From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-12.8 required=3.0 tests=BAYES_00, DKIM_ADSP_CUSTOM_MED,DKIM_INVALID,DKIM_SIGNED,FREEMAIL_FORGED_FROMDOMAIN, FREEMAIL_FROM,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5714CC433E1 for ; Mon, 10 Aug 2020 02:28:34 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 01E6620748 for ; Mon, 10 Aug 2020 02:28:33 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="tPXjNJyx" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 01E6620748 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 921868D0007; Sun, 9 Aug 2020 22:28:33 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 8D2096B000A; Sun, 9 Aug 2020 22:28:33 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 7BFC68D0007; Sun, 9 Aug 2020 22:28:33 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0074.hostedemail.com [216.40.44.74]) by kanga.kvack.org (Postfix) with ESMTP id 661AF6B0008 for ; Sun, 9 Aug 2020 22:28:33 -0400 (EDT) Received: from smtpin28.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay05.hostedemail.com (Postfix) with ESMTP id 2305D181AC9CB for ; Mon, 10 Aug 2020 02:28:33 +0000 (UTC) X-FDA: 77133075306.28.point92_3e050ff26fd6 Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin28.hostedemail.com (Postfix) with ESMTP id 06DC16D62 for ; Mon, 10 Aug 2020 02:28:33 +0000 (UTC) X-HE-Tag: point92_3e050ff26fd6 X-Filterd-Recvd-Size: 13848 Received: from mail-pj1-f68.google.com (mail-pj1-f68.google.com [209.85.216.68]) by imf03.hostedemail.com (Postfix) with ESMTP for ; Mon, 10 Aug 2020 02:28:32 +0000 (UTC) Received: by mail-pj1-f68.google.com with SMTP id c10so8233404pjn.1 for ; Sun, 09 Aug 2020 19:28:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=A0so4fQowQIABHlZeHOs4si+EurGVBhpstQxSdjCTKk=; b=tPXjNJyxl/wafOmjktA4v0Ff+6NiFDhm4uZJcRy4HkzLWih0dPUV2CRwh3DGpMwIHF aItzNDc9IbTLdzEljsN6mYtxCizmXQgXcjBf74sg5ANtkyq97tfSnq/Mp3zNE3px8GCM 3OMirQTYfqlY0iL/dLFiUOZank9oTo3Cg5tkddIODGDb6Nnjw3juULR5rfKwd+vAv/ep G+69QNC/hMz2nPxMhGOqwj+FydQc9PrVOGvCVAxahSdjvzzoma50VHV2BuXkN1rJqV4v SALbUpMz6Dfgs7owjWTFbxm6f8wGV6BKVrpRMvnH3Oq4Ay84cmpHJr45w7ow2VTEsST6 Ds4Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=A0so4fQowQIABHlZeHOs4si+EurGVBhpstQxSdjCTKk=; b=sdBa3oWL7HvBc3KVKPpYTRLoKb2H8KHt250BwHo6VysMoKi6C0efA66/eFP+WMa4xV ygaa1pzrClM8l2RN3NlSTNY9ORFuSrpYmPmgKzx2cih4zERV4MMwh68cMWse+17YwgTh m6w65f3w258rwxcZATtOG/chDi043KTFvE+GpbS/W8jIbNZxYIo88yhC9JKaRQdOqrzj uW523zFb5mcWrLVnzrIaJ3RV87xrMyuTRbxAlFLpzyGT0CJMHegzXJECQQGXPgH/b+Bj WXuBCA1bnS3/Wj8/irVYG083jeJ9LUAL7D1jbwDK9uZ0i0YKGhXpmrvExAnjaYw4PV+y VUFw== X-Gm-Message-State: AOAM532hJdbN3G1tfRr0Csorf73Au3UGW/26BtQpE6NkVMrB86pO0qYs 9JXcaV0y0XJSokmSIPc1Sc92+erm X-Google-Smtp-Source: ABdhPJy2cbTkCgVj+7r3lbrOmme2kgKLyxtJ3KbxYuQ7Nh6zJNk1/S9jERNxlg1hhtGQ8/P+Younzg== X-Received: by 2002:a17:90a:884:: with SMTP id v4mr22909813pjc.27.1597026511406; Sun, 09 Aug 2020 19:28:31 -0700 (PDT) Received: from bobo.ibm.com (193-116-100-32.tpgi.com.au. [193.116.100.32]) by smtp.gmail.com with ESMTPSA id l17sm21863475pff.126.2020.08.09.19.28.