Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp5038105ybl; Tue, 14 Jan 2020 02:25:21 -0800 (PST) X-Google-Smtp-Source: APXvYqzZQ3AKfbYJERiaCScBZAGxQoJqBCuZt/T0RLEeK4XtJfwwmHiQz1rgnVLczsoZ98NA7LcP X-Received: by 2002:aca:e189:: with SMTP id y131mr15237238oig.111.1578997521330; Tue, 14 Jan 2020 02:25:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578997521; cv=none; d=google.com; s=arc-20160816; b=PhjvJ8u27ntI8peYLDDXsCfwwXIvzBWIb244AWHKoRYmf1HNbhoLXIPy65g5WKZL3b u6BJPX3Da1HWWXCALLimo+qwLFVGrY/Cpr/8keCtHAJMQQ95zblr2R2P+u2Voks5sosD QYE9D/sGgKInnf+/0SgGKAGMef1RyfbM0SNA/gzWcotgMvy9o8gY7Y0l+/yNQAHxvNmi GWptvMUboqvqA8lSdfcjIN6vE7x8R/ExafL/OjmGSCju9IHIUdd5kzPweJWB9YKzvJyU oOX8oRyJPhQ3Z2Snsb5v3eD2dAnBQTzgB37/J5cs3bhUM+R7zoyduFlK3zK1id4l000z R8fw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=5jOuQZKHYkNklMZPTYxpLkADwoXLH/cfvU4griQGUjw=; b=o/C0vP2p9F3J60h1jrkbknIsNxYV0gyR/mYqxl4pCg1wLn85YjDxsksJzuKK/sILLN o8GdRoP8QOcMNMqrknJix2u7J6PM/zy4R9Y62I9CnHS+RseAd6wuAF/9tCRfIEufBCte ATezqetA+R2Cw1ZxTa8Q6dwWYeCnYkXyVz3iCoOI7XygSFbemYPmX5w9sr1PAK8Ul89A QYXE0yRzRa73ZjU+ChD1xFDCe19sh6kn0U9wEHSHqdTodbmm5xPDV2ROAq1liPpG2H+b 81rMnXgabqMJTfSfevY8ljnDGU1uFaFAnWd5bE9iVaTrrByBbBJEHMTWO/FB8lBlWmvB R1Ag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s13si7955785otd.186.2020.01.14.02.25.10; Tue, 14 Jan 2020 02:25:21 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729657AbgANKYD (ORCPT + 99 others); Tue, 14 Jan 2020 05:24:03 -0500 Received: from mx2.suse.de ([195.135.220.15]:39274 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729950AbgANKX4 (ORCPT ); Tue, 14 Jan 2020 05:23:56 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 0D991ACE0; Tue, 14 Jan 2020 10:23:54 +0000 (UTC) Subject: Re: [PATCH] mm/page_alloc: Add a reason for reserved pages in has_unmovable_pages() To: Michal Hocko , Anshuman Khandual Cc: David Hildenbrand , Qian Cai , linux-mm@kvack.org, Andrew Morton , Oscar Salvador , Mel Gorman , Mike Rapoport , Dan Williams , Pavel Tatashin , linux-kernel@vger.kernel.org, Ralph Campbell References: <49fa7dea-00ac-155f-e7b7-eeca206556b5@arm.com> <6A58E80B-7A5F-4CAD-ACF1-89BCCBE4D3B1@lca.pw> <20200114091013.GD19428@dhcp22.suse.cz> From: Vlastimil Babka Message-ID: <1f3ff7fc-2f6b-d8e5-85a5-078f0e1a0daf@suse.cz> Date: Tue, 14 Jan 2020 11:23:52 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.3.1 MIME-Version: 1.0 In-Reply-To: <20200114091013.GD19428@dhcp22.suse.cz> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/14/20 10:10 AM, Michal Hocko wrote: > [Cc Ralph] >> The reason is dump_page() does not print page->flags universally >> and only does so for KSM, Anon and File pages while excluding >> reserved pages at boot. Wondering should not we make printing >> page->flags universal ? > > We used to do that and this caught me as a surprise when looking again. > This is a result of 76a1850e4572 ("mm/debug.c: __dump_page() prints an > extra line") which is a cleanup patch and I suspect this result was not > anticipated. > > The following will do the trick but I cannot really say I like the code > duplication. pr_cont in this case sounds like a much cleaner solution to > me. How about this then? diff --git mm/debug.c mm/debug.c index 0461df1207cb..6a52316af839 100644 --- mm/debug.c +++ mm/debug.c @@ -47,6 +47,7 @@ void __dump_page(struct page *page, const char *reason) struct address_space *mapping; bool page_poisoned = PagePoisoned(page); int mapcount; + char *type = ""; /* * If struct page is poisoned don't access Page*() functions as that @@ -78,9 +79,9 @@ void __dump_page(struct page *page, const char *reason) page, page_ref_count(page), mapcount, page->mapping, page_to_pgoff(page)); if (PageKsm(page)) - pr_warn("ksm flags: %#lx(%pGp)\n", page->flags, &page->flags); + type = "ksm "; else if (PageAnon(page)) - pr_warn("anon flags: %#lx(%pGp)\n", page->flags, &page->flags); + type = "anon "; else if (mapping) { if (mapping->host && mapping->host->i_dentry.first) { struct dentry *dentry; @@ -88,10 +89,11 @@ void __dump_page(struct page *page, const char *reason) pr_warn("%ps name:\"%pd\"\n", mapping->a_ops, dentry); } else pr_warn("%ps\n", mapping->a_ops); - pr_warn("flags: %#lx(%pGp)\n", page->flags, &page->flags); } BUILD_BUG_ON(ARRAY_SIZE(pageflag_names) != __NR_PAGEFLAGS + 1); + pr_warn("%sflags: %#lx(%pGp)\n", type, page->flags, &page->flags); + hex_only: print_hex_dump(KERN_WARNING, "raw: ", DUMP_PREFIX_NONE, 32, sizeof(unsigned long), page,