6V63YzwtMAqbQB7OIK xVXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:from; bh=aDvrgZgqyB2GQtMjh4VtH5ecdHk0OysmftWgol7M3xg=; b=rUTlgN6pNTMSw+QarmMU+gft+eb4/Fx4OGZXjr39iwsCX7HJO4YlM6bEI0HRKXOKEH bfbTTvPkXeVUZy1PT1VuaPo9x3cLjQBc8idntHWDxQ1vsu6XF09vVRe9fmgz49M+eWuu 5mQ2dq9VJcBQSn0nnFbOnLmW6nD63GDcvTutVthNkR3nqDctESlzKF2XXtgM0Mw+Ltp1 e9KSY/IF/KE7R5zspEy3NmxX2WbR2PfeLghJ5ujLpl0qeothOEl4rsGUEFOyQmVlVEN2 HVjEC1LxpGCPGUP5fOP+nbMy7sRuxpkr2YUuXA6X+XFPgVVOIJntYItNztDDA1XRB6D8 arOg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w5si70067257pfl.279.2019.01.09.12.10.17; Wed, 09 Jan 2019 12:10:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726583AbfAIQkj (ORCPT + 99 others); Wed, 9 Jan 2019 11:40:39 -0500 Received: from mx2.suse.de ([195.135.220.15]:57516 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726551AbfAIQki (ORCPT ); Wed, 9 Jan 2019 11:40:38 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 500A7AF74; Wed, 9 Jan 2019 16:40:37 +0000 (UTC) From: Roman Penyaev Cc: Roman Penyaev , Andrew Morton , Michal Hocko , Andrey Ryabinin , Joe Perches , "Luis R. Rodriguez" , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH 02/15] mm/vmalloc: move common logic from __vmalloc_area_node to a separate func Date: Wed, 9 Jan 2019 17:40:12 +0100 Message-Id: <20190109164025.24554-3-rpenyaev@suse.de> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20190109164025.24554-1-rpenyaev@suse.de> References: <20190109164025.24554-1-rpenyaev@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit To: unlisted-recipients:; (no To-header on input) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This one moves logic related to pages array creation to a separate function, which will be used by vrealloc() call as well, which implementation will follow. Signed-off-by: Roman Penyaev Cc: Andrew Morton Cc: Michal Hocko Cc: Andrey Ryabinin Cc: Joe Perches Cc: "Luis R. Rodriguez" Cc: linux-mm@kvack.org Cc: linux-kernel@vger.kernel.org --- mm/vmalloc.c | 36 +++++++++++++++++++++++++++++------- 1 file changed, 29 insertions(+), 7 deletions(-) diff --git a/mm/vmalloc.c b/mm/vmalloc.c index 4851b4a67f55..ad6cd807f6db 100644 --- a/mm/vmalloc.c +++ b/mm/vmalloc.c @@ -1662,21 +1662,26 @@ EXPORT_SYMBOL(vmap); static void *__vmalloc_node(unsigned long size, unsigned long align, gfp_t gfp_mask, pgprot_t prot, int node, const void *caller); -static void *__vmalloc_area_node(struct vm_struct *area, gfp_t gfp_mask, - pgprot_t prot, int node) + +static int alloc_vm_area_array(struct vm_struct *area, gfp_t gfp_mask, int node) { + unsigned int nr_pages, array_size; struct page **pages; - unsigned int nr_pages, array_size, i; + const gfp_t nested_gfp = (gfp_mask & GFP_RECLAIM_MASK) | __GFP_ZERO; - const gfp_t alloc_mask = gfp_mask | __GFP_NOWARN; const gfp_t highmem_mask = (gfp_mask & (GFP_DMA | GFP_DMA32)) ? 0 : __GFP_HIGHMEM; + if (WARN_ON(area->pages)) + return -EINVAL; + nr_pages = get_vm_area_size(area) >> PAGE_SHIFT; + if (!nr_pages) + return -EINVAL; + array_size = (nr_pages * sizeof(struct page *)); - area->nr_pages = nr_pages; /* Please note that the recursion is strictly bounded. */ if (array_size > PAGE_SIZE) { pages = __vmalloc_node(array_size, 1, nested_gfp|highmem_mask, @@ -1684,8 +1689,25 @@ static void *__vmalloc_area_node(struct vm_struct *area, gfp_t gfp_mask, } else { pages = kmalloc_node(array_size, nested_gfp, node); } + if (!pages) + return -ENOMEM; + + area->nr_pages = nr_pages; area->pages = pages; - if (!area->pages) { + + return 0; +} + +static void *__vmalloc_area_node(struct vm_struct *area, gfp_t gfp_mask, + pgprot_t prot, int node) +{ + const gfp_t alloc_mask = gfp_mask | __GFP_NOWARN; + const gfp_t highmem_mask = (gfp_mask & (GFP_DMA | GFP_DMA32)) ? + 0 : + __GFP_HIGHMEM; + unsigned int i; + + if (alloc_vm_area_array(area, gfp_mask, node)) { remove_vm_area(area->addr); kfree(area); return NULL; @@ -1709,7 +1731,7 @@ static void *__vmalloc_area_node(struct vm_struct *area, gfp_t gfp_mask, cond_resched(); } - if (map_vm_area(area, prot, pages)) + if (map_vm_area(area, prot, area->pages)) goto fail; return area->addr; -- 2.19.1