From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.5 required=3.0 tests=INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 50E9AC47E49 for ; Tue, 5 Nov 2019 08:43:57 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 1922220717 for ; Tue, 5 Nov 2019 08:43:56 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 1922220717 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 88F9B6B0003; Tue, 5 Nov 2019 03:43:56 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 8403D6B0006; Tue, 5 Nov 2019 03:43:56 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 755556B0007; Tue, 5 Nov 2019 03:43:56 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0134.hostedemail.com [216.40.44.134]) by kanga.kvack.org (Postfix) with ESMTP id 5C3766B0003 for ; Tue, 5 Nov 2019 03:43:56 -0500 (EST) Received: from smtpin01.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay05.hostedemail.com (Postfix) with SMTP id 05C2E181AEF0B for ; Tue, 5 Nov 2019 08:43:56 +0000 (UTC) X-FDA: 76121586072.01.air65_3f661c5a06c20 X-HE-Tag: air65_3f661c5a06c20 X-Filterd-Recvd-Size: 3962 Received: from mx1.suse.de (mx2.suse.de [195.135.220.15]) by imf23.hostedemail.com (Postfix) with ESMTP for ; Tue, 5 Nov 2019 08:43:55 +0000 (UTC) X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 20CBDAC9A; Tue, 5 Nov 2019 08:43:54 +0000 (UTC) Date: Tue, 5 Nov 2019 09:43:52 +0100 From: Michal Hocko To: Vincent Whitchurch Cc: Pavel Tatashin , "akpm@linux-foundation.org" , "osalvador@suse.de" , "linux-mm@kvack.org" , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH] mm/sparse: Consistently do not zero memmap Message-ID: <20191105084352.GJ22672@dhcp22.suse.cz> References: <20191030131122.8256-1-vincent.whitchurch@axis.com> <20191030132958.GD31513@dhcp22.suse.cz> <20191030140216.i26n22asgafckfxy@axis.com> <20191030141259.GE31513@dhcp22.suse.cz> <20191030153150.GI31513@dhcp22.suse.cz> <20191030173123.GK31513@dhcp22.suse.cz> <20191031072555.GA13102@dhcp22.suse.cz> <20191104155126.y2fcjwrx5mhdoqi7@axis.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191104155126.y2fcjwrx5mhdoqi7@axis.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Mon 04-11-19 16:51:26, Vincent Whitchurch wrote: > On Thu, Oct 31, 2019 at 08:25:55AM +0100, Michal Hocko wrote: > > On Wed 30-10-19 18:31:23, Michal Hocko wrote: > > [...] > > > What about this? It still aligns to the size but that should be > > > correctly done to the section size level. > > > > > > diff --git a/mm/sparse.c b/mm/sparse.c > > > index 72f010d9bff5..ab1e6175ac9a 100644 > > > --- a/mm/sparse.c > > > +++ b/mm/sparse.c > > > @@ -456,8 +456,7 @@ struct page __init *__populate_section_memmap(unsigned long pfn, > > > if (map) > > > return map; > > > > > > - map = memblock_alloc_try_nid(size, > > > - PAGE_SIZE, addr, > > > + map = memblock_alloc_try_nid(size, size, addr, > > > MEMBLOCK_ALLOC_ACCESSIBLE, nid); > > > if (!map) > > > panic("%s: Failed to allocate %lu bytes align=0x%lx nid=%d from=%pa\n", > > > @@ -474,8 +473,13 @@ static void __init sparse_buffer_init(unsigned long size, int nid) > > > { > > > phys_addr_t addr = __pa(MAX_DMA_ADDRESS); > > > WARN_ON(sparsemap_buf); /* forgot to call sparse_buffer_fini()? */ > > > + /* > > > + * Pre-allocated buffer is mainly used by __populate_section_memmap > > > + * and we want it to be properly aligned to the section size - this is > > > + * especially the case for VMEMMAP which maps memmap to PMDs > > > + */ > > > sparsemap_buf = > > > - memblock_alloc_try_nid_raw(size, PAGE_SIZE, > > > + memblock_alloc_try_nid_raw(size, section_map_size(), > > > addr, > > > MEMBLOCK_ALLOC_ACCESSIBLE, nid); > > > sparsemap_buf_end = sparsemap_buf + size; > > > > Vincent, could you give this a try please? It would be even better if > > you could add some debugging to measure the overhead. Let me know if you > > need any help with a debugging patch. > > I've tested this patch and it works on my platform: The allocations > from sparse_buffer_alloc() now succeed and the fallback path is not > taken. Thanks a lot. I will try to prepare the full patch with a proper changelog sometimes this week. > I'm not sure what kind of overhead you're interested in. The memory overhead when the sparsemap_buf PAGE_SIZE alignment is in place. In other words (ptr - sparsemap_buf) in sparse_buffer_alloc. If the sparsemap_buf was properly aligned then the diff should be 0. -- Michal Hocko SUSE Labs