Received: by 10.213.65.68 with SMTP id h4csp3932297imn; Tue, 10 Apr 2018 06:51:53 -0700 (PDT) X-Google-Smtp-Source: AIpwx499b6i3Y7u+I5wIAlZUWmERbqJaYRdJhaUtMeLGVivUMWJPAvjkpnuK9Z/6cjgwZTr0pKMU X-Received: by 2002:a17:902:6b07:: with SMTP id o7-v6mr567264plk.136.1523368313797; Tue, 10 Apr 2018 06:51:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523368313; cv=none; d=google.com; s=arc-20160816; b=Qzyt53vheUqMzAYhfDGoqwuE6nZhIbgeP7HnMPLVq2THkOfCmgsk6/c8PSCyGgv2HG R1PKQR2cNcC7ozWXBfXqytXoGDHHiu+1PaTv79eDXzoA4Wfh8UCHKFQrLzee1TODiP5A 5X0K9FJC0NIsXD1t53TTEMRkP4LYDj1xD7qLExeYKp8dZSyCzbdNIE+WcUTX41G8fc7o vAQBAkRgqMv3sDNLsDOeSP0jR21DjjE5vS+CR2tQV5WHio44ZxeKmQIdSim5QLtXHKjI ScMs4l4LiMR+jaEUjzdi/xRc4TQXEzkhLo46Nal8uKQTO9s8TiGXiS38oIUBLc1xO5lQ cNxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=ZvDqPxlUfEm2l/af8ko8f4WaHB5gLtpKDZR9JzO7cls=; b=rLwNCMGoShI5cstafuT6pi1kJK3HOq8eUi6YPIvacuTzvtUtu1OxBPXjUHqmXbrWDC WRkTatFjSHioeBoO8Ua8H0zjvCQ6XTG/jtWQyuwDD72iioJTIE1jaANuuvMWQ5ti0/V0 dKfoLoFqhm2SgExtkj7DzkYdJT0OCywl+nWXZ4xBP8yRC/lPgRyFCc83QK0KsLL9xezB 2clY3PIivrREtOIjaPiZeTWPQj/YKIhOMuJSoikmhx233dPHeWRVT2EJqbLFUam2Jxbi 3Jz98BrnqsYxrPrI0l4b7TrgDMSCMK9sioTOL0P24H42c7GqXw2pJxnwDr3Rj2EydHOD 6DKA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q90si2168210pfa.415.2018.04.10.06.51.16; Tue, 10 Apr 2018 06:51:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753998AbeDJNqv (ORCPT + 99 others); Tue, 10 Apr 2018 09:46:51 -0400 Received: from mx2.suse.de ([195.135.220.15]:52002 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752874AbeDJNqt (ORCPT ); Tue, 10 Apr 2018 09:46:49 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id B20F4ADA9; Tue, 10 Apr 2018 13:46:47 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 936F91E09FD; Tue, 10 Apr 2018 15:46:46 +0200 (CEST) Date: Tue, 10 Apr 2018 15:46:46 +0200 From: Jan Kara To: Matthew Wilcox Cc: linux-mm@kvack.org, Matthew Wilcox , Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Andrew Morton , linux-kernel@vger.kernel.org, Jan Kara , Jeff Layton , Mel Gorman , stable@vger.kernel.org Subject: Re: [PATCH 2/2] page cache: Mask off unwanted GFP flags Message-ID: <20180410134646.p5wuhl6fwtg6megr@quack2.suse.cz> References: <20180410125351.15837-1-willy@infradead.org> <20180410125351.15837-2-willy@infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180410125351.15837-2-willy@infradead.org> User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 10-04-18 05:53:51, Matthew Wilcox wrote: > From: Matthew Wilcox > > The page cache has used the mapping's GFP flags for allocating > radix tree nodes for a long time. It took care to always mask off the > __GFP_HIGHMEM flag, and masked off other flags in other paths, but the > __GFP_ZERO flag was still able to sneak through. The __GFP_DMA and > __GFP_DMA32 flags would also have been able to sneak through if they > were ever used. Fix them all by using GFP_RECLAIM_MASK at the innermost > location, and remove it from earlier in the callchain. > > Fixes: 19f99cee206c ("f2fs: add core inode operations") > Reported-by: Minchan Kim > Signed-off-by: Matthew Wilcox > Cc: stable@vger.kernel.org Looks good to me. You can add: Reviewed-by: Jan Kara Honza > --- > mm/filemap.c | 9 ++++----- > 1 file changed, 4 insertions(+), 5 deletions(-) > > diff --git a/mm/filemap.c b/mm/filemap.c > index c2147682f4c3..1a4bfc5ed3dc 100644 > --- a/mm/filemap.c > +++ b/mm/filemap.c > @@ -785,7 +785,7 @@ int replace_page_cache_page(struct page *old, struct page *new, gfp_t gfp_mask) > VM_BUG_ON_PAGE(!PageLocked(new), new); > VM_BUG_ON_PAGE(new->mapping, new); > > - error = radix_tree_preload(gfp_mask & ~__GFP_HIGHMEM); > + error = radix_tree_preload(gfp_mask & GFP_RECLAIM_MASK); > if (!error) { > struct address_space *mapping = old->mapping; > void (*freepage)(struct page *); > @@ -841,7 +841,7 @@ static int __add_to_page_cache_locked(struct page *page, > return error; > } > > - error = radix_tree_maybe_preload(gfp_mask & ~__GFP_HIGHMEM); > + error = radix_tree_maybe_preload(gfp_mask & GFP_RECLAIM_MASK); > if (error) { > if (!huge) > mem_cgroup_cancel_charge(page, memcg, false); > @@ -1574,8 +1574,7 @@ struct page *pagecache_get_page(struct address_space *mapping, pgoff_t offset, > if (fgp_flags & FGP_ACCESSED) > __SetPageReferenced(page); > > - err = add_to_page_cache_lru(page, mapping, offset, > - gfp_mask & GFP_RECLAIM_MASK); > + err = add_to_page_cache_lru(page, mapping, offset, gfp_mask); > if (unlikely(err)) { > put_page(page); > page = NULL; > @@ -2378,7 +2377,7 @@ static int page_cache_read(struct file *file, pgoff_t offset, gfp_t gfp_mask) > if (!page) > return -ENOMEM; > > - ret = add_to_page_cache_lru(page, mapping, offset, gfp_mask & GFP_KERNEL); > + ret = add_to_page_cache_lru(page, mapping, offset, gfp_mask); > if (ret == 0) > ret = mapping->a_ops->readpage(file, page); > else if (ret == -EEXIST) > -- > 2.16.3 > -- Jan Kara SUSE Labs, CR