Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp3349440ybz; Mon, 20 Apr 2020 00:37:10 -0700 (PDT) X-Google-Smtp-Source: APiQypKPVx3vpkBvhwVhXmBgZQSJNORXFTrl+sD0Tn8oOoKkhvZt3YEBOr1Hd5tQsP1sN0uXufSe X-Received: by 2002:aa7:dd14:: with SMTP id i20mr619124edv.225.1587368230419; Mon, 20 Apr 2020 00:37:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587368230; cv=none; d=google.com; s=arc-20160816; b=fBZok3YaK35q8zeFBma7EgHvJZUl+E5Gf5KnzwrwL4PoFdP0EEfueQDAZlNEqGpL9K OmCrwj4ED9EHYOS5mbM7UmgEwwmHz49mReB1TA/eKjYc8b9ySsLcv4e2MdOxKDoI6DdM XrZxsrj78tOgL0oUlFkU8sR2kPxanAWhbgzPmKMy7swa/HkURY78+ng3u+F+jLZjNaPE 8IkJ8dheSE4BhfXEaLrG99JpdlCu+46sZ4o/wvnnQ5RqKBzzsIGGwUHYRTZ7L2J0tlAI vQA/gpg3mctLcHcMJkxBT/G4+D01hrNQzCVZts41uRCAJHzWs3zQbAtUWKf4bw8H4au7 MlHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=J6rJMn+wy517qK6LezauDPAAdzw8pIiAhiJfakvu9RQ=; b=vezmuHz2GNAhSY4dEYjvxkDGILz5yX1ktEwjM2/n7c4AlUqY5B78ve8trG+ZJmsn3e 8pqkj8NZrEJsFU2Zojap6vyxVQ0cPB1ac1KTjMxtc55cIZzSslUkwTQFU5wWhoRdmr3B Le4dA2v1vsKIGffUG5EnPlqURQCTFIWbYkepkq2nfnDoWk8BNHyY+g5nLpt+RFk7ISJ5 qf99Ur15cuKeGHYVY9Ps4kSf631QxhstSdkjxu/mUL2ZesD84+Zk1p0x4YjxKr82lVM4 jUxiNED94m/TSZSVlsa6wmlolMB2cDMU9+CvUyGH4FO2uPMCACO6Xvu72jOsCitOcz6k yXaw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z6si81302edp.440.2020.04.20.00.36.48; Mon, 20 Apr 2020 00:37:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726209AbgDTHel (ORCPT + 99 others); Mon, 20 Apr 2020 03:34:41 -0400 Received: from mail-wr1-f67.google.com ([209.85.221.67]:40206 "EHLO mail-wr1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726061AbgDTHek (ORCPT ); Mon, 20 Apr 2020 03:34:40 -0400 Received: by mail-wr1-f67.google.com with SMTP id k13so9596971wrw.7 for ; Mon, 20 Apr 2020 00:34:37 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=J6rJMn+wy517qK6LezauDPAAdzw8pIiAhiJfakvu9RQ=; b=CqN18lsOv7fQll9IjJqroG+4nX3gGZ9AYlVrG39JeEX1IV9H0BDz545zA3Nhs5zW5d VHcEx283YbXXmoB/MI5EAIY36W+FZw0r05Em74gEAmle8jn4+R4VRkAAfQZDKpLAxfe6 /8V9K+zDv6/6wFvTA2umH+iAxl6VhyWWnU+zfNr9OZTqDry4+fNccbssKpXhOR9MDZQs ejKA3/ntMEmJvKThIdZ1qEgfVdR4ME8LzUQyodxeu9WenSX/N8RVqr65xKn+uLiV0R8R NChEc2YHqNwLOwp3E1DKfSP8rFl+ozBHglfz186hb+BLIlvIXbHyiM8ZrEZV+qyL3why K9aQ== X-Gm-Message-State: AGi0PuaQujGAXOuK1v80CUHcWwkSjYffZWDKRLoqmalB1hsDFiqr6bxj Is7n2+yxd0Q3o9W+o9J0obTecJjQ X-Received: by 2002:adf:ff89:: with SMTP id j9mr17118764wrr.245.1587368076910; Mon, 20 Apr 2020 00:34:36 -0700 (PDT) Received: from localhost (ip-37-188-130-62.eurotel.cz. [37.188.130.62]) by smtp.gmail.com with ESMTPSA id v1sm41809wrv.19.2020.04.20.00.34.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 20 Apr 2020 00:34:36 -0700 (PDT) Date: Mon, 20 Apr 2020 09:34:34 +0200 From: Michal Hocko To: Andrew Morton Cc: David Hildenbrand , linux-kernel@vger.kernel.org, linux-mm@kvack.org, Pavel Tatashin , Pankaj Gupta , Baoquan He , Shile Zhang , Kirill Tkhai , Daniel Jordan , Alexander Duyck , Oscar Salvador Subject: Re: [PATCH v2] mm/page_alloc: fix watchdog soft lockups during set_zone_contiguous() Message-ID: <20200420073434.GE27314@dhcp22.suse.cz> References: <20200416073417.5003-1-david@redhat.com> <20200417151247.0068d5aa3f026ced2289ce31@linux-foundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200417151247.0068d5aa3f026ced2289ce31@linux-foundation.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 17-04-20 15:12:47, Andrew Morton wrote: > On Thu, 16 Apr 2020 09:34:17 +0200 David Hildenbrand wrote: > > > Without CONFIG_PREEMPT, it can happen that we get soft lockups detected, > > e.g., while booting up. > > > > ... > > > > --- a/mm/page_alloc.c > > +++ b/mm/page_alloc.c > > @@ -1607,6 +1607,7 @@ void set_zone_contiguous(struct zone *zone) > > if (!__pageblock_pfn_to_page(block_start_pfn, > > block_end_pfn, zone)) > > return; > > + cond_resched(); > > } > > > > /* We confirm that there is no hole */ > > I added cc:stable to this one. Please let me know if that wasn't a > good idea. Really large memory setups tend to run on distribution kernels so backporting to old kernels doesn't really harm. -- Michal Hocko SUSE Labs