Received: by 10.192.165.148 with SMTP id m20csp2319257imm; Sun, 6 May 2018 11:56:11 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoPH6ZDXbSyjdnZaTRnu0IGd9PINAoegGf5Sarj/saV5bDJJaoGaseXCAblGowKFiQPdDqZ X-Received: by 10.98.8.69 with SMTP id c66mr22342106pfd.189.1525632971733; Sun, 06 May 2018 11:56:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525632971; cv=none; d=google.com; s=arc-20160816; b=DYWdYYPAUM350uqiPNuv2SFaXcEB/2qeVCW4PhhHLxDLLTVZyogi+/1OmlzyjyvZRG 36GAnnJkpgEcIIXZp3sLzHz4mW4fIsQjHKPUSWa2xJ3EZ7l2RTsEdPcNmrWxYB7j3kdY 4LL2PNlETCjkjU4nc46HvabFFISE9tlGkB3OSlHqSwPIhHNYIz7zwWdWgKWfa3f9HbAT TM5UY5vEqK7/uCD7z0lrXoaDdumAfrHrP/PXCOVNtIbVw9BMxMNhN/ERSERAB1zO/koI qhWkXniI7J8rq3vbjDRr79Ha4ujIr0nSSdReLBUoQCrA9FQvrgrOAf3/SGBDbKOEiPBc xfIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=bEbjOsgx1AzEAZLNSTPTvNH9Pizbo9MJiWPcnk3UhMY=; b=EQDjVH/NiLMVrVsbGQJ0+Ym24tM38sZAJ1YLiRQiZi7tU6Cf4NvA9lpOJeCrL822Jz ve3Si22pDkZaUvfOBiy3k3ctyZStoiLOme6VUv3BvZcyB37B/gFCZXeXseT7W251WBWA rjUO2DadH6mkH0VG6n5AnTNEbD++jOgUruuOl8EZeCfjX47MH4Zy7BVZJ57/2MNYxTiM pOypbdPfflS0Te9nbW2coou0lJwPEGvxkmIYzMD9Eh9ciO4eB8gCrBOH/VGXS971v1G4 wzAZl6j3WfncqaOjdoDvEGAZi10+a6biGUbro+iGq7rypzTcEBIrSeNoLobqF1Jo/Pr+ ZpMg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=VHtZEE2l; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a69-v6si20600619pli.391.2018.05.06.11.55.56; Sun, 06 May 2018 11:56:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=VHtZEE2l; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751820AbeEFSzs (ORCPT + 99 others); Sun, 6 May 2018 14:55:48 -0400 Received: from bombadil.infradead.org ([198.137.202.133]:38540 "EHLO bombadil.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751771AbeEFSzp (ORCPT ); Sun, 6 May 2018 14:55:45 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20170209; h=In-Reply-To:Content-Type:MIME-Version :References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=bEbjOsgx1AzEAZLNSTPTvNH9Pizbo9MJiWPcnk3UhMY=; b=VHtZEE2lXG9+7AT8ux6sA3U2i H402vCiDw02T2h2xZqkvgH2A6dFhDDN0LuVbY8ea4mS4Y8R/+W9j3N2SilkbF7JUx6yGlN4w6oFzH gGvZDG/x/Q67bUtK1rkuPe7nZgoeoSwaRTSL9HCd55R1SeticjLVCIZksNRwplovlT7LoTQexwBXq 1IQzYa/8m+Oh3K2//HmD8TYREjnRD/p46VxQ42Zn9mw9NaRmeK3mA14KtRTp6pxyKpM2a6Sh4xZhc eFgUdZlJY/q9Fd6ggfIwCzoTWp6wzzepEmc7dDK5myP0Naa28YzawmPXFF3gP5qYyYa6JmMc5SKdc 8pMzgLsWA==; Received: from willy by bombadil.infradead.org with local (Exim 4.90_1 #2 (Red Hat Linux)) id 1fFOom-0006CM-Pv; Sun, 06 May 2018 18:55:32 +0000 Date: Sun, 6 May 2018 11:55:32 -0700 From: Matthew Wilcox To: Huaisheng HS1 Ye Cc: Michal Hocko , "akpm@linux-foundation.org" , "linux-mm@kvack.org" , "vbabka@suse.cz" , "mgorman@techsingularity.net" , "pasha.tatashin@oracle.com" , "alexander.levin@verizon.com" , "hannes@cmpxchg.org" , "penguin-kernel@I-love.SAKURA.ne.jp" , "colyli@suse.de" , NingTing Cheng , "linux-kernel@vger.kernel.org" Subject: Re: [External] Re: [PATCH 2/3] include/linux/gfp.h: use unsigned int in gfp_zone