Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp4274369imm; Fri, 18 May 2018 02:15:59 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqSHqqvltp2PmQs4149p1L015D+SxAuE40onkOIH5hVaNut9PhOhMtJ2aSFgGlEeSL9mvgf X-Received: by 2002:a17:902:6e4:: with SMTP id 91-v6mr8665891plh.63.1526634958965; Fri, 18 May 2018 02:15:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526634958; cv=none; d=google.com; s=arc-20160816; b=Qs5ziOq8hc7rwjrDjiPSKvkWqf9BV00PGPWUvf3jpWGvwJKATURqfD9KAulJ83T8iH lElmiFNwJ7tB39NbF7fvJWtDx4K4kbpy2tJR+VNzHS0pN2RCcjPm9833C7ojbS9ESuV/ Bc7axR0LPnIaRS5kRY5fxmoV/nwrKreHrOWciHeS+O7JYhQUUwxDkBn1O3K5mHKo2UGh Aqphe2L/K8WAyt7AM+Do0SqDPiYWGsk+hcciVKqmNst3T8JTDWCwQmCHirMQAqIl/Tfb 5iHsUV7WOyYrkXtIVtI/57bFOb/9Q+d2I8ojDWvkJOnKtHy6U2tqViiA1MQoaBAEemQ7 bzMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=8GVMs9+TLCoKC+VKsvo6bSm+jcy3SHpR4SJujA4FyA8=; b=VLmJSoz/eDwHqQzmrzm0tVHhLbq8N8Bakgq4s2RKdi+T0gP1yhztema7SzmzXK+Yrn 1u/7JAsgQ3QJs/Ori5UbDEAV9nEwQP6+tNTn7m6NFmn+/fxfEe/OTR95cksaa1NPNp5k CrW2yvL6evUPNKDlwmzY/Zrgb9WDNQQipGfGvpVbOwfHtPNo8woCzCl323ey1GoqFyVY aantSEtn6wqhqbpayqOloSPTzvuPas1pCiVYTcv7e1oQe2JM4Yfb+r7gtClyzjUbgUtY O1jV4z6bkVraaYdJewLo3y+PG95aokfN+aOlSEq78ihWFxPUB7Pbm+adf7x7fi65vWyz 12yQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e5-v6si5625737pgs.317.2018.05.18.02.15.44; Fri, 18 May 2018 02:15:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752999AbeERJPG (ORCPT + 99 others); Fri, 18 May 2018 05:15:06 -0400 Received: from mx2.suse.de ([195.135.220.15]:45076 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752948AbeERJPB (ORCPT ); Fri, 18 May 2018 05:15:01 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 5F76FADD2; Fri, 18 May 2018 09:14:59 +0000 (UTC) Subject: Re: [PATCH v2 1/4] mm: change type of free_contig_range(nr_pages) to unsigned long To: Mike Kravetz , linux-mm@kvack.org, linux-kernel@vger.kernel.org, linux-api@vger.kernel.org Cc: Reinette Chatre , Michal Hocko , Christopher Lameter , Guy Shattah , Anshuman Khandual , Michal Nazarewicz , David Nellans , Laura Abbott , Pavel Machek , Dave Hansen , Andrew Morton , Joonsoo Kim References: <20180503232935.22539-1-mike.kravetz@oracle.com> <20180503232935.22539-2-mike.kravetz@oracle.com> From: Vlastimil Babka Message-ID: <87d74ce0-b135-064d-a589-64235e44c388@suse.cz> Date: Fri, 18 May 2018 11:12:54 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <20180503232935.22539-2-mike.kravetz@oracle.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/04/2018 01:29 AM, Mike Kravetz wrote: > free_contig_range() is currently defined as: > void free_contig_range(unsigned long pfn, unsigned nr_pages); > change to, > void free_contig_range(unsigned long pfn, unsigned long nr_pages); > > Some callers are passing a truncated unsigned long today. It is > highly unlikely that these values will overflow an unsigned int. > However, this should be changed to an unsigned long to be consistent > with other page counts. > > Signed-off-by: Mike Kravetz > --- > include/linux/gfp.h | 2 +- > mm/cma.c | 2 +- > mm/hugetlb.c | 2 +- > mm/page_alloc.c | 6 +++--- > 4 files changed, 6 insertions(+), 6 deletions(-) > > diff --git a/include/linux/gfp.h b/include/linux/gfp.h > index 1a4582b44d32..86a0d06463ab 100644 > --- a/include/linux/gfp.h > +++ b/include/linux/gfp.h > @@ -572,7 +572,7 @@ static inline bool pm_suspended_storage(void) > /* The below functions must be run on a range from a single zone. */ > extern int alloc_contig_range(unsigned long start, unsigned long end, > unsigned migratetype, gfp_t gfp_mask); > -extern void free_contig_range(unsigned long pfn, unsigned nr_pages); > +extern void free_contig_range(unsigned long pfn, unsigned long nr_pages); > #endif > > #ifdef CONFIG_CMA > diff --git a/mm/cma.c b/mm/cma.c > index aa40e6c7b042..f473fc2b7cbd 100644 > --- a/mm/cma.c > +++ b/mm/cma.c > @@ -563,7 +563,7 @@ bool cma_release(struct cma *cma, const struct page *pages, unsigned int count) > > VM_BUG_ON(pfn + count > cma->base_pfn + cma->count); > > - free_contig_range(pfn, count); > + free_contig_range(pfn, (unsigned long)count); I guess this cast from uint to ulong doesn't need to be explicit? But instead, cma_release() signature could be also changed to ulong, because some of its callers do pass those? > cma_clear_bitmap(cma, pfn, count); > trace_cma_release(pfn, pages, count); > > diff --git a/mm/hugetlb.c b/mm/hugetlb.c > index 218679138255..c81072ce7510 100644 > --- a/mm/hugetlb.c > +++ b/mm/hugetlb.c > @@ -1055,7 +1055,7 @@ static void destroy_compound_gigantic_page(struct page *page, > > static void free_gigantic_page(struct page *page, unsigned int order) > { > - free_contig_range(page_to_pfn(page), 1 << order); > + free_contig_range(page_to_pfn(page), 1UL << order); > } > > static int __alloc_gigantic_page(unsigned long start_pfn, > diff --git a/mm/page_alloc.c b/mm/page_alloc.c > index 905db9d7962f..0fd5e8e2456e 100644 > --- a/mm/page_alloc.c > +++ b/mm/page_alloc.c > @@ -7937,9 +7937,9 @@ int alloc_contig_range(unsigned long start, unsigned long end, > return ret; > } > > -void free_contig_range(unsigned long pfn, unsigned nr_pages) > +void free_contig_range(unsigned long pfn, unsigned long nr_pages) > { > - unsigned int count = 0; > + unsigned long count = 0; > > for (; nr_pages--; pfn++) { > struct page *page = pfn_to_page(pfn); > @@ -7947,7 +7947,7 @@ void free_contig_range(unsigned long pfn, unsigned nr_pages) > count += page_count(page) != 1; > __free_page(page); > } > - WARN(count != 0, "%d pages are still in use!\n", count); > + WARN(count != 0, "%ld pages are still in use!\n", count); Maybe change to %lu while at it? BTW, this warning can theoretically produce false positives, because page users have to deal with page_count() being incremented by e.g. parallel pfn scanners using get_page_unless_zero(). We also don't detect refcount leaks in general. Should we remove it or change it to VM_WARN if it's still useful for debugging? > } > #endif > >