From patchwork Sun Dec 26 08:39:09 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kefeng Wang X-Patchwork-Id: 12699303 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 9800DC433F5 for ; Sun, 26 Dec 2021 08:31:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Date:Subject:CC :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=cRvtQM9tq9qpeti9zklBM1pVCoiIU+ICemdZYyat3CE=; b=jeQAC24nsNTfcm CPPS+nM4fXP7MPbPX244E5sxVNlmecQmcaqy7ArJtPnjSfxd7u/wD6mUp1ly21iEYCfDn8+14xX3r BuyoneAI8qu15VoBHRY1TyF1l1vIn/qnkg1T6/jk+/5ZOfo7k0bedHo9C4/n+pKcvdxH0LvwY1qax hsoAQHFC9md78njVcf59kO+8as7iy7ILecEm7NfzESXevZTkcsyKDPMLOhT/6MJvixrmRDES0VBf9 IFIH258flVtqEErsu+856oYcNnPyC8ux1tYk741+UziOu5jzH6AN3mTjSg6ihfnGpGhinTRBHWzEu zolGecO6l5uMBkHegNvw==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1n1OvB-00FLqq-EV; Sun, 26 Dec 2021 08:30:25 +0000 Received: from szxga01-in.huawei.com ([45.249.212.187]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1n1Oum-00FLg4-Tr for linux-arm-kernel@lists.infradead.org; Sun, 26 Dec 2021 08:30:03 +0000 Received: from dggpemm500023.china.huawei.com (unknown [172.30.72.54]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4JMDRG17z7zZdj1; Sun, 26 Dec 2021 16:26:34 +0800 (CST) Received: from dggpemm500001.china.huawei.com (7.185.36.107) by dggpemm500023.china.huawei.com (7.185.36.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20; Sun, 26 Dec 2021 16:29:48 +0800 Received: from localhost.localdomain.localdomain (10.175.113.25) by dggpemm500001.china.huawei.com (7.185.36.107) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20; Sun, 26 Dec 2021 16:29:47 +0800 From: Kefeng Wang To: Jonathan Corbet , Andrew Morton , , , , , , CC: Nicholas Piggin , Catalin Marinas , Will Deacon , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Michael Ellerman , "Benjamin Herrenschmidt" , Paul Mackerras , Kefeng Wang Subject: [PATCH 0/3] mm: support huge vmalloc mapping on arm64/x86 Date: Sun, 26 Dec 2021 16:39:09 +0800 Message-ID: <20211226083912.166512-1-wangkefeng.wang@huawei.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 X-Originating-IP: [10.175.113.25] X-ClientProxiedBy: dggems702-chm.china.huawei.com (10.3.19.179) To dggpemm500001.china.huawei.com (7.185.36.107) X-CFilter-Loop: Reflected X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20211226_003001_147409_7609B959 X-CRM114-Status: GOOD ( 11.68 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org huge vmalloc mappings is supported on PPC[1], but this feature should be not only used on PPC, it could be used on arch support HAVE_ARCH_HUGE_VMAP and PMD sized vmap mappings. this patchset is to enable this feature on arm64/x86. The first patch is to let user to control huge vmalloc mapping default behavior and then enable this feature on arm64/x86. The PPC is enabled by default(it selects HUGE_VMALLOC_DEFAULT_ENABLED), but arm64/x86 should use hugevmalloc=on to enable this feature. NOTE: 1) nohugevmalloc parameter is still supported, the first patch is in case of archs don't want to this feature enabled by default. 2) if people don't like this, we could drop the first patch. [1] https://lore.kernel.org/linux-mm/20210317062402.533919-1-npiggin@gmail.com/ Kefeng Wang (3): mm: vmalloc: Let user to control huge vmalloc default behavior arm64: Support huge vmalloc mappings x86: Support huge vmalloc mappings .../admin-guide/kernel-parameters.txt | 14 +++++++++++++- arch/arm64/Kconfig | 1 + arch/powerpc/Kconfig | 1 + arch/x86/Kconfig | 1 + mm/Kconfig | 7 +++++++ mm/vmalloc.c | 18 +++++++++++++++++- 6 files changed, 40 insertions(+), 2 deletions(-)