From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3CF1DC433EF for ; Tue, 5 Jul 2022 09:29:51 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id A55006B0071; Tue, 5 Jul 2022 05:29:50 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id A065D6B0073; Tue, 5 Jul 2022 05:29:50 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 8CE406B0074; Tue, 5 Jul 2022 05:29:50 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 7B05E6B0071 for ; Tue, 5 Jul 2022 05:29:50 -0400 (EDT) Received: from smtpin04.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay12.hostedemail.com (Postfix) with ESMTP id 2C30B1211C0 for ; Tue, 5 Jul 2022 09:29:50 +0000 (UTC) X-FDA: 79652524140.04.C12A8A3 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by imf08.hostedemail.com (Postfix) with ESMTP id B339D160042 for ; Tue, 5 Jul 2022 09:29:48 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 966A5B816A9; Tue, 5 Jul 2022 09:29:46 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id BD127C341C7; Tue, 5 Jul 2022 09:29:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1657013385; bh=kGkmp8dPxzCCK114+0OM+AKFI00s3XSfhycOZJPJOlk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ulmzVpFf4aXRHwq+z6RYvnhTexooB8AMl3S7I2TeN59zwM5eunXVPWgFl9cM57OpW bq6hNbJ1xNpiDZ+Exf8NMU8/+15BNEH8FrQViQJJ2SVWdH9Ahk1ZhB7Rrudygq2+J3 bR3rdhguoBudEGLYe5xClBPRn4MDtesG1dATflzPN8t6I4Swf5DAmW3Qxe4pvh79Sm TpdEgrft+3/r5kInwNblNRWn4DzPuHFvVvjZDJ7xs4FZZDYrrun1Sc3RqyAiS9bJSi 1bujS052C+AeT6ccnqqZWlaIenIvvTFUk579henLIV1MojIa08mDP2VPX5QcBLYoRt LU5PxHa+sIh5A== Date: Tue, 5 Jul 2022 10:29:37 +0100 From: Will Deacon To: Huacai Chen Cc: Arnd Bergmann , Huacai Chen , Thomas Bogendoerfer , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Catalin Marinas , loongarch@lists.linux.dev, linux-arch@vger.kernel.org, Xuefeng Li , Guo Ren , Xuerui Wang , Jiaxun Yang , Andrew Morton , linux-mm@kvack.org, linux-mips@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Feiyang Chen Subject: Re: [PATCH V4 3/4] mm/sparse-vmemmap: Generalise vmemmap_populate_hugepages() Message-ID: <20220705092937.GA552@willie-the-truck> References: <20220704112526.2492342-1-chenhuacai@loongson.cn> <20220704112526.2492342-4-chenhuacai@loongson.cn> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220704112526.2492342-4-chenhuacai@loongson.cn> User-Agent: Mutt/1.10.1 (2018-07-13) ARC-Authentication-Results: i=1; imf08.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=ulmzVpFf; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf08.hostedemail.com: domain of will@kernel.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=will@kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1657013389; a=rsa-sha256; cv=none; b=8bOj9VcG+KIkIDy7iXlKKAT5LmlWrTed5efq1b76DAwwlhVTTMs6YN3Nt0aE9/ko3QaGGu odafBnyccCnfzOEPyPbg3VQDq3He8rSin16EMtowXjKBZvrdte5cIwJQB/by/ckFYBYttA DJVVwSpzislfp0ISOni+yGWrRxUxNt4= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1657013389; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=+2QVHJxMzgCdH73hj5of00EGKXqjvFRRARVkYkBBdpc=; b=iSgsc+tpsbMPTx/Cv7/G7N3jtKgCCKQjKRXnBhsbcZKCU7/OVSH0JAmZBbfBVQB86PbK9R ka/h5uBGb2DMC5tWSX3wCbR7VBrN2NFyPxpjGYoIYT7F5ifDPWlKEX81LZXcI6HBMs0wD+ X27kauXWlzcQNQBi2r4OwKvRoRBl1N0= Authentication-Results: imf08.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=ulmzVpFf; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf08.hostedemail.com: domain of will@kernel.