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 09 Aug 2020 19:28:31 -0700 (PDT) From: Nicholas Piggin To: linux-mm@kvack.org Cc: Nicholas Piggin , linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, Catalin Marinas , Will Deacon , linux-arm-kernel@lists.infradead.org, Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, "H. Peter Anvin" , Zefan Li Subject: [PATCH v3 8/8] mm/vmalloc: Hugepage vmalloc mappings Date: Mon, 10 Aug 2020 12:27:32 +1000 Message-Id: <20200810022732.1150009-9-npiggin@gmail.com> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20200810022732.1150009-1-npiggin@gmail.com> References: <20200810022732.1150009-1-npiggin@gmail.com> MIME-Version: 1.0 X-Rspamd-Queue-Id: 06DC16D62 X-Spamd-Result: default: False [0.00 / 100.00] X-Rspamd-Server: rspam05 Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On platforms that define HAVE_ARCH_HUGE_VMAP and support PMD vmaps, vmalloc will attempt to allocate PMD-sized pages first, before falling back to small pages. Allocations which use something other than PAGE_KERNEL protections are not permitted to use huge pages yet, not all callers expect this (e.g., module allocations vs strict module rwx). This reduces TLB misses by nearly 30x on a `git diff` workload on a 2-node POWER9 (59,800 -> 2,100) and reduces CPU cycles by 0.54%. This can result in more internal fragmentation and memory overhead for a given allocation, an option nohugevmap is added to disable at boot. Signed-off-by: Nicholas Piggin --- .../admin-guide/kernel-parameters.txt | 2 + include/linux/vmalloc.h | 1 + mm/vmalloc.c | 174 +++++++++++++----- 3 files changed, 135 insertions(+), 42 deletions(-) diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentat= ion/admin-guide/kernel-parameters.txt index 98ea67f27809..eaef176c597f 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -3190,6 +3190,8 @@ =20 nohugeiomap [KNL,x86,PPC] Disable kernel huge I/O mappings. =20 + nohugevmap [KNL,x86,PPC] Disable kernel huge vmalloc mappings. + nosmt [KNL,S390] Disable symmetric multithreading (SMT). Equivalent to smt=3D1. =20 diff --git a/include/linux/vmalloc.h b/include/linux/vmalloc.h index e3590e93bfff..8f25dbaca0a1 100644 --- a/include/linux/vmalloc.h +++ b/include/linux/vmalloc.h @@ -58,6 +58,7 @@ struct vm_struct { unsigned long size; unsigned long flags; struct page **pages; + unsigned int page_order; unsigned int nr_pages; phys_addr_t phys_addr; const void *caller; diff --git a/mm/vmalloc.c b/mm/vmalloc.c index 4e5cb7c7f780..a7728c7086bc 100644 --- a/mm/vmalloc.c +++ b/mm/vmalloc.c @@ -45,6 +45,19 @@ #include "internal.h" #include "pgalloc-track.h" =20 +#ifdef CONFIG_HAVE_ARCH_HUGE_VMAP +static bool __ro_after_init vmap_allow_huge =3D true; + +static int __init set_nohugevmap(char *str) +{ + vmap_allow_huge =3D false; + return 0; +} +early_param("nohugevmap", set_nohugevmap); +#else /* CONFIG_HAVE_ARCH_HUGE_VMAP */ +static const bool vmap_allow_huge =3D false; +#endif /* CONFIG_HAVE_ARCH_HUGE_VMAP */ + bool is_vmalloc_addr(const void *x) { unsigned long addr =3D (unsigned long)x; @@ -468,31 +481,12 @@ static int vmap_pages_p4d_range(pgd_t *pgd, unsigne= d long addr, unsigned long en return 0; } =20 -/** - * map_kernel_range_noflush - map kernel VM area with the specified page= s - * @addr: start of the VM area to map - * @size: size of the VM area to map - * @prot: page protection flags to use - * @pages: pages to map - * - * Map PFN_UP(@size) pages at @addr. The VM area @addr and @size specif= y should - * have been allocated using get_vm_area() and its friends. - * - * NOTE: - * This function does NOT do any cache flushing. The caller is responsi= ble for - * calling flush_cache_vmap() on to-be-mapped areas before calling this - * function. - * - * RETURNS: - * 0 on success, -errno on failure. - */ -int map_kernel_range_noflush(unsigned long addr, unsigned long size, - pgprot_t prot, struct