From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 00B53C433DF for ; Wed, 27 May 2020 04:52:29 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id B8259208B8 for ; Wed, 27 May 2020 04:52:28 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="IrjBrjdD" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org B8259208B8 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 27943800B6; Wed, 27 May 2020 00:52:28 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 2291880010; Wed, 27 May 2020 00:52:28 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 11800800B6; Wed, 27 May 2020 00:52:28 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0135.hostedemail.com [216.40.44.135]) by kanga.kvack.org (Postfix) with ESMTP id 0321180010 for ; Wed, 27 May 2020 00:52:28 -0400 (EDT) Received: from smtpin19.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id BB125283D for ; Wed, 27 May 2020 04:52:27 +0000 (UTC) X-FDA: 76861277934.19.camp55_5f0ac3326d4f Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin19.hostedemail.com (Postfix) with ESMTP id 9FD4D1AD1B7 for ; Wed, 27 May 2020 04:52:27 +0000 (UTC) X-HE-Tag: camp55_5f0ac3326d4f X-Filterd-Recvd-Size: 3878 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf42.hostedemail.com (Postfix) with ESMTP for ; Wed, 27 May 2020 04:52:26 +0000 (UTC) Received: from kernel.org (unknown [87.70.212.59]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3783A2078C; Wed, 27 May 2020 04:52:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590555146; bh=g9E/3oh8BLmGA2vnSGwK3RlCX7bKSJ1TEs8S9N8IiPQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=IrjBrjdDUZNJQSzIIYIANzlV2wU2224Px8XobZtZWK7nzfw5rmSjOK75Hp0cov2Xv 891nlgAP9Hr7ZijdAqskear/wAwO/8WBhCvfyRSOKLevoXTZ92zrHwsHaOevxHFimY ZTtGUOIgZeDsk5wW/cW9smubJ2jdMZYOhRv495ZE= Date: Wed, 27 May 2020 07:52:19 +0300 From: Mike Rapoport To: Andrew Morton , "David S. Miller" Cc: Guenter Roeck , sparclinux@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, Mike Rapoport Subject: Re: [PATCH] sparc32: register memory occupied by kernel as memblock.memory Message-ID: <20200527045219.GG48741@kernel.org> References: <20200524165358.27188-1-rppt@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200524165358.27188-1-rppt@kernel.org> X-Rspamd-Queue-Id: 9FD4D1AD1B7 X-Spamd-Result: default: False [0.00 / 100.00] X-Rspamd-Server: rspam01 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Andrew, David, Any comments on this? On Sun, May 24, 2020 at 07:53:58PM +0300, Mike Rapoport wrote: > From: Mike Rapoport > > sparc32 never registered the memory occupied by the kernel image with > memblock_add() and it only reserved this memory with meblock_reserve(). > > With openbios as system firmware, the memory occupied by the kernel is > reserved in openbios and removed from mem.available. The prom setup code in > the kernel uses mem.available to set up the memory banks and essentially > there is a hole for the memory occupied by the kernel image. > > Later in bootmem_init() this memory is memblock_reserve()d. > > Up until recently, memmap initialization would call __init_single_page() > for the pages in that hole, the free_low_memory_core_early() would mark > them as reserved and everything would be Ok. > > After the change in memmap initialization introduced by the commit "mm: > memmap_init: iterate over memblock regions rather that check each PFN", the > hole is skipped and the page structs for it are not initialized. And when > they are passed from memblock to page allocator as reserved, the latter > gets confused. > > Simply registering the memory occupied by the kernel with memblock_add() > resolves this issue. > > Tested on qemu-system-sparc with Debian Etch [1] userspace. > > [1] https://people.debian.org/~aurel32/qemu/sparc/debian_etch_sparc_small.qcow2 > > Signed-off-by: Mike Rapoport > Link: https://lkml.kernel.org/r/20200517000050.GA87467@roeck-us.nlllllet/ > --- > > David, > > I'd really appreciate your Ack or an explanation where my analysis is wrong :) > > arch/sparc/mm/init_32.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/arch/sparc/mm/init_32.c b/arch/sparc/mm/init_32.c > index e45160839f79..eb2946b1df8a 100644 > --- a/arch/sparc/mm/init_32.c > +++ b/arch/sparc/mm/init_32.c > @@ -192,6 +192,7 @@ unsigned long __init bootmem_init(unsigned long *pages_avail) > /* Reserve the kernel text/data/bss. */ > size = (start_pfn << PAGE_SHIFT) - phys_base; > memblock_reserve(phys_base, size); > + memblock_add(phys_base, size); > > size = memblock_phys_mem_size() - memblock_reserved_size(); > *pages_avail = (size >> PAGE_SHIFT) - high_pages; > -- > 2.26.2 > -- Sincerely yours, Mike.