From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-qt1-f171.google.com (mail-qt1-f171.google.com [209.85.160.171]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E7FEE211A28 for ; Sun, 22 Feb 2026 08:49:01 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.160.171 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771750144; cv=none; b=ulxFfKHjdBRINA+WMsu/xudXaMO0a2uSsHh2YERAtg5hM+GNuZIko7XqQvUvxezh3+YFX4PgLYTfq3cdoRPOBJlSZKKyrgxTkzDOzMZSSc4sjAqSnfDqlAvUxZLdHwdFEmlSEbC8VldOoVYwJH9CYNIZ4/PtCQH4fI2cpCHqPHw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771750144; c=relaxed/simple; bh=am2tCajpeHis0FzaYns/D3UH06rPDuGxOYhl4tv1KTA=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=X6epZBZjc965CMZShWyBTVWChSTHzutx5b2ksfLlcl4ULNgE8V6x0eShkeyN/CRwcS9TDup0O8hn0wAj6c/lP0EzwtClL0m2+VeDb6hlsFwAAog5mVS2NXFLmbLs7yH3OrXLK/jIRy6dGJes2cGEEA00OUYzT8YXhmJoWkrHTLU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=gourry.net; spf=pass smtp.mailfrom=gourry.net; dkim=pass (2048-bit key) header.d=gourry.net header.i=@gourry.net header.b=Q1SzdZhL; arc=none smtp.client-ip=209.85.160.171 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=gourry.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gourry.net Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gourry.net header.i=@gourry.net header.b="Q1SzdZhL" Received: by mail-qt1-f171.google.com with SMTP id d75a77b69052e-506aa685d62so18935381cf.0 for ; Sun, 22 Feb 2026 00:49:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gourry.net; s=google; t=1771750141; x=1772354941; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=itvSMpOqGG7PqHHjVhXbDUHp+0Ke3fJUKOX/SDJBBVY=; b=Q1SzdZhLM/ux64o/x4gR0bftweifmuAPme2/H5333YAqN/4bNhA7tY5CMvNfYoyFp/ /Ja1+gw7QVg9dY9RkWlir+wDx1rJlkW/Z7Rizsx15I+qY1NOK+vPuOqCg4alKzBscm2o NZUiwRx1NTHsGbmW3CEH4pqn7MQYhFpuzlMXPaGB72VMU/zU0GjTSoamG6HxXzu/MoTp YrepX2cJyIh6fOoy4h4BjCyHqbMbRXCFaTbG01VgScef1g/ncnTSE+ZUBPoPGfZVFNvc zhBMVS7di+R6qQ5LwMGrOMqzX3yLwUEVedTfxdGUiBxR6sMszDM7ST+71mhqDVj+etXB /cjw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1771750141; x=1772354941; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=itvSMpOqGG7PqHHjVhXbDUHp+0Ke3fJUKOX/SDJBBVY=; b=dHemf1ybibLK2HtLi7AUzpcVaE1Qboxns74TRC3ftIm1/bh/5WKwU4z9Z2ZlIS4gRH Xo0OA0C42KCXoMrRVTu3W3HsVQfVFasEDguOVsb0AF6CpUC7NFDWVLlkmwAfXLMGT49f uN/XzX4CIC7nX6XFnDMPQH6XFEP9vi3D7fiT5WTg1e/wKXp+kS0KiIONPzf31NvPz62Z t9yNoHiZnYuqcCLGrb/6btipLnIlnp0WpynQLUh3hTdRQFyUZ8F2E2qET3SiWzC14BnN uWtvWcKQ/nFsuoOx1JAWQhn5SdM2VEHn4UpAxvmbdsBDY/JJZUw8+RFFRywqusVxALfW VL2Q== X-Forwarded-Encrypted: i=1; AJvYcCWdHz7vWE7SmdrXO7A9ctV63PrqN5tkcA0FqbkENaWQ3BAZvj3ncvIqD8zi/2tMANu7xLDV7bukRn4CgIj9vj4VYzc=@vger.kernel.org X-Gm-Message-State: AOJu0YySxQ9doicL2SWth9ZeTmZD2v2c9PCmBud/OsMA+uzaF79f8bWa 4ytL8VXtgmCEmnx34rWlUEDoE3gh+HxC0OGXiFtNtIFI/MaZd31fgE+4hSqDtNKlggk= X-Gm-Gg: AZuq6aKi32EqjsI/E7gDRNA9XzLS7NOg/AKri6osZWyoycn6G90R6g6bVbkV5FXmEZ9 7suYTwv4ARaUCuMPVUnZyqtqEV7EUe4IFUrNsMOZgzb1rG9bx/ZnBJOxf04H7In6YnimD+huUmQ GbQFcHGj4Ovi9/mTD4JnP9HYJWV254atR9ZuXOHv/eIkQSuxRlF4WNXNJsWIiC9Unkh6vbTOcn1 joSDp/5zGLwat6TZRlLs6EzjnPrAYAjwHjs4u4r8hZVghzpdGL/tU+W7NZSOCVgaeiMJJKD27MF