Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp862218pxb; Thu, 28 Jan 2021 02:02:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJw4f4yzzM8NDSUiz4caBvHglUf/jzWnPWRoTQl0Emz8s776A5rdpaCvncvMz372799DAQuC X-Received: by 2002:a17:906:e085:: with SMTP id gh5mr10379682ejb.418.1611828132616; Thu, 28 Jan 2021 02:02:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611828132; cv=none; d=google.com; s=arc-20160816; b=S6vbFbZ9EI6GLh32p9swpxLYbCk6Gz6fyaofDeymCxOc4v8RYVswY8FBS8Me7ajYBP PGFqeHNgKvx5ftwmVs1+UrrRoIKGanov/A5LDnhUiLoLFp/RmGwGK576ev/A502cpnJS R65tsu2rK+zmWdsfwiRfMIjvmDYq19OfD0fOSDK5S55b4JnapesugYq1o1dfqwxY0BYY kEwIYLlEXtoCifJJdeKFpnpQCXZRe2xWB9CD3GPF6T+AJaxQWRhPISkVD7VumjaeWkMK URq8loMo5CONTYERCgWGjpmSbhznegvKufmfXnCPcohxy4XzcsIcxZ2JwiSmWroHNIys XtQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=FbDGxF/vdXrfP5R9acP4te8iUqQ7u/57GdS2PFFEJKU=; b=uV/E7P4F3K3UltQ/TuNZsrBCeoe9SfcFikdtuCMFL9fE+fs3TP0QGtB0FIcAFzQxrN 9or3PBU+t6HurUskBSCx7/pROV/J/1B82TQWXMyg19W2KXFhDUJzDr3ZM4r+MMiKaTte /UDDKIerPT9tIU4kqhUuApI33Dqn48xsBWFk61mmCIR3+ZpEmbA3kZ27yyVzUR5SE9gZ noT65cPmlUyBRkORIgSqHJQkDvUu5Z2xoowxDkunVL6Fx2uz9rbFMd8NzRUq1P49GweN qnEE5Y4wNEkvLjj8VsmyycdgwXgjuf6WU1gJZHUGbvRvxKasjchQJ3OAlELRwskkv8Cx Q+3g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x9si825851eje.569.2021.01.28.02.01.47; Thu, 28 Jan 2021 02:02:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231949AbhA1KAB (ORCPT + 99 others); Thu, 28 Jan 2021 05:00:01 -0500 Received: from mx2.suse.de ([195.135.220.15]:60244 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231779AbhA1J74 (ORCPT ); Thu, 28 Jan 2021 04:59:56 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 58EA1AC97; Thu, 28 Jan 2021 09:59:14 +0000 (UTC) Date: Thu, 28 Jan 2021 10:59:06 +0100 From: Oscar Salvador To: David Hildenbrand Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, Andrew Morton , Thomas Gleixner , "Peter Zijlstra (Intel)" , Mike Rapoport , Michal Hocko , Wei Yang Subject: Re: [PATCH v1 1/2] mm/cma: expose all pages to the buddy if activation of an area fails Message-ID: <20210128095906.GA5250@localhost.localdomain> References: <20210127101813.6370-1-david@redhat.com> <20210127101813.6370-2-david@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210127101813.6370-2-david@redhat.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 27, 2021 at 11:18:12AM +0100, David Hildenbrand wrote: > Right now, if activation fails, we might already have exposed some pages to > the buddy for CMA use (although they will never get actually used by CMA), > and some pages won't be exposed to the buddy at all. > > Let's check for "single zone" early and on error, don't expose any pages > for CMA use - instead, expose them to the buddy available for any use. > Simply call free_reserved_page() on every single page - easier than > going via free_reserved_area(), converting back and forth between pfns > and virt addresses. > > In addition, make sure to fixup totalcma_pages properly. > > Example: 6 GiB QEMU VM with "... hugetlb_cma=2G movablecore=20% ...": > [ 0.006891] hugetlb_cma: reserve 2048 MiB, up to 2048 MiB per node > [ 0.006893] cma: Reserved 2048 MiB at 0x0000000100000000 > [ 0.006893] hugetlb_cma: reserved 2048 MiB on node 0 > ... > [ 0.175433] cma: CMA area hugetlb0 could not be activated > > Before this patch: > # cat /proc/meminfo > MemTotal: 5867348 kB > MemFree: 5692808 kB > MemAvailable: 5542516 kB > ... > CmaTotal: 2097152 kB > CmaFree: 1884160 kB > > After this patch: > # cat /proc/meminfo > MemTotal: 6077308 kB > MemFree: 5904208 kB > MemAvailable: 5747968 kB > ... > CmaTotal: 0 kB > CmaFree: 0 kB > > Note: cma_init_reserved_mem() makes sure that we always cover full > pageblocks / MAX_ORDER - 1 pages. > > Cc: Andrew Morton > Cc: Thomas Gleixner > Cc: "Peter Zijlstra (Intel)" > Cc: Mike Rapoport > Cc: Oscar Salvador > Cc: Michal Hocko > Cc: Wei Yang > Signed-off-by: David Hildenbrand Besides benefit of the error handling, I find this code much more cleaer: Reviewed-by: Oscar Salvador -- Oscar Salvador SUSE L3