Message-ID: <20180506185532.GA13604@bombadil.infradead.org> References: <1525416729-108201-1-git-send-email-yehs1@lenovo.com> <1525416729-108201-3-git-send-email-yehs1@lenovo.com> <20180504133533.GR4535@dhcp22.suse.cz> <20180504154004.GB29829@bombadil.infradead.org> <20180506134814.GB7362@bombadil.infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, May 06, 2018 at 04:17:06PM +0000, Huaisheng HS1 Ye wrote: > Upload my current patch and testing platform info for reference. This patch has been tested > on a two sockets platform. Thank you! > It works, but some drivers or subsystem shall be modified to fit > these new type __GFP flags. > They use these flags directly to realize bit manipulations like this > below. > > eg. > swiotlb-xen.c (drivers\xen): flags &= ~(__GFP_DMA | __GFP_HIGHMEM); > extent_io.c (fs\btrfs): mask &= ~(__GFP_DMA32|__GFP_HIGHMEM); > > Because of these flags have been encoded within this patch, the > above operations can cause problem. I don't think this actually causes problems. At least, no additional problems. These users will successfully clear __GFP_DMA and __GFP_HIGHMEM no matter what values GFP_DMA and GFP_HIGHMEM have; the only problem will be if someone calls them with a zone type they're not expecting (eg DMA32 for the first one or DMA for the second; or MOVABLE for either of them). The thing is, they're already buggy in those circumstances. > */ > -#define __GFP_DMA ((__force gfp_t)___GFP_DMA) > -#define __GFP_HIGHMEM ((__force gfp_t)___GFP_HIGHMEM) > -#define __GFP_DMA32 ((__force gfp_t)___GFP_DMA32) > +#define __GFP_DMA ((__force gfp_t)OPT_ZONE_DMA ^ ZONE_NORMAL) > +#define __GFP_HIGHMEM ((__force gfp_t)ZONE_MOVABLE ^ ZONE_NORMAL) > +#define __GFP_DMA32 ((__force gfp_t)OPT_ZONE_DMA32 ^ ZONE_NORMAL) > #define __GFP_MOVABLE ((__force gfp_t)___GFP_MOVABLE) /* ZONE_MOVABLE allowed */ [...] > static inline enum zone_type gfp_zone(gfp_t flags) > { > enum zone_type z; > - int bit = (__force int) (flags & GFP_ZONEMASK); > + z = ((__force unsigned int)flags & ___GFP_ZONE_MASK) ^ ZONE_NORMAL; > > - z = (GFP_ZONE_TABLE >> (bit * GFP_ZONES_SHIFT)) & > - ((1 << GFP_ZONES_SHIFT) - 1); > - VM_BUG_ON((GFP_ZONE_BAD >> bit) & 1); > + if (z > OPT_ZONE_HIGHMEM) { > + z = OPT_ZONE_HIGHMEM + > + !!((__force unsigned int)flags & ___GFP_MOVABLE); > + } > return z; > } How about: +#define __GFP_HIGHMEM ((__force gfp_t)OPT_ZONE_HIGHMEM ^ ZONE_NORMAL) -#define __GFP_MOVABLE ((__force gfp_t)___GFP_MOVABLE) /* ZONE_MOVABLE allowed */ +#define __GFP_MOVABLE ((__force gfp_t)ZONE_MOVABLE ^ ZONE_NORMAL | \ + ___GFP_MOVABLE) Then I think you can just make it: static inline enum zone_type gfp_zone(gfp_t flags) { return ((__force int)flags & ___GFP_ZONE_MASK) ^ ZONE_NORMAL; } > @@ -370,42 +368,15 @@ static inline bool gfpflags_allow_blocking(const gfp_t gfp_flags) > #error GFP_ZONES_SHIFT too large to create GFP_ZONE_TABLE integer > #endif You should be able to delete GFP_ZONES_SHIFT too.