Received: by 10.192.165.148 with SMTP id m20csp5297738imm; Wed, 9 May 2018 02:42:11 -0700 (PDT) X-Google-Smtp-Source: AB8JxZre27fEBcethRT8Xztp0Z7fzqSi9LQabAnYmuTjToAl8GArcDNIujgs4gxQ/t5uno5u5Fki X-Received: by 2002:a17:902:887:: with SMTP id 7-v6mr45996570pll.319.1525858931927; Wed, 09 May 2018 02:42:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525858931; cv=none; d=google.com; s=arc-20160816; b=nixehHlgBW5ACpVjK1MN2dEs5tDZHKWFJgQKmXoHWwNAZDtb6RDnnhja2VG55qKbN3 4TEUBfh2uSfmaRXZyiVsgeJzHJCuP2u5uzLiXjSPhpV5DgyvUt4FXl8iKnCRFVkyNGQr nXbeyq2jBNfx/Ew0IL33LV6NBYBi7E3SIMXcutGWcoIj3Z6oZ493J9VkwrAisAkb2sba lhIW/6wbLrrJm6CFIQxRp9HqUPNf4D0m6Su8UKbHB4dyo4hdL2LxcurHHB+jZ/WmvKud 0KuAMXh3FwmY70svmrrMGmt0JxTzlVqGK5+4C1JCriJbnMBStJA56uYGKLJCzEjAYzc5 FBJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :reply-to:message-id:subject:cc:to:from:date :arc-authentication-results; bh=YSPNe0NvxxSlYZFwu89av6MxfpoOxTb/u1pym7JxM4A=; b=QvzZSFRLVl29hKDqEv7S/ZMaN2Ye34AvZA6zcw2e84o43GwlUMjzxyCmyv8WnmH/F4 qp8gZyp/mUdC6JD7RPN/ete1i54U6XA3eNcIesEr5juj7qP3aqD1PUo6xQmZYXVdXIuZ vWFFPkrJytTE3hzrtTOExiI8uHBf4sJAjHsOh0aPM6Zh2aSBqtt3wdLScvXJvdZJ2/x7 xjqnkrXkUW7V98NPZWlrRNHn3evWQbWyT/1YcAH+uQvREK6dJjsfeW3gCuvBx3CT0k1Z E25GVGFyHayPggYsrf7wHpTG+mtrdiyva5DKnIpDtgfA3qwnrxRotSW0zKpz8rIRr92w FNhg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f25-v6si10801467pge.60.2018.05.09.02.41.56; Wed, 09 May 2018 02:42:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934038AbeEIJjo (ORCPT + 99 others); Wed, 9 May 2018 05:39:44 -0400 Received: from mx2.suse.de ([195.135.220.15]:38355 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933758AbeEIJjk (ORCPT ); Wed, 9 May 2018 05:39:40 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 4DF7CADD3; Wed, 9 May 2018 09:39:38 +0000 (UTC) Received: by ds.suse.cz (Postfix, from userid 10065) id 2307CDAD56; Wed, 9 May 2018 11:37:00 +0200 (CEST) Date: Wed, 9 May 2018 11:36:59 +0200 From: David Sterba To: Matthew Wilcox Cc: dsterba@suse.cz, Huaisheng HS1 Ye , Michal Hocko , "akpm@linux-foundation.org" , "linux-mm@kvack.org" , "vbabka@suse.cz" , "mgorman@techsingularity.net" , "pasha.tatashin@oracle.com" , "alexander.levin@verizon.com" , "hannes@cmpxchg.org" , "penguin-kernel@I-love.SAKURA.ne.jp" , "colyli@suse.de" , NingTing Cheng , "linux-kernel@vger.kernel.org" Subject: Re: [External] Re: [PATCH 2/3] include/linux/gfp.h: use unsigned int in gfp_zone Message-ID: <20180509093659.jalprmufpwspya26@twin.jikos.cz> Reply-To: dsterba@suse.cz Mail-Followup-To: dsterba@suse.cz, Matthew Wilcox , Huaisheng HS1 Ye , Michal Hocko , "akpm@linux-foundation.org" , "linux-mm@kvack.org" , "vbabka@suse.cz" , "mgorman@techsingularity.net" , "pasha.tatashin@oracle.com" , "alexander.levin@verizon.com" , "hannes@cmpxchg.org" , "penguin-kernel@I-love.SAKURA.ne.jp" , "colyli@suse.de" , NingTing Cheng , "linux-kernel@vger.kernel.org" References: <20180504133533.GR4535@dhcp22.suse.cz> <20180504154004.GB29829@bombadil.infradead.org> <20180506134814.GB7362@bombadil.infradead.org> <20180506185532.GA13604@bombadil.infradead.org> <20180507184410.GA12361@bombadil.infradead.org> <20180507212500.bdphwfhk55w6vlbb@twin.jikos.cz> <20180508002547.GA16338@bombadil.infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180508002547.GA16338@bombadil.infradead.org> User-Agent: NeoMutt/20180323 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 07, 2018 at 05:25:47PM -0700, Matthew Wilcox wrote: > On Mon, May 07, 2018 at 11:25:01PM +0200, David Sterba wrote: > > On Mon, May 07, 2018 at 11:44:10AM -0700, Matthew Wilcox wrote: > > > But something like btrfs should almost certainly be using ~GFP_ZONEMASK. > > > > Agreed, the direct use of __GFP_DMA32 was added in 3ba7ab220e8918176c6f > > to substitute GFP_NOFS, so the allocation flags are less restrictive but > > still acceptable for allocation from slab. > > > > The requirement from btrfs is to avoid highmem, the 'must be acceptable > > for slab' requirement is more MM internal and should have been hidden > > under some opaque flag mask. There was no strong need for that at the > > time. > > The GFP flags encode a multiple of different requirements. There's > "What can the allocator do to free memory" and "what area of memory > can the allocation come from". btrfs doesn't actually want to > allocate memory from ZONE_MOVABLE or ZONE_DMA either. It's probably never > been called with those particular flags set, but in the spirit of > future-proofing btrfs, perhaps a patch like this is in order? > > ---- >8 ---- > > Subject: btrfs: Allocate extents from ZONE_NORMAL > From: Matthew Wilcox > > If anyone ever passes a GFP_DMA or GFP_MOVABLE allocation flag to > allocate_extent_state, it will try to allocate memory from the wrong zone. > We just want to allocate memory from ZONE_NORMAL, so use GFP_RECLAIM_MASK > to get what we want. Looks good to me. > Signed-off-by: Matthew Wilcox > > diff --git a/fs/btrfs/extent_io.c b/fs/btrfs/extent_io.c > index e99b329002cf..4e4a67b7b29d 100644 > --- a/fs/btrfs/extent_io.c > +++ b/fs/btrfs/extent_io.c > @@ -216,12 +216,7 @@ static struct extent_state *alloc_extent_state(gfp_t mask) > { > struct extent_state *state; > > - /* > - * The given mask might be not appropriate for the slab allocator, > - * drop the unsupported bits > - */ > - mask &= ~(__GFP_DMA32|__GFP_HIGHMEM); I've noticed there's GFP_SLAB_BUG_MASK that's basically open coded here, but this would not filter out the placement flags. > - state = kmem_cache_alloc(extent_state_cache, mask); I'd prefer some comment here, it's not obvious why the mask is used. > + state = kmem_cache_alloc(extent_state_cache, mask & GFP_RECLAIM_MASK); > if (!state) > return state; > state->state = 0;