Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp698790yba; Wed, 3 Apr 2019 17:58:57 -0700 (PDT) X-Google-Smtp-Source: APXvYqxPniO+FIbxQx7tCzqEOjRR7CS5gnP+YprFohzGJME+FetEDO4ezSFNygGZdFdEqIoy0Uqs X-Received: by 2002:a17:902:2947:: with SMTP id g65mr3173124plb.258.1554339536987; Wed, 03 Apr 2019 17:58:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554339536; cv=none; d=google.com; s=arc-20160816; b=AJacXua+H4+VsohmYinh1wxF9C+k26xzw54fCLJ0XlwKpKTqEMsNOUlRuWupKmiZcJ 4u3ggekYGRikiB3ly7tMIA7CA8lUpj/oT9rdb9x8eRAnnu6WfrsPWYSH5n3JBgGAFxh7 +m++Uko8lWFEL/6Mi77I0tvL9inK9lJNez7arDOpMlsf+Zu7f2MKQqyUDEetO6nWpBvL YLl6fOxkNPnlBgND4aTokCpzF3zYMtwVqZQmGhehkeqbVkmrGNZWSLp5vV889f2Nf6uk 4nyPz48vhVGJdwyrnC+q4s7q0Wf0hjW3OsdeY0Puxn1unzbwjBE6jNGDsGFPSswYPwND Oyrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=N9HCmrm8VY61caTtmpBOWPl6XeIKwin31jSQm9heKkE=; b=SaAm6rDqkHHQ+4BW8ioPWAMifEjjRxFYVk4fYbeQzPC8X0aUd+qc3AjeqcUM1JF0K7 WyLuQ7iSmgf5jDfI1jhFYjd8pDy+GZaMdcpgt8arRk5/ts8vTrOXuItsmIdIwi/Qr1sQ Azx5uDnoVoPqIm6jeBm3mxlF9vzSj8YVWiLooWdN2AiBjUHC1xREtZc8rvzvxlwfGKF8 +M2by3GwLZx4v0smSz2EcJFIKYNFjYW6KgKcOT6Tq8DZNGxZp7nGkByZTjNnkyBxZ13k 0zRjCSKiv4xxYSHA1YMUG5MAR+wxAdj8s8+PpCog0SexgIUJqJiNTN6blmqO5sTEg3Cj CPtw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YYg9X80s; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w3si14987183pfw.94.2019.04.03.17.58.41; Wed, 03 Apr 2019 17:58:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YYg9X80s; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726499AbfDDA5v (ORCPT + 99 others); Wed, 3 Apr 2019 20:57:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:55684 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726099AbfDDA5v (ORCPT ); Wed, 3 Apr 2019 20:57:51 -0400 Received: from localhost (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F278C2082E; Thu, 4 Apr 2019 00:57:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554339470; bh=mJwodE2gRa2C3WW5YdRbgfUkn8szJ9u1XhmMgYBgYBE=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=YYg9X80sINpVkIevZK5YRlzuwm0+NB1xTF+vpBpkMQnI4BlXUVa3ItjY0O9e4GYm6 t6Q7tRM3rgDP7r6EYRrh/FJ4mrSr1avZZkifdEoeXcKMQxMSwbznEe3lQd/hjJuUy7 2dByCQhDwXcwg4uZVBI9YgDUAM9WHinBax6BHAU8= Date: Wed, 3 Apr 2019 20:57:49 -0400 From: Sasha Levin To: Mike Rapoport Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Catalin Marinas , Christophe Leroy , Christoph Hellwig , "David S. Miller" , Dennis Zhou , Geert Uytterhoeven , Greentime Hu , Greg Kroah-Hartman , Guan Xuetao , Guo Ren , Guo Ren , Heiko Carstens , Juergen Gross , Mark Salter , Matt Turner , Max Filippov , Michal Simek , Paul Burton , Petr Mladek , Richard Weinberger , Rich Felker , Rob Herring , Rob Herring , Russell King , Stafford Horne , Tony Luck , Vineet Gupta , Yoshinori Sato , Andrew Morton , Linus Torvalds , linuxppc-dev@lists.ozlabs.org, linux-mm@kvack.org Subject: Re: [PATCH AUTOSEL 5.0 015/262] memblock: memblock_phys_alloc_try_nid(): don't panic Message-ID: <20190404005748.GJ16241@sasha-vm> References: <20190327180158.10245-1-sashal@kernel.org> <20190327180158.10245-15-sashal@kernel.org> <20190328055720.GB14864@rapoport-lnx> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20190328055720.GB14864@rapoport-lnx> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Mar 28, 2019 at 07:57:21AM +0200, Mike Rapoport wrote: >Hi, > >On Wed, Mar 27, 2019 at 01:57:50PM -0400, Sasha Levin wrote: >> From: Mike Rapoport >> >> [ Upstream commit 337555744e6e39dd1d87698c6084dd88a606d60a ] >> >> The memblock_phys_alloc_try_nid() function tries to allocate memory from >> the requested node and then falls back to allocation from any node in >> the system. The memblock_alloc_base() fallback used by this function >> panics if the allocation fails. >> >> Replace the memblock_alloc_base() fallback with the direct call to >> memblock_alloc_range_nid() and update the memblock_phys_alloc_try_nid() >> callers to check the returned value and panic in case of error. > >This is a part of memblock refactoring, I don't think it should be applied >to -stable. Dropped, thanks! -- Thanks, Sasha