Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp509722imm; Thu, 26 Jul 2018 07:26:26 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcjPaf45I3/elvHPBxYk0Sm0+vtdzyiVI6fr6N78+PnPoaA1NUXUcGEK2wDRrcqIsdvceZl X-Received: by 2002:a17:902:e3:: with SMTP id a90-v6mr2204133pla.227.1532615186815; Thu, 26 Jul 2018 07:26:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532615186; cv=none; d=google.com; s=arc-20160816; b=ywStQiAVVtB8SfC/0YSwzeA9EoRMtk+Reegl6K3tjDLOTwCy/infHkO7+Zjc3/c/JY obNJoN4bxN/KoQ85DTX2QHTZGsQn3PEJ0fjzhTs3XDk5eMCs1IPw/VVcbnHTeuJkAaJU PhD+oHxi2pe8JR9+jKiamz18zo0UoUHe2h8xZ7hAEwYVkCwfkJx37dIY2Kmwj0lntOTH YKBpGcyQCWT/ARkbAGhkDJfI/rbFm06b1G0Z73GHBI0l+VrI7z/kH5zoZ/TgkJb6K6o/ DJOGqrIvP1F6Doj96rAO7csfiBXMvhIIGM1fcs6Jknbvgm4vN1PbFTbcJieNoSMaGKGA Mz0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=i6F+gBcI6VMEWpkSM2jFlQEvDa7euyyAst13QENWtUE=; b=YUG23XGB/pKHedGpyGi4Ndr+2VhYBF76spl4rCQVOWNPoAgrhxJa4wfovhdyQ6GP9S eqKWke9H9snD/cIU7+4RmtmQRuA8EcruJ+ONHojKZx2RTghVFbv90bWrYu2VrM7w1SC9 7owgL55renlEm8IIFZO+TvevRM2O+ROIzCrRPkmvKk7PbjzKTyQg8Fww8lKcZmYByEex yjiiLXkt/a36wm/4of3485LplBypnPYGv3/Bnrb0TjDOPbRTBURQU+R25LGVpkSrx0QO dLuzpVm7nESIrhH3WrokDGvs2QRMSaXjd4d70UklLAVZJTTK1Cgfm33Hf5CHq7z4G0cL aGsA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q11-v6si1353860pgb.102.2018.07.26.07.26.11; Thu, 26 Jul 2018 07:26:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730363AbeGZPmN (ORCPT + 99 others); Thu, 26 Jul 2018 11:42:13 -0400 Received: from mx2.suse.de ([195.135.220.15]:33174 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729923AbeGZPmN (ORCPT ); Thu, 26 Jul 2018 11:42:13 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id D0FE4AD26; Thu, 26 Jul 2018 14:25:05 +0000 (UTC) Date: Thu, 26 Jul 2018 16:25:04 +0200 From: Michal Hocko To: "Kirill A. Shutemov" Cc: Dave Hansen , "Kirill A. Shutemov" , Ingo Molnar , x86@kernel.org, Thomas Gleixner , "H. Peter Anvin" , Tom Lendacky , Kai Huang , Jacob Pan , linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: Re: [PATCHv5 05/19] mm/page_alloc: Handle allocation for encrypted memory Message-ID: <20180726142504.GN28386@dhcp22.suse.cz> References: <20180717112029.42378-1-kirill.shutemov@linux.intel.com> <20180717112029.42378-6-kirill.shutemov@linux.intel.com> <95ce19cb-332c-44f5-b3a1-6cfebd870127@intel.com> <20180719082724.4qvfdp6q4kuhxskn@kshutemo-mobl1> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180719082724.4qvfdp6q4kuhxskn@kshutemo-mobl1> User-Agent: Mutt/1.10.0 (2018-05-17) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu 19-07-18 11:27:24, Kirill A. Shutemov wrote: > On Wed, Jul 18, 2018 at 04:03:53PM -0700, Dave Hansen wrote: > > I asked about this before and it still isn't covered in the description: > > You were specifically asked (maybe in person at LSF/MM?) not to modify > > allocator to pass the keyid around. Please specifically mention how > > this design addresses that feedback in the patch description. > > > > You were told, "don't change the core allocator", so I think you just > > added new functions that wrap the core allocator and called them from > > the majority of sites that call into the core allocator. Personally, I > > think that misses the point of the original request. > > > > Do I have a better way? Nope, not really. > > +Michal. > > IIRC, Michal was not happy that I propagate the KeyID to very core > allcoator and we've talked about wrappers around existing APIs as a better > solution. > > Michal, is it correct? Yes that is the case. I haven't seen this series and unlikely will get to it in upcoming days though so I cannot comment much more unfortunately. -- Michal Hocko SUSE Labs