Received: by 2002:ac0:8c9a:0:0:0:0:0 with SMTP id r26csp3545379ima; Mon, 4 Feb 2019 00:48:07 -0800 (PST) X-Google-Smtp-Source: ALg8bN6IRAvi5cD9NVST/cN//Rw/UpVSmOGswmSfGtR+uYenCvSGdykgTOxuJUZtOjHKvL0l22vm X-Received: by 2002:a62:b9a:: with SMTP id 26mr50630644pfl.196.1549270087657; Mon, 04 Feb 2019 00:48:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549270087; cv=none; d=google.com; s=arc-20160816; b=pGN65ZyDLWHkPCd25w7AviuzHzqf/uyPf5xuGmzDyc/6lc84LiU4Y8pR7zZuVtV74/ WHqXHzPi3RJb3FT9wViptsZd2/wL/9KmxP9zLKBwgA0gPTzOmorP7T9fNVLPcyQGkFI4 kIjaXpsKaqt5BqW6h1txlVVgEIoiKF7Hr6JHc7fbUIUq4n9n3cSTF26yyKWV+w5yARy6 oWVp79vAwLDL0+ETZrducY+Ysfj7XIrnS1Dmhzzcl1RRObYhpGCC8/vaXkwLPdpYrRX7 HywOrGpohdlc5Lj7eW+dX2E6dd9jhFhBZ9r5C5XdlusuS96T2ljmSocipAcEcY/ttdxo RoHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from; bh=S9sgKyAfuf9sT095sqV9OP+nfR8i9qRr5YQ+UXN6KEc=; b=fSywfBn3uMr02akrZysMNG+jK79OjSAckYY/3l/Vj0xtvl8aVrerWBe+9by9CfHlZV g2ln7iNKgO5E5fzAn2OmNqsZ0tGnVX5Z9rpKYFFkT1YD/jXRcqmNtElOwNWsyXEsJt7e vyFMtQpPMthVZUwYUieLClObR7wqjdMGQuCXqI5G4gTlSeJdpCeIVsNPnzCYPKkz6Y/s ihz/QTipXRsw0m2ZFmpxK+Zga6JcYOoLlyBvCVSpPpUY2OkQEFZEc4h1d5pG1xserKMt J6/c81j9q9gDAWZAZ5iEMerV39zyBunhn9oK05KKVyIWEQvDa/7fTbJNlSXVEEpAHRmz aipw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c31si14639984pgc.465.2019.02.04.00.47.52; Mon, 04 Feb 2019 00:48:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728210AbfBDIpV (ORCPT + 99 others); Mon, 4 Feb 2019 03:45:21 -0500 Received: from ozlabs.org ([203.11.71.1]:39373 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726242AbfBDIpV (ORCPT ); Mon, 4 Feb 2019 03:45:21 -0500 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPSA id 43tLrG3rCyz9s4Z; Mon, 4 Feb 2019 19:45:18 +1100 (AEDT) From: Michael Ellerman To: Mike Rapoport Cc: linux-mm@kvack.org, Andrew Morton , linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Subject: Re: [PATCH v2 10/21] memblock: refactor internal allocation functions In-Reply-To: <20190203113915.GC8620@rapoport-lnx> References: <1548057848-15136-1-git-send-email-rppt@linux.ibm.com> <1548057848-15136-11-git-send-email-rppt@linux.ibm.com> <87ftt5nrcn.fsf@concordia.ellerman.id.au> <20190203113915.GC8620@rapoport-lnx> Date: Mon, 04 Feb 2019 19:45:17 +1100 Message-ID: <878sywndr6.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Mike Rapoport writes: > On Sun, Feb 03, 2019 at 08:39:20PM +1100, Michael Ellerman wrote: >> Mike Rapoport writes: >> > Currently, memblock has several internal functions with overlapping >> > functionality. They all call memblock_find_in_range_node() to find free >> > memory and then reserve the allocated range and mark it with kmemleak. >> > However, there is difference in the allocation constraints and in fallback >> > strategies. ... >> >> This is causing problems on some of my machines. ... >> >> On some of my other systems it does that, and then panics because it >> can't allocate anything at all: >> >> [ 0.000000] numa: NODE_DATA [mem 0x7ffcaee80-0x7ffcb3fff] >> [ 0.000000] numa: NODE_DATA [mem 0x7ffc99d00-0x7ffc9ee7f] >> [ 0.000000] numa: NODE_DATA(1) on node 0 >> [ 0.000000] Kernel panic - not syncing: Cannot allocate 20864 bytes for node 16 data >> [ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 5.0.0-rc4-gccN-next-20190201-gdc4c899 #1 >> [ 0.000000] Call Trace: >> [ 0.000000] [c0000000011cfca0] [c000000000c11044] dump_stack+0xe8/0x164 (unreliable) >> [ 0.000000] [c0000000011cfcf0] [c0000000000fdd6c] panic+0x17c/0x3e0 >> [ 0.000000] [c0000000011cfd90] [c000000000f61bc8] initmem_init+0x128/0x260 >> [ 0.000000] [c0000000011cfe60] [c000000000f57940] setup_arch+0x398/0x418 >> [ 0.000000] [c0000000011cfee0] [c000000000f50a94] start_kernel+0xa0/0x684 >> [ 0.000000] [c0000000011cff90] [c00000000000af70] start_here_common+0x1c/0x52c >> [ 0.000000] Rebooting in 180 seconds.. >> >> >> So there's something going wrong there, I haven't had time to dig into >> it though (Sunday night here). > > Yeah, I've misplaced 'nid' and 'MEMBLOCK_ALLOC_ACCESSIBLE' in > memblock_phys_alloc_try_nid() :( > > Can you please check if the below patch fixes the issue on your systems? Yes it does, thanks. Tested-by: Michael Ellerman cheers > From 5875b7440e985ce551e6da3cb28aa8e9af697e10 Mon Sep 17 00:00:00 2001 > From: Mike Rapoport > Date: Sun, 3 Feb 2019 13:35:42 +0200 > Subject: [PATCH] memblock: fix parameter order in > memblock_phys_alloc_try_nid() > > The refactoring of internal memblock allocation functions used wrong order > of parameters in memblock_alloc_range_nid() call from > memblock_phys_alloc_try_nid(). > Fix it. > > Signed-off-by: Mike Rapoport > --- > mm/memblock.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/mm/memblock.c b/mm/memblock.c > index e047933..0151a5b 100644 > --- a/mm/memblock.c > +++ b/mm/memblock.c > @@ -1402,8 +1402,8 @@ phys_addr_t __init memblock_phys_alloc_range(phys_addr_t size, > > phys_addr_t __init memblock_phys_alloc_try_nid(phys_addr_t size, phys_addr_t align, int nid) > { > - return memblock_alloc_range_nid(size, align, 0, nid, > - MEMBLOCK_ALLOC_ACCESSIBLE); > + return memblock_alloc_range_nid(size, align, 0, > + MEMBLOCK_ALLOC_ACCESSIBLE, nid); > } > > /** > -- > 2.7.4 > > > -- > Sincerely yours, > Mike.