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=will@kernel.org X-Rspamd-Server: rspam09 X-Rspam-User: X-Stat-Signature: obiqfcgatng61d4rsomuthqfoqkh1phj X-Rspamd-Queue-Id: B339D160042 X-HE-Tag: 1657013388-133183 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Mon, Jul 04, 2022 at 07:25:25PM +0800, Huacai Chen wrote: > From: Feiyang Chen > > Generalise vmemmap_populate_hugepages() so ARM64 & X86 & LoongArch can > share its implementation. > > Signed-off-by: Feiyang Chen > Signed-off-by: Huacai Chen > --- > arch/arm64/mm/mmu.c | 53 ++++++----------------- > arch/loongarch/mm/init.c | 63 ++++++++------------------- > arch/x86/mm/init_64.c | 92 ++++++++++++++-------------------------- > include/linux/mm.h | 6 +++ > mm/sparse-vmemmap.c | 54 +++++++++++++++++++++++ > 5 files changed, 124 insertions(+), 144 deletions(-) > > diff --git a/arch/arm64/mm/mmu.c b/arch/arm64/mm/mmu.c > index 626ec32873c6..b080a65c719d 100644 > --- a/arch/arm64/mm/mmu.c > +++ b/arch/arm64/mm/mmu.c > @@ -1158,49 +1158,24 @@ int __meminit vmemmap_populate(unsigned long start, unsigned long end, int node, > return vmemmap_populate_basepages(start, end, node, altmap); > } > #else /* !ARM64_KERNEL_USES_PMD_MAPS */ > +void __meminit vmemmap_set_pmd(pmd_t *pmdp, void *p, int node, > + unsigned long addr, unsigned long next) > +{ > + pmd_set_huge(pmdp, __pa(p), __pgprot(PROT_SECT_NORMAL)); > +} > + > +int __meminit vmemmap_check_pmd(pmd_t *pmdp, int node, unsigned long addr, > + unsigned long next) > +{ > + vmemmap_verify((pte_t *)pmdp, node, addr, next); > + return 1; > +} > + > int __meminit vmemmap_populate(unsigned long start, unsigned long end, int node, > struct vmem_altmap *altmap) > { > - unsigned long addr = start; > - unsigned long next; > - pgd_t *pgdp; > - p4d_t *p4dp; > - pud_t *pudp; > - pmd_t *pmdp; > - > WARN_ON((start < VMEMMAP_START) || (end > VMEMMAP_END)); > - do { > - next = pmd_addr_end(addr, end); > - > - pgdp = vmemmap_pgd_populate(addr, node); > - if (!pgdp) > - return -ENOMEM; > - > - p4dp = vmemmap_p4d_populate(pgdp, addr, node); > - if (!p4dp) > - return -ENOMEM; > - > - pudp = vmemmap_pud_populate(p4dp, addr, node); > - if (!pudp) > - return -ENOMEM; > - > - pmdp = pmd_offset(pudp, addr); > - if (pmd_none(READ_ONCE(*pmdp))) { > - void *p = NULL; > - > - p = vmemmap_alloc_block_buf(PMD_SIZE, node, altmap); > - if (!p) { > - if (vmemmap_populate_basepages(addr, next, node, altmap)) > - return -ENOMEM; > - continue; > - } > - > - pmd_set_huge(pmdp, __pa(p), __pgprot(PROT_SECT_NORMAL)); > - } else > - vmemmap_verify((pte_t *)pmdp, node, addr, next); > - } while (addr = next, addr != end); > - > - return 0; > + return vmemmap_populate_hugepages(start, end, node, altmap); > } > #endif /* !ARM64_KERNEL_USES_PMD_MAPS */ I think the arm64 change is mostly ok (thanks!), but I have a question about the core code you're introducing: > diff --git a/mm/sparse-vmemmap.c b/mm/sparse-vmemmap.c > index 33e2a1ceee72..6f2e40bb695d 100644 > --- a/mm/sparse-vmemmap.c > +++ b/mm/sparse-vmemmap.c > @@ -686,6 +686,60 @@ int __meminit vmemmap_populate_basepages(unsigned long start, unsigned long end, > return vmemmap_populate_range(start, end, node, altmap, NULL); > } > > +void __weak __meminit vmemmap_set_pmd(pmd_t *pmd, void *p, int node, > + unsigned long addr, unsigned long next) > +{ > +} > + > +int __weak __meminit vmemmap_check_pmd(pmd_t *pmd, int node, unsigned long addr, > + unsigned long next) > +{ > + return 0; > +} > + > +int __meminit vmemmap_populate_hugepages(unsigned long start, unsigned long end, > + int node, struct vmem_altmap *altmap) > +{ > + unsigned long addr; > + unsigned long next; > + pgd_t *pgd; > + p4d_t *p4d; > + pud_t *pud; > + pmd_t *pmd; > + > + for (addr = start; addr < end; addr = next) { > + next = pmd_addr_end(addr, end); > + > + pgd = vmemmap_pgd_populate(addr, node); > + if (!pgd) > + return -ENOMEM; > + > + p4d = vmemmap_p4d_populate(pgd, addr, node); > + if (!p4d) > + return -ENOMEM; > + > + pud = vmemmap_pud_populate(p4d, addr, node); > + if (!pud) > + return -ENOMEM; > + > + pmd = pmd_offset(pud, addr); > + if (pmd_none(READ_ONCE(*pmd))) { > + void *p; > + > + p = vmemmap_alloc_block_buf(PMD_SIZE, node, altmap); > + if (p) { > + vmemmap_set_pmd(pmd, p, node, addr, next); > + continue; > + } else if (altmap) > + return -ENOMEM; /* no fallback */ Why do you return -ENOMEM if 'altmap' here? That seems to be different to what we currently have on arm64 and it's not clear to me why we're happy with an altmap for the pmd case, but not for the pte case. Will