page **pages) +static int vmap_small_pages_range_noflush(unsigned long addr, unsigned l= ong end, + pgprot_t prot, struct page **pages) { unsigned long start =3D addr; - unsigned long end =3D addr + size; - unsigned long next; pgd_t *pgd; + unsigned long next; int err =3D 0; int nr =3D 0; pgtbl_mod_mask mask =3D 0; @@ -514,6 +508,65 @@ int map_kernel_range_noflush(unsigned long addr, uns= igned long size, return 0; } =20 +static int vmap_pages_range_noflush(unsigned long addr, unsigned long en= d, + pgprot_t prot, struct page **pages, unsigned int page_shift) +{ + WARN_ON(page_shift < PAGE_SHIFT); + + if (page_shift =3D=3D PAGE_SHIFT) { + return vmap_small_pages_range_noflush(addr, end, prot, pages); + } else { + unsigned int i, nr =3D (end - addr) >> page_shift; + + for (i =3D 0; i < nr; i++) { + int err; + + err =3D vmap_range_noflush(addr, addr + (1UL << page_shift), + __pa(page_address(pages[i])), prot, page_shift); + if (err) + return err; + + addr +=3D 1UL << page_shift; + } + + return 0; + } +} + +static int vmap_pages_range(unsigned long addr, unsigned long end, + pgprot_t prot, struct page **pages, unsigned int page_shift) +{ + int err; + + err =3D vmap_pages_range_noflush(addr, end, prot, pages, page_shift); + flush_cache_vmap(addr, end); + return err; +} + +/** + * map_kernel_range_noflush - map kernel VM area with the specified page= s + * @addr: start of the VM area to map + * @size: size of the VM area to map + * @prot: page protection flags to use + * @pages: pages to map + * + * Map PFN_UP(@size) pages at @addr. The VM area @addr and @size specif= y should + * have been allocated using get_vm_area() and its friends. + * + * NOTE: + * This function does NOT do any cache flushing. The caller is responsi= ble for + * calling flush_cache_vmap() on to-be-mapped areas before calling this + * function. + * + * RETURNS: + * 0 on success, -errno on failure. + */ +int map_kernel_range_noflush(unsigned long addr, unsigned long size, + pgprot_t prot, struct page **pages) +{ + return vmap_pages_range_noflush(addr, addr + size, prot, pages, PAGE_SH= IFT); +} + int map_kernel_range(unsigned long start, unsigned long size, pgprot_t p= rot, struct page **pages) { @@ -2274,9 +2327,11 @@ static struct vm_struct *__get_vm_area_node(unsign= ed long size, if (unlikely(!size)) return NULL; =20 - if (flags & VM_IOREMAP) - align =3D 1ul << clamp_t(int, get_count_order_long(size), - PAGE_SHIFT, IOREMAP_MAX_ORDER); + if (flags & VM_IOREMAP) { + align =3D max(align, + 1ul << clamp_t(int, get_count_order_long(size), + PAGE_SHIFT, IOREMAP_MAX_ORDER)); + } =20 area =3D kzalloc_node(sizeof(*area), gfp_mask & GFP_RECLAIM_MASK, node)= ; if (unlikely(!area)) @@ -2475,7 +2530,8 @@ static void __vunmap(const void *addr, int dealloca= te_pages) struct page *page =3D area->pages[i]; =20 BUG_ON(!page); - __free_pages(page, 0); + __free_pages(page, area->page_order); + i +=3D 1 << area->page_order; } atomic_long_sub(area->nr_pages, &nr_vmalloc_pages); =20 @@ -2614,9 +2670,12 @@ void *vmap(struct page **pages, unsigned int count= , EXPORT_SYMBOL(vmap); =20 static void *__vmalloc_area_node(struct vm_struct *area, gfp_t gfp_mask, - pgprot_t prot, int node) + pgprot_t prot, unsigned int page_shift, int node) { struct page **pages; + unsigned long addr =3D (unsigned long)area->addr; + unsigned long size =3D get_vm_area_size(area); + unsigned int page_order =3D page_shift - PAGE_SHIFT; unsigned int nr_pages, array_size, i; const gfp_t