Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1506726ybb; Thu, 2 Apr 2020 02:04:05 -0700 (PDT) X-Google-Smtp-Source: APiQypK8PndLeKUca8r5lmNMgqOvG2Tfn/Jn2SJF46lWvt95QKXLyFwpVWnY+//U3pRECBY7/ar0 X-Received: by 2002:a05:6830:1e38:: with SMTP id t24mr1505558otr.125.1585818244987; Thu, 02 Apr 2020 02:04:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585818244; cv=none; d=google.com; s=arc-20160816; b=DFUIytWpAvleGo/id8unvAJ3YpRXL1CIgZzd4isY/kBTr8myLGXReCmd38qy5B3Yi3 +PM9syA1CWsjUpLTbD0iYtq+Bzw7FG6EDJFaWu+lJxgqnDDiSBIClfHZIQGniPSRO7CH rnN3uC5X399/MwlzgEA7p3wDXY8VMojY+XIyBtTnmC/G6FG3t100y0vQXCrb4FYB3YIX 9hreAzgUbdjL/r030WA96E2pSTg4335aefONAwuU1pc6QSckzQQXNCMDE6DCg36IkKeK 3IBlyHkidmzKB+EF5o0vhBbJl8LtRBcaLqbIx9qb2OR8mr3eB/hcTPd1EbVaAh1lLge5 k4+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=QTITW8f5XYW6rIQ9ZSQ98EK+jrBunn2smnxn8GyI6RY=; b=m7ddz4csTige6eIUdI2jjdLKi/HEO4Mtwefww97RJ5aCxrhKG+ZetCYmIgVDHX12xT j1mv16cBWiXOMF6Dt05+M2F6FZQXZHHf2f9JLf1L6Foc46LdAkyUVdOSNsWvkbLwSeRJ X4psm5/S7d/5tYRwTcD/Q/zH2iL5kcEbmeoG6fbXi+Ald1mqI3d05fv8s4yYFwYZE1K7 hQeXrjGdzigYqZ/iHtlAZCOAMJtyMSdquk3PB75XobGzoh2bcagHaLEmGcTjDf2nv+EF z8pkJGmRFYIjpFQ90lEOXl7/sacBsxuIJ/xCgU6HwfoXkUMYtcws5715RgpibvzSX2Rl Bqrw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@yandex-team.ru header.s=default header.b=Zi3HkAfo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.ru Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j18si2030282otk.166.2020.04.02.02.03.52; Thu, 02 Apr 2020 02:04:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@yandex-team.ru header.s=default header.b=Zi3HkAfo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.ru Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387721AbgDBI3P (ORCPT + 99 others); Thu, 2 Apr 2020 04:29:15 -0400 Received: from forwardcorp1o.mail.yandex.net ([95.108.205.193]:33714 "EHLO forwardcorp1o.mail.yandex.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728612AbgDBI3P (ORCPT ); Thu, 2 Apr 2020 04:29:15 -0400 Received: from mxbackcorp1g.mail.yandex.net (mxbackcorp1g.mail.yandex.net [IPv6:2a02:6b8:0:1402::301]) by forwardcorp1o.mail.yandex.net (Yandex) with ESMTP id ADDEB2E1692; Thu, 2 Apr 2020 11:29:11 +0300 (MSK) Received: from myt5-70c90f7d6d7d.qloud-c.yandex.net (myt5-70c90f7d6d7d.qloud-c.yandex.net [2a02:6b8:c12:3e2c:0:640:70c9:f7d]) by mxbackcorp1g.mail.yandex.net (mxbackcorp/Yandex) with ESMTP id tw43FK2i9g-TANSDuS2; Thu, 02 Apr 2020 11:29:11 +0300 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex-team.ru; s=default; t=1585816151; bh=QTITW8f5XYW6rIQ9ZSQ98EK+jrBunn2smnxn8GyI6RY=; h=In-Reply-To:Message-ID:From:Date:References:To:Subject:Cc; b=Zi3HkAfodPmAC9xNqgsMPIYvqqjFRefkeswjrvTsr3xjttQLTO4wm58368idRJIRV 9sGMKTkEsET6noWlntGL4hgIFJYOTNu1CdfeBL5pj4wPjbvcjNKXivHNMegXKV60TW vuBhPxM7Lj/i40ouNoMZnQFORXChuUXiFiZkD9fo= Authentication-Results: mxbackcorp1g.mail.yandex.net; dkim=pass header.i=@yandex-team.ru Received: from unknown (unknown [2a02:6b8:b080:6404::1:b]) by myt5-70c90f7d6d7d.qloud-c.yandex.net (smtpcorp/Yandex) with ESMTPSA id 83JJbdCInE-T9WKljbT; Thu, 02 Apr 2020 11:29:10 +0300 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client certificate not present) Subject: Re: [PATCH -V2] /proc/PID/smaps: Add PMD migration entry parsing To: Michal Hocko , "Huang, Ying" Cc: Andrew Morton , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Zi Yan , Andrea Arcangeli , "Kirill A . Shutemov" , Vlastimil Babka , Alexey Dobriyan , =?UTF-8?B?Su+/vXLvv71tZSBHbGlzc2U=?= , Yang Shi References: <20200402020031.1611223-1-ying.huang@intel.com> <20200402064437.GC22681@dhcp22.suse.cz> <87zhbufjyc.fsf@yhuang-dev.intel.com> <20200402074411.GH22681@dhcp22.suse.cz> <87v9mifgui.fsf@yhuang-dev.intel.com> <20200402082142.GL22681@dhcp22.suse.cz> From: Konstantin Khlebnikov Message-ID: Date: Thu, 2 Apr 2020 11:29:09 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 In-Reply-To: <20200402082142.GL22681@dhcp22.suse.cz> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-CA Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/04/2020 11.21, Michal Hocko wrote: > On Thu 02-04-20 16:10:29, Huang, Ying wrote: >> Michal Hocko writes: >> >>> On Thu 02-04-20 15:03:23, Huang, Ying wrote: > [...] >>>>> Could you explain why do we need this WARN_ON? I haven't really checked >>>>> the swap support for THP but cannot we have normal swap pmd entries? >>>> >>>> I have some patches to add the swap pmd entry support, but they haven't >>>> been merged yet. >>>> >>>> Similar checks are for all THP migration code paths, so I follow the >>>> same style. >>> >>> I haven't checked other migration code paths but what is the reason to >>> add the warning here? Even if this shouldn't happen, smaps is perfectly >>> fine to ignore that situation, no? >> >> Yes. smaps itself is perfectly fine to ignore it. I think this is used >> to find bugs in other code paths such as THP migration related. > > Please do not add new warnings without a good an strong reasons. As a > matter of fact there are people running with panic_on_warn and each > warning is fatal for them. Please also note that this is a user trigable > path and that requires even more care. > But this should not happen and if it does we'll never know without debug. VM_WARN_ON checks something only if build with CONFIG_DEBUG_VM=y. Anybody who runs debug kernels with panic_on_warn shouldn't expect much stability =)