AFSgDStVZBmgjDl7afZck00iV+t+DEptRj1sKO740Kt9/DGkMOA9tHUdXwaARWYvrB8YXu+cbng xemCcLNZ7RSidnLRNngMjNseBHWOdXzHvFYb3GfftZ4L4aEuTS4Xxn7lXjRaTsZyIPuDBfoGa2O ISJfboyGsopuMuIX7/3Cuylagq3gleKVJpFU15qfubFDwlE2Uw7uFSDzlvN45GG/MB/YIh6On6X iRu2ctfQJ+tc1k= X-Received: by 2002:a05:622a:1355:b0:4ec:f26f:5aea with SMTP id d75a77b69052e-5070bce327dmr60794421cf.68.1771750140761; Sun, 22 Feb 2026 00:49:00 -0800 (PST) Received: from gourry-fedora-PF4VCD3F.lan (pool-96-255-20-138.washdc.ftas.verizon.net. [96.255.20.138]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-5070d53f0fcsm38640631cf.9.2026.02.22.00.48.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 22 Feb 2026 00:48:59 -0800 (PST) From: Gregory Price To: lsf-pc@lists.linux-foundation.org Cc: linux-kernel@vger.kernel.org, linux-cxl@vger.kernel.org, cgroups@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org, damon@lists.linux.dev, kernel-team@meta.com, gregkh@linuxfoundation.org, rafael@kernel.org, dakr@kernel.org, dave@stgolabs.net, jonathan.cameron@huawei.com, dave.jiang@intel.com, alison.schofield@intel.com, vishal.l.verma@intel.com, ira.weiny@intel.com, dan.j.williams@intel.com, longman@redhat.com, akpm@linux-foundation.org, david@kernel.org, lorenzo.stoakes@oracle.com, Liam.Howlett@oracle.com, vbabka@suse.cz, rppt@kernel.org, surenb@google.com, mhocko@suse.com, osalvador@suse.de, ziy@nvidia.com, matthew.brost@intel.com, joshua.hahnjy@gmail.com, rakie.kim@sk.com, byungchul@sk.com, gourry@gourry.net, ying.huang@linux.alibaba.com, apopple@nvidia.com, axelrasmussen@google.com, yuanchu@google.com, weixugc@google.com, yury.norov@gmail.com, linux@rasmusvillemoes.dk, mhiramat@kernel.org, mathieu.desnoyers@efficios.com, tj@kernel.org, hannes@cmpxchg.org, mkoutny@suse.com, jackmanb@google.com, sj@kernel.org, baolin.wang@linux.alibaba.com, npache@redhat.com, ryan.roberts@arm.com, dev.jain@arm.com, baohua@kernel.org, lance.yang@linux.dev, muchun.song@linux.dev, xu.xin16@zte.com.cn, chengming.zhou@linux.dev, jannh@google.com, linmiaohe@huawei.com, nao.horiguchi@gmail.com, pfalcato@suse.de, rientjes@google.com, shakeel.butt@linux.dev, riel@surriel.com, harry.yoo@oracle.com, cl@gentwo.org, roman.gushchin@linux.dev, chrisl@kernel.org, kasong@tencent.com, shikemeng@huaweicloud.com, nphamcs@gmail.com, bhe@redhat.com, zhengqi.arch@bytedance.com, terry.bowman@amd.com Subject: [RFC PATCH v4 02/27] mm,cpuset: gate allocations from N_MEMORY_PRIVATE behind __GFP_PRIVATE Date: Sun, 22 Feb 2026 03:48:17 -0500 Message-ID: <20260222084842.1824063-3-gourry@gourry.net> X-Mailer: git-send-email 2.53.0 In-Reply-To: <20260222084842.1824063-1-gourry@gourry.net> References: <20260222084842.1824063-1-gourry@gourry.net> Precedence: bulk X-Mailing-List: linux-trace-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit N_MEMORY_PRIVATE nodes hold device-managed memory that should not be used for general allocations. Without a gating mechanism, any allocation could land on a private node if it appears in the task's mems_allowed. Introduce __GFP_PRIVATE that explicitly opts in to