nested_gfp =3D (gfp_mask & GFP_RECLAIM_MASK) | __GFP_ZERO; const gfp_t alloc_mask =3D gfp_mask | __GFP_NOWARN; @@ -2624,7 +2683,7 @@ static void *__vmalloc_area_node(struct vm_struct *= area, gfp_t gfp_mask, 0 : __GFP_HIGHMEM; =20 - nr_pages =3D get_vm_area_size(area) >> PAGE_SHIFT; + nr_pages =3D size >> PAGE_SHIFT; array_size =3D (nr_pages * sizeof(struct page *)); =20 /* Please note that the recursion is strictly bounded. */ @@ -2643,29 +2702,29 @@ static void *__vmalloc_area_node(struct vm_struct= *area, gfp_t gfp_mask, =20 area->pages =3D pages; area->nr_pages =3D nr_pages; + area->page_order =3D page_order; =20 - for (i =3D 0; i < area->nr_pages; i++) { + for (i =3D 0; i < area->nr_pages; i +=3D 1 << page_order) { struct page *page; + int p; =20 - if (node =3D=3D NUMA_NO_NODE) - page =3D alloc_page(alloc_mask|highmem_mask); - else - page =3D alloc_pages_node(node, alloc_mask|highmem_mask, 0); - + page =3D alloc_pages_node(node, alloc_mask|highmem_mask, page_order); if (unlikely(!page)) { /* Successfully allocated i pages, free them in __vunmap() */ area->nr_pages =3D i; atomic_long_add(area->nr_pages, &nr_vmalloc_pages); goto fail; } - area->pages[i] =3D page; + + for (p =3D 0; p < (1 << page_order); p++) + area->pages[i + p] =3D page + p; + if (gfpflags_allow_blocking(gfp_mask)) cond_resched(); } atomic_long_add(area->nr_pages, &nr_vmalloc_pages); =20 - if (map_kernel_range((unsigned long)area->addr, get_vm_area_size(area), - prot, pages) < 0) + if (vmap_pages_range(addr, addr + size, prot, pages, page_shift) < 0) goto fail; =20 return area->addr; @@ -2701,22 +2760,45 @@ void *__vmalloc_node_range(unsigned long size, un= signed long align, pgprot_t prot, unsigned long vm_flags, int node, const void *caller) { - struct vm_struct *area; + struct vm_struct *area =3D NULL; void *addr; unsigned long real_size =3D size; + unsigned long real_align =3D align; + unsigned int shift =3D PAGE_SHIFT; =20 size =3D PAGE_ALIGN(size); if (!size || (size >> PAGE_SHIFT) > totalram_pages()) goto fail; =20 - area =3D __get_vm_area_node(real_size, align, VM_ALLOC | VM_UNINITIALIZ= ED | + if (vmap_allow_huge && (pgprot_val(prot) =3D=3D pgprot_val(PAGE_KERNEL)= )) { + unsigned long size_per_node; + + /* + * Try huge pages. Only try for PAGE_KERNEL allocations, + * others like modules don't yet expect huge pages in + * their allocations due to apply_to_page_range not + * supporting them. + */ + + size_per_node =3D size; + if (node =3D=3D NUMA_NO_NODE) + size_per_node /=3D num_online_nodes(); + if (size_per_node >=3D PMD_SIZE) + shift =3D PMD_SHIFT; + } + +again: + align =3D max(real_align, 1UL << shift); + size =3D ALIGN(real_size, align); + + area =3D __get_vm_area_node(size, align, VM_ALLOC | VM_UNINITIALIZED | vm_flags, start, end, node, gfp_mask, caller); if (!area) goto fail; =20 - addr =3D __vmalloc_area_node(area, gfp_mask, prot, node); + addr =3D __vmalloc_area_node(area, gfp_mask, prot, shift, node); if (!addr) - return NULL; + goto fail; =20 /* * In this function, newly allocated vm_struct has VM_UNINITIALIZED @@ -2730,8 +2812,16 @@ void *__vmalloc_node_range(unsigned long size, uns= igned long align, return addr; =20 fail: - warn_alloc(gfp_mask, NULL, + if (shift > PAGE_SHIFT) { + shift =3D PAGE_SHIFT; + goto again; + } + + if (!area) { + /* Warn for area allocation, page allocations already warn */ + warn_alloc(gfp_mask, NULL, "vmalloc: allocation failure: %lu bytes", real_size); + } return NULL; } =20 --=20 2.23.0