Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp2244398ima; Mon, 22 Oct 2018 06:47:40 -0700 (PDT) X-Google-Smtp-Source: ACcGV632BPXtTlNyl8+i93yXkSRo0G6JMI2cxPqPHf9BVv3YSDJhDfrX2Rr2exGsnclS/BsvkGBO X-Received: by 2002:a63:db04:: with SMTP id e4-v6mr42908074pgg.280.1540216060638; Mon, 22 Oct 2018 06:47:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540216060; cv=none; d=google.com; s=arc-20160816; b=liP35s66fo8RqgYyE3eY2/ko8EgrB+Nti5MY7JAEEvU5K6bl/cpgoYO7OGZCzU592t vDC+x5i1N4GTQjWL5ML7xa/QUOb1HLqB9wXM4Hsj0yvlFruLtu51yiW5i7B3Zdq0nof2 iuymkBsp3NWemYbNeH0B/PJ1ZcvHY/X7gW894ggz3VqqCaaJSClnFQcshkOJPtcQhWb0 CjOvmHGCak/NC7A0+fQK0Ss/pj/JU6EpXXtrmVigCEDx4aRmYSxnc8fNWrCBKyF2e3vV hrPjjIqGTZCK21BpbwFG1zvojPrzLnWyK7WwucKhv2cbJ+fZ20iZpizGYkuYmDxRVqUS G8mw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=7xlFJBzPKJuYJ8roKHXLktWXJpE95IzCs0MBuspY6/I=; b=fIBeTyBY7aFMxmBRsCWQzIRtVm62JFcJ5rySo8gC9wqX87X2YAGd2ThOkM/Y5g0zSe 8Qlnq42X/nPxMcVgRoclfWjBFHzRMBACC45AqycFSkxwdF7BDsvvvJySGW+ri4NCFB8R Q3OEq0qrEL69JnEDfMLwqERC+9mRUBCK583jOAzPH+L4D2VZhZnzpmf11ugoihvw5H6U AcbcDjcDFyCsyaBfVu6s+UCerm8LCb3ilek/yUOKB5NkOvMYEFoo1ExW5TT4f4IXDANY BHxhMLzSvmuQqip8HWvSYc/BGOc01eeXTPLqXww0NZXVhu7GgERfPCehm11gKdyNb7r+ k7kQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g7-v6si7155867pll.160.2018.10.22.06.47.24; Mon, 22 Oct 2018 06:47:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728161AbeJVWFi (ORCPT + 99 others); Mon, 22 Oct 2018 18:05:38 -0400 Received: from mx2.suse.de ([195.135.220.15]:49938 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727820AbeJVWFi (ORCPT ); Mon, 22 Oct 2018 18:05:38 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 0272FAE8B; Mon, 22 Oct 2018 13:46:57 +0000 (UTC) Date: Mon, 22 Oct 2018 15:46:57 +0200 From: Michal Hocko To: Vlastimil Babka Cc: "Kirill A. Shutemov" , Andrew Morton , Mel Gorman , David Rientjes , Andrea Argangeli , Zi Yan , Stefan Priebe - Profihost AG , linux-mm@kvack.org, LKML Subject: Re: [PATCH 2/2] mm, thp: consolidate THP gfp handling into alloc_hugepage_direct_gfpmask Message-ID: <20181022134657.GG18839@dhcp22.suse.cz> References: <20180925120326.24392-1-mhocko@kernel.org> <20180925120326.24392-3-mhocko@kernel.org> <20180926133039.y7o5x4nafovxzh2s@kshutemo-mobl1> <20180926141708.GX6278@dhcp22.suse.cz> <20180926142227.GZ6278@dhcp22.suse.cz> <26cb01ff-a094-79f4-7ceb-291e5e053c58@suse.cz> <20181022133058.GE18839@dhcp22.suse.cz> <18476b0b-7300-f340-5845-9de0a019c65c@suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <18476b0b-7300-f340-5845-9de0a019c65c@suse.cz> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 22-10-18 15:35:24, Vlastimil Babka wrote: > On 10/22/18 3:30 PM, Michal Hocko wrote: > > On Mon 22-10-18 15:15:38, Vlastimil Babka wrote: > >>> Forgot to add. One notable exception would be that the previous code > >>> would allow to hit > >>> WARN_ON_ONCE(policy->mode == MPOL_BIND && (gfp & __GFP_THISNODE)); > >>> in policy_node if the requested node (e.g. cpu local one) was outside of > >>> the mbind nodemask. This is not possible now. We haven't heard about any > >>> such warning yet so it is unlikely that it happens though. > >> > >> I don't think the previous code could hit the warning, as the hugepage > >> path that would add __GFP_THISNODE didn't call policy_node() (containing > >> the warning) at all. IIRC early of your patch did hit the warning > >> though, which is why you added the MPOL_BIND policy check. > > > > Are you sure? What prevents node_isset(node, policy_nodemask()) == F and > > fallback to the !huge allocation path? > > That can indeed happen, but then the code also skipped the "gfp |= > __GFP_THISNODE" part, right? So the warning wouldn't trigger. I thought I have crawled all the code paths back then but maybe there were some phantom ones... If you are sure about then we can stick with the original changelog. -- Michal Hocko SUSE Labs