allocation from N_MEMORY_PRIVATE nodes. Add the GFP_PRIVATE compound mask (__GFP_PRIVATE | __GFP_THISNODE) for callers that explicitly target private nodes to help prevent fallback allocations from DRAM. Update cpuset_current_node_allowed() to filter out N_MEMORY_PRIVATE nodes unless __GFP_PRIVATE is set. In interrupt context, only N_MEMORY nodes are valid. Update cpuset_handle_hotplug() to include N_MEMORY_PRIVATE nodes in the effective mems set, allowing cgroup-level control over private node access. Signed-off-by: Gregory Price --- include/linux/gfp_types.h | 15 +++++++++++++-- include/trace/events/mmflags.h | 4 ++-- kernel/cgroup/cpuset.c | 32 ++++++++++++++++++++++++++++---- 3 files changed, 43 insertions(+), 8 deletions(-) diff --git a/include/linux/gfp_types.h b/include/linux/gfp_types.h index 3de43b12209e..ac375f9a0fc2 100644 --- a/include/linux/gfp_types.h +++ b/include/linux/gfp_types.h @@ -33,7 +33,7 @@ enum { ___GFP_IO_BIT, ___GFP_FS_BIT, ___GFP_ZERO_BIT, - ___GFP_UNUSED_BIT, /* 0x200u unused */ + ___GFP_PRIVATE_BIT, ___GFP_DIRECT_RECLAIM_BIT, ___GFP_KSWAPD_RECLAIM_BIT, ___GFP_WRITE_BIT, @@ -69,7 +69,7 @@ enum { #define ___GFP_IO BIT(___GFP_IO_BIT) #define ___GFP_FS BIT(___GFP_FS_BIT) #define ___GFP_ZERO BIT(___GFP_ZERO_BIT) -/* 0x200u unused */ +#define ___GFP_PRIVATE BIT(___GFP_PRIVATE_BIT) #define ___GFP_DIRECT_RECLAIM BIT(___GFP_DIRECT_RECLAIM_BIT) #define ___GFP_KSWAPD_RECLAIM BIT(___GFP_KSWAPD_RECLAIM_BIT) #define ___GFP_WRITE BIT(___GFP_WRITE_BIT) @@ -139,6 +139,11 @@ enum { * %__GFP_ACCOUNT causes the allocation to be accounted to kmemcg. * * %__GFP_NO_OBJ_EXT causes slab allocation to have no object extension. + * + * %__GFP_PRIVATE allows allocation from N_MEMORY_PRIVATE nodes (e.g., compressed + * memory, accelerator memory). Without this flag, allocations are restricted + * to N_MEMORY nodes only. Used by migration/demotion paths when explicitly + * targeting private nodes. */ #define __GFP_RECLAIMABLE ((__force gfp_t)___GFP_RECLAIMABLE) #define __GFP_WRITE ((__force gfp_t)___GFP_WRITE) @@ -146,6 +151,7 @@ enum { #define __GFP_THISNODE ((__force gfp_t)___GFP_THISNODE) #define __GFP_ACCOUNT ((__force gfp_t)___GFP_ACCOUNT) #define __GFP_NO_OBJ_EXT ((__force gfp_t)___GFP_NO_OBJ_EXT) +#define __GFP_PRIVATE ((__force gfp_t)___GFP_PRIVATE) /** * DOC: Watermark modifiers @@ -367,6 +373,10 @@ enum { * available and will not wake kswapd/kcompactd on failure. The _LIGHT * version does not attempt reclaim/compaction at all and is by default used * in page fault path, while the non-light is used by khugepaged. + * + * %GFP_PRIVATE adds %__GFP_THISNODE by default to prevent any fallback + * allocations to other nodes, given that the caller was already attempting + * to access driver-managed memory explicitly. */ #define GFP_ATOMIC (__GFP_HIGH|__GFP_KSWAPD_RECLAIM) #define GFP_KERNEL (__GFP_RECLAIM | __GFP_IO | __GFP_FS) @@ -382,5 +392,6 @@ enum { #define GFP_TRANSHUGE_LIGHT ((GFP_HIGHUSER_MOVABLE | __GFP_COMP | \ __GFP_NOMEMALLOC | __GFP_NOWARN) & ~__GFP_RECLAIM) #define GFP_TRANSHUGE (GFP_TRANSHUGE_LIGHT | __GFP_DIRECT_RECLAIM) +#define