Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp4361424ybl; Tue, 20 Aug 2019 10:43:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqx8TrKrpy+5G3H/AiK1f0Ux1jtPMtG3mrNPrno508QSjscWDaa6VtgODlglGl6YhBB2Rm+G X-Received: by 2002:a63:c118:: with SMTP id w24mr26086331pgf.347.1566322989739; Tue, 20 Aug 2019 10:43:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566322989; cv=none; d=google.com; s=arc-20160816; b=YLuumgEcMhIz8rN++brnb3RjRc5ZBzj8zMc54C+UrU0iEwinU2+/1sR1lbkyNPCT4N UnKckVZnVwc0wR3AcJtK23v5vb/hEK9RlbT6J9pydHGlcSh2c4KIhYTGo6GOgsDWdz7w q/ELh+Ppi6SUfdJ34S59YFpKuH14BDhtdIu08Mj8bEGdZY1SVySo8USxd/HuVRka/+DB kyZcg3yKOlTSGogd0ebegRGnTLKrYHrqXIKDA58HoDJphfR1I0qvSrcBralmIUkf01h+ 22HcVsT5cgow3zOW9iN5H57jlFzGrusClzGaE1d0jPP4pFAmWNgQnFX2NFX9+enFecCq wnqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=Q6WX7RD7JkFPMZ096ddZwwMCJQ2QX/pXKZjnOUBiEpg=; b=VHtp7zKNZesgmRtrXIioKZ6tt+CY28piRj5mwGd5eYmzhRZ9yc4m4+/9HmMroCPlal 12m894AHkkwjvj4DUdLP812ROrEpzGHztRizFcFXT+6LbiSriIidETx9kPCJRmDReIMK uH41sPV2ZimLqD5t+zDAvH5gSnt/Q+iLgYWXTx5aO9PFxmNnPWFPHMDvzIK6LYpsI07h Ed62R63VdCqNRc+nude2r5JZA6I+A45grW3cmwM6PGcT0wuJcedNV9Wt8av/IYvjL1jT erMaU1YPdXn89BSHt3ug5OsE1EJhjjO3UZIFHrBgxiM52m9oqmtToxCYIL6HH8ecvJVN Zn3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IAvojfdq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t16si13918608pfq.88.2019.08.20.10.42.54; Tue, 20 Aug 2019 10:43:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IAvojfdq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730753AbfHTRlo (ORCPT + 99 others); Tue, 20 Aug 2019 13:41:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:58162 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730728AbfHTRlX (ORCPT ); Tue, 20 Aug 2019 13:41:23 -0400 Received: from localhost (unknown [104.132.0.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3E8F722DBF; Tue, 20 Aug 2019 17:41:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1566322882; bh=FWVnJU/734BjtZUeoOiF/IC901HwXFICLvTYoWO93WI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=IAvojfdq/UJu9x+Exg4sCzdRb/jZtg0ZqF3jcxVtXiDp4ovHPGZC5MXfRM1naC/6V btJmrXmNCLK3D9YH8DIwP3Ef7iwZ0LFGWfYwtfRr65cHLXB6PTm3vx+C/eiWs6cMXc pbwaCeOo9VDp7H5doRdSvZL1riZc2Sha9YDDogDA= Date: Tue, 20 Aug 2019 10:41:21 -0700 From: Jaegeuk Kim To: Chao Yu Cc: linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org, chao@kernel.org, Chen Gong Subject: Re: [PATCH v2] f2fs: allocate memory in batch in build_sit_info() Message-ID: <20190820174121.GB58214@jaegeuk-macbookpro.roam.corp.google.com> References: <20190726074120.3278-1-yuchao0@huawei.com> <20190819202007.GA23891@jaegeuk-macbookpro.roam.corp.google.com> <99a2713a-50d2-8a77-87d9-661ab7ed3a0c@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <99a2713a-50d2-8a77-87d9-661ab7ed3a0c@huawei.com> User-Agent: Mutt/1.8.2 (2017-04-18) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 08/20, Chao Yu wrote: > On 2019/8/20 4:20, Jaegeuk Kim wrote: > > On 07/26, Chao Yu wrote: > >> build_sit_info() allocate all bitmaps for each segment one by one, > >> it's quite low efficiency, this pach changes to allocate large > >> continuous memory at a time, and divide it and assign for each bitmaps > >> of segment. For large size image, it can expect improving its mount > >> speed. > > > > Hmm, I hit a kernel panic when mounting a partition during fault injection test: > > > > 726 #ifdef CONFIG_F2FS_CHECK_FS > > 727 if (f2fs_test_bit(offset, sit_i->sit_bitmap) != > > 728 f2fs_test_bit(offset, sit_i->sit_bitmap_mir)) > > 729 f2fs_bug_on(sbi, 1); > > 730 #endif > > We didn't change anything about sit_i->sit_bitmap{_mir,}, it's so wired we panic > here... :( > > I double check the change, but find nothing suspicious, btw, my fault injection > testcase shows normal. > > Jaegeuk, do you have any idea about this issue? I'm bisecting. :P > > Thanks, > > > > > For your information, I'm testing without this patch. > > > > Thanks, > > > >> > >> Signed-off-by: Chen Gong > >> Signed-off-by: Chao Yu > >> --- > >> v2: > >> - fix warning triggered in kmalloc() if requested memory size exceeds 4MB. > >> fs/f2fs/segment.c | 51 +++++++++++++++++++++-------------------------- > >> fs/f2fs/segment.h | 1 + > >> 2 files changed, 24 insertions(+), 28 deletions(-) > >> > >> diff --git a/fs/f2fs/segment.c b/fs/f2fs/segment.c > >> index a661ac32e829..d720eacd9c57 100644 > >> --- a/fs/f2fs/segment.c > >> +++ b/fs/f2fs/segment.c > >> @@ -3941,7 +3941,7 @@ static int build_sit_info(struct f2fs_sb_info *sbi) > >> struct f2fs_super_block *raw_super = F2FS_RAW_SUPER(sbi); > >> struct sit_info *sit_i; > >> unsigned int sit_segs, start; > >> - char *src_bitmap; > >> + char *src_bitmap, *bitmap; > >> unsigned int bitmap_size; > >> > >> /* allocate memory for SIT information */ > >> @@ -3964,27 +3964,31 @@ static int build_sit_info(struct f2fs_sb_info *sbi) > >> if (!sit_i->dirty_sentries_bitmap) > >> return -ENOMEM; > >> > >> +#ifdef CONFIG_F2FS_CHECK_FS > >> + bitmap_size = MAIN_SEGS(sbi) * SIT_VBLOCK_MAP_SIZE * 4; > >> +#else > >> + bitmap_size = MAIN_SEGS(sbi) * SIT_VBLOCK_MAP_SIZE * 3; > >> +#endif > >> + sit_i->bitmap = f2fs_kvzalloc(sbi, bitmap_size, GFP_KERNEL); > >> + if (!sit_i->bitmap) > >> + return -ENOMEM; > >> + > >> + bitmap = sit_i->bitmap; > >> + > >> for (start = 0; start < MAIN_SEGS(sbi); start++) { > >> - sit_i->sentries[start].cur_valid_map > >> - = f2fs_kzalloc(sbi, SIT_VBLOCK_MAP_SIZE, GFP_KERNEL); > >> - sit_i->sentries[start].ckpt_valid_map > >> - = f2fs_kzalloc(sbi, SIT_VBLOCK_MAP_SIZE, GFP_KERNEL); > >> - if (!sit_i->sentries[start].cur_valid_map || > >> - !sit_i->sentries[start].ckpt_valid_map) > >> - return -ENOMEM; > >> + sit_i->sentries[start].cur_valid_map = bitmap; > >> + bitmap += SIT_VBLOCK_MAP_SIZE; > >> + > >> + sit_i->sentries[start].ckpt_valid_map = bitmap; > >> + bitmap += SIT_VBLOCK_MAP_SIZE; > >> > >> #ifdef CONFIG_F2FS_CHECK_FS > >> - sit_i->sentries[start].cur_valid_map_mir > >> - = f2fs_kzalloc(sbi, SIT_VBLOCK_MAP_SIZE, GFP_KERNEL); > >> - if (!sit_i->sentries[start].cur_valid_map_mir) > >> - return -ENOMEM; > >> + sit_i->sentries[start].cur_valid_map_mir = bitmap; > >> + bitmap += SIT_VBLOCK_MAP_SIZE; > >> #endif > >> > >> - sit_i->sentries[start].discard_map > >> - = f2fs_kzalloc(sbi, SIT_VBLOCK_MAP_SIZE, > >> - GFP_KERNEL); > >> - if (!sit_i->sentries[start].discard_map) > >> - return -ENOMEM; > >> + sit_i->sentries[start].discard_map = bitmap; > >> + bitmap += SIT_VBLOCK_MAP_SIZE; > >> } > >> > >> sit_i->tmp_map = f2fs_kzalloc(sbi, SIT_VBLOCK_MAP_SIZE, GFP_KERNEL); > >> @@ -4492,21 +4496,12 @@ static void destroy_free_segmap(struct f2fs_sb_info *sbi) > >> static void destroy_sit_info(struct f2fs_sb_info *sbi) > >> { > >> struct sit_info *sit_i = SIT_I(sbi); > >> - unsigned int start; > >> > >> if (!sit_i) > >> return; > >> > >> - if (sit_i->sentries) { > >> - for (start = 0; start < MAIN_SEGS(sbi); start++) { > >> - kvfree(sit_i->sentries[start].cur_valid_map); > >> -#ifdef CONFIG_F2FS_CHECK_FS > >> - kvfree(sit_i->sentries[start].cur_valid_map_mir); > >> -#endif > >> - kvfree(sit_i->sentries[start].ckpt_valid_map); > >> - kvfree(sit_i->sentries[start].discard_map); > >> - } > >> - } > >> + if (sit_i->sentries) > >> + kvfree(sit_i->bitmap); > >> kvfree(sit_i->tmp_map); > >> > >> kvfree(sit_i->sentries); > >> diff --git a/fs/f2fs/segment.h b/fs/f2fs/segment.h > >> index b74602813a05..ec4d568fd58c 100644 > >> --- a/fs/f2fs/segment.h > >> +++ b/fs/f2fs/segment.h > >> @@ -226,6 +226,7 @@ struct sit_info { > >> block_t sit_base_addr; /* start block address of SIT area */ > >> block_t sit_blocks; /* # of blocks used by SIT area */ > >> block_t written_valid_blocks; /* # of valid blocks in main area */ > >> + char *bitmap; /* all bitmaps pointer */ > >> char *sit_bitmap; /* SIT bitmap pointer */ > >> #ifdef CONFIG_F2FS_CHECK_FS > >> char *sit_bitmap_mir; /* SIT bitmap mirror */ > >> -- > >> 2.18.0.rc1 > > . > >