From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 473C8C12002 for ; Wed, 14 Jul 2021 22:32:12 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id DD7FB610A7 for ; Wed, 14 Jul 2021 22:32:11 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org DD7FB610A7 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linux-foundation.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 305C86B00DF; Wed, 14 Jul 2021 18:32:12 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 2B69C6B00E0; Wed, 14 Jul 2021 18:32:12 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 1583C8D0003; Wed, 14 Jul 2021 18:32:12 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0065.hostedemail.com [216.40.44.65]) by kanga.kvack.org (Postfix) with ESMTP id E76636B00DF for ; Wed, 14 Jul 2021 18:32:11 -0400 (EDT) Received: from smtpin39.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay05.hostedemail.com (Postfix) with ESMTP id B069C18488929 for ; Wed, 14 Jul 2021 22:32:10 +0000 (UTC) X-FDA: 78362642820.39.8217709 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf13.hostedemail.com (Postfix) with ESMTP id 4924210078E2 for ; Wed, 14 Jul 2021 22:32:10 +0000 (UTC) Received: by mail.kernel.org (Postfix) with ESMTPSA id 2A223613C9; Wed, 14 Jul 2021 22:32:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1626301929; bh=EHY882iGgDnDRGkqCFxlcI9IHP3HEwM+N+ik+0IVVjA=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=oDTjyZtKIPXeq1bX83YD6pIo2C+3MPcxM8jSvTVZyorJQS/g82Cw8MEH5KB/6U0+D rmax19QPt6/22JIXx3UGw6UBlCbFrxH9A5N+9ylZeHjwCqszBlEc8Wd9fJDD4nhCZx 8jmoIbjNW5iDwasSKYXK9FfNF25GDeBfpYBG8PmI= Date: Wed, 14 Jul 2021 15:32:08 -0700 From: Andrew Morton To: Mike Rapoport Cc: Michal Simek , Mike Rapoport , linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: Re: [PATCH 3/4] mm: introduce memmap_alloc() to unify memory map allocation Message-Id: <20210714153208.ef96cfc7c6bac360598101ed@linux-foundation.org> In-Reply-To: <20210714123739.16493-4-rppt@kernel.org> References: <20210714123739.16493-1-rppt@kernel.org> <20210714123739.16493-4-rppt@kernel.org> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Authentication-Results: imf13.hostedemail.com; dkim=pass header.d=linux-foundation.org header.s=korg header.b=oDTjyZtK; spf=pass (imf13.hostedemail.com: domain of akpm@linux-foundation.org designates 198.145.29.99 as permitted sender) smtp.mailfrom=akpm@linux-foundation.org; dmarc=none X-Rspamd-Server: rspam05 X-Stat-Signature: wf8yzscahqj3pkxjysmj5za6zb5b3s9e X-Rspamd-Queue-Id: 4924210078E2 X-HE-Tag: 1626301930-112415 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Wed, 14 Jul 2021 15:37:38 +0300 Mike Rapoport wrote: > From: Mike Rapoport > > There are several places that allocate memory for the memory map: > alloc_node_mem_map() for FLATMEM, sparse_buffer_init() and > __populate_section_memmap() for SPARSEMEM. > > The memory allocated in the FLATMEM case is zeroed and it is never > poisoned, regardless of CONFIG_PAGE_POISON setting. > > The memory allocated in the SPARSEMEM cases is not zeroed and it is > implicitly poisoned inside memblock if CONFIG_PAGE_POISON is set. > > Introduce memmap_alloc() wrapper for memblock allocators that will be used > for both FLATMEM and SPARSEMEM cases and will makei memory map zeroing and > poisoning consistent for different memory models. > > ... > > --- a/mm/page_alloc.c > +++ b/mm/page_alloc.c > @@ -6730,6 +6730,26 @@ static void __init memmap_init(void) > init_unavailable_range(hole_pfn, end_pfn, zone_id, nid); > } > > +void __init *memmap_alloc(phys_addr_t size, phys_addr_t align, > + phys_addr_t min_addr, int nid, bool exact_nid) > +{ > + void *ptr; > + > + if (exact_nid) > + ptr = memblock_alloc_exact_nid_raw(size, align, min_addr, > + MEMBLOCK_ALLOC_ACCESSIBLE, > + nid); > + else > + ptr = memblock_alloc_try_nid_raw(size, align, min_addr, > + MEMBLOCK_ALLOC_ACCESSIBLE, > + nid); > + > + if (ptr && size > 0) > + page_init_poison(ptr, size); > + > + return ptr; > +} > + > static int zone_batchsize(struct zone *zone) > { > #ifdef CONFIG_MMU > @@ -7501,8 +7521,8 @@ static void __ref alloc_node_mem_map(struct pglist_data *pgdat) > end = pgdat_end_pfn(pgdat); > end = ALIGN(end, MAX_ORDER_NR_PAGES); > size = (end - start) * sizeof(struct page); > - map = memblock_alloc_node(size, SMP_CACHE_BYTES, > - pgdat->node_id); > + map = memmap_alloc(size, SMP_CACHE_BYTES, MEMBLOCK_LOW_LIMIT, > + pgdat->node_id, false); Mostly offtopic, but... Why is alloc_node_mem_map() marked __ref? afaict it can be __init?