GFP_PRIVATE (__GFP_PRIVATE | __GFP_THISNODE) #endif /* __LINUX_GFP_TYPES_H */ diff --git a/include/trace/events/mmflags.h b/include/trace/events/mmflags.h index a6e5a44c9b42..f042cd848451 100644 --- a/include/trace/events/mmflags.h +++ b/include/trace/events/mmflags.h @@ -37,7 +37,8 @@ TRACE_GFP_EM(HARDWALL) \ TRACE_GFP_EM(THISNODE) \ TRACE_GFP_EM(ACCOUNT) \ - TRACE_GFP_EM(ZEROTAGS) + TRACE_GFP_EM(ZEROTAGS) \ + TRACE_GFP_EM(PRIVATE) #ifdef CONFIG_KASAN_HW_TAGS # define TRACE_GFP_FLAGS_KASAN \ @@ -73,7 +74,6 @@ TRACE_GFP_FLAGS /* Just in case these are ever used */ -TRACE_DEFINE_ENUM(___GFP_UNUSED_BIT); TRACE_DEFINE_ENUM(___GFP_LAST_BIT); #define gfpflag_string(flag) {(__force unsigned long)flag, #flag} diff --git a/kernel/cgroup/cpuset.c b/kernel/cgroup/cpuset.c index 473aa9261e16..1a597f0c7c6c 100644 --- a/kernel/cgroup/cpuset.c +++ b/kernel/cgroup/cpuset.c @@ -444,21 +444,32 @@ static void guarantee_active_cpus(struct task_struct *tsk, } /* - * Return in *pmask the portion of a cpusets's mems_allowed that + * Return in *pmask the portion of a cpuset's mems_allowed that * are online, with memory. If none are online with memory, walk * up the cpuset hierarchy until we find one that does have some * online mems. The top cpuset always has some mems online. * * One way or another, we guarantee to return some non-empty subset - * of node_states[N_MEMORY]. + * of node_states[N_MEMORY]. N_MEMORY_PRIVATE nodes from the + * original cpuset are preserved, but only N_MEMORY nodes are + * pulled from ancestors. * * Call with callback_lock or cpuset_mutex held. */ static void guarantee_online_mems(struct cpuset *cs, nodemask_t *pmask) { + struct cpuset *orig_cs = cs; + int nid; + while (!nodes_intersects(cs->effective_mems, node_states[N_MEMORY])) cs = parent_cs(cs); + nodes_and(*pmask, cs->effective_mems, node_states[N_MEMORY]); + + for_each_node_state(nid, N_MEMORY_PRIVATE) { + if (node_isset(nid, orig_cs->effective_mems)) + node_set(nid, *pmask); + } } /** @@ -4075,7 +4086,9 @@ static void cpuset_handle_hotplug(void) /* fetch the available cpus/mems and find out which changed how */ cpumask_copy(&new_cpus, cpu_active_mask); - new_mems = node_states[N_MEMORY]; + + /* Include N_MEMORY_PRIVATE so cpuset controls access the same way */ + nodes_or(new_mems, node_states[N_MEMORY], node_states[N_MEMORY_PRIVATE]); /* * If subpartitions_cpus is populated, it is likely that the check @@ -4488,10 +4501,21 @@ bool cpuset_node_allowed(struct cgroup *cgroup, int nid) * __alloc_pages() will include all nodes. If the slab allocator * is passed an offline node, it will fall back to the local node. * See kmem_cache_alloc_node(). + * + * + * Private nodes aren't eligible for these allocations, so skip them. + * guarantee_online_mems guaranttes at least one N_MEMORY node is set. */ static int cpuset_spread_node(int *rotor) { - return *rotor = next_node_in(*rotor, current->mems_allowed); + int node; + + do { + node = next_node_in(*rotor, current->mems_allowed); + *rotor = node; + } while (node_state(node, N_MEMORY_PRIVATE)); + + return node; } /** -- 2.53.0