Received: by 10.213.65.68 with SMTP id h4csp2269709imn; Thu, 5 Apr 2018 11:56:16 -0700 (PDT) X-Google-Smtp-Source: AIpwx49H4wOGoOO/qinAtwZa/cG1asBtkk+Wh/wNZbcZzAup3//Mf6lDt5hEdgYnZspCtvxP2GJK X-Received: by 10.98.58.129 with SMTP id v1mr17986431pfj.231.1522954576056; Thu, 05 Apr 2018 11:56:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522954576; cv=none; d=google.com; s=arc-20160816; b=zT5CrsGMLtbZsyhX4sKBqxjX58mnp1KTpJZKivo5Y/LW8gVSQkfx+QkJ2shQeONhCb IRQV/yBOGEbx7ZlsIk93TTA7HVKDFGfWkBztO907/puCLeP5jpWXL0UgoYspOhhzevG/ uUx+CPidKi5EKv4hrEDB+QZwnhBYvfgzZZWlr9+UUiIIRes7sLJvWxUtXJAsUGk/aGBT kFpIFuCW5qsG6yHhVWKsjgpFQp6oecQxUrTCllaCLgJDCdDPP3srPlMurP3NLuiVqm+G J1b9/7QZpMZBVMMVwbuzMLJvDx2inJJe7vc3yJt2+TXYpm70HVnJEPXmvnjrK7xsrf0q YUZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=775+TCOC/InmyGd61731SiCLM+on71WXi3adsILo13s=; b=W2hwazVhpPL1Qgbx4GIogCC88G2/q3ujNQzasw1uy8Kc5w4birMtfnLSw+EMRkbkgA K0cdiAVKnocrE4Ib0ApDfzRWBiQw1SiJF8nYO19Mvgmm+xYfhyNgZIoYgCcRXwVPy8+X 5UiiJzUcL8GVY3gvT83unPtUA56gdrkd5l9NAjqwXMcYAIw6NhHtVt2gUUQYqi1XDpQ7 fgPZjhNVE/3H0sa5ffcCoiTQoGoH2EfM0NYmvMdo7gFfgheolQrZeBh8JnMRU2TjC7JN PLuKqpFTzafICVTs3tBEmqhdcha/7AaJge4G1/CUIeuDdmD3yG9DW3t8rbJ4Coh9nMbg uNaA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x14-v6si6267086pln.728.2018.04.05.11.56.01; Thu, 05 Apr 2018 11:56:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752164AbeDESyt (ORCPT + 99 others); Thu, 5 Apr 2018 14:54:49 -0400 Received: from mx2.suse.de ([195.135.220.15]:48943 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751415AbeDESyr (ORCPT ); Thu, 5 Apr 2018 14:54:47 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 378F7AD43; Thu, 5 Apr 2018 18:54:46 +0000 (UTC) Date: Thu, 5 Apr 2018 20:54:44 +0200 From: Michal Hocko To: Matthew Wilcox Cc: Joel Fernandes , Steven Rostedt , Zhaoyang Huang , Ingo Molnar , LKML , kernel-patch-test@lists.linaro.org, Andrew Morton , "open list:MEMORY MANAGEMENT" , Vlastimil Babka Subject: Re: [PATCH v1] kernel/trace:check the val against the available mem Message-ID: <20180405185444.GQ6312@dhcp22.suse.cz> References: <20180404101149.08f6f881@gandalf.local.home> <20180404142329.GI6312@dhcp22.suse.cz> <20180404114730.65118279@gandalf.local.home> <20180405025841.GA9301@bombadil.infradead.org> <20180405142258.GA28128@bombadil.infradead.org> <20180405142749.GL6312@dhcp22.suse.cz> <20180405151359.GB28128@bombadil.infradead.org> <20180405153240.GO6312@dhcp22.suse.cz> <20180405161501.GD28128@bombadil.infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180405161501.GD28128@bombadil.infradead.org> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu 05-04-18 09:15:01, Matthew Wilcox wrote: > On Thu, Apr 05, 2018 at 05:32:40PM +0200, Michal Hocko wrote: > > On Thu 05-04-18 08:13:59, Matthew Wilcox wrote: > > > Argh. The comment confused me. OK, now I've read the source and > > > understand that GFP_KERNEL | __GFP_RETRY_MAYFAIL tries exactly as hard > > > as GFP_KERNEL *except* that it won't cause OOM itself. But any other > > > simultaneous GFP_KERNEL allocation without __GFP_RETRY_MAYFAIL will > > > cause an OOM. (And that's why we're having a conversation) > > > > Well, I can udnerstand how this can be confusing. The all confusion > > boils down to the small-never-fails semantic we have. So all reclaim > > modificators (__GFP_NOFAIL, __GFP_RETRY_MAYFAIL, __GFP_NORETRY) only > > modify the _default_ behavior. > > Now that I understand the flag, I'll try to write a more clear > explanation. Good luck with that. It took me several iterations to land with the current state. It is quite hard to be not misleading yet understandable. > > > That's a problem because we have places in the kernel that call > > > kv[zm]alloc(very_large_size, GFP_KERNEL), and that will turn into vmalloc, > > > which will do the exact same thing, only it will trigger OOM all by itself > > > (assuming the largest free chunk of address space in the vmalloc area > > > is larger than the amount of free memory). > > > > well, hardcoded GFP_KERNEL from vmalloc guts is yet another, ehm, > > herritage that you are not so proud of. > > Certainly not, but that's not what I'm concerned about; I'm concerned > about the allocation of the pages, not the allocation of the array > containing the page pointers. Those pages will use the gfp flag you give to vmalloc IIRC. It is page tables that are GFP_KERNEL unconditionally. > > > We could also have a GFP flag that says to only succeed if we're further > > > above the existing watermark than normal. __GFP_LOW (==ALLOC_LOW), > > > if you like. That would give us the desired behaviour of trying all of > > > the reclaim methods that GFP_KERNEL would, but not being able to exhaust > > > all the memory that GFP_KERNEL allocations would take. > > > > Well, I would be really careful with yet another gfp mask. They are so > > incredibly hard to define properly and then people kinda tend to screw > > your best intentions with their usecases ;) > > Failing on low wmark is very close to __GFP_NORETRY or even > > __GFP_NOWAIT, btw. So let's try to not overthink this... > > Oh, indeed. We must be able to clearly communicate to users when they > should use this flag. I have in mind something like this: > > * __GFP_HIGH indicates that the caller is high-priority and that granting > * the request is necessary before the system can make forward progress. > * For example, creating an IO context to clean pages. > * > * __GFP_LOW indicates that the caller is low-priority and that it should > * not be allocated pages that would cause the system to get into an > * out-of-memory situation. For example, allocating multiple individual > * pages in order to satisfy a larger request. So how exactly the low fits into GFP_NOWAIT, GFP_NORETRY and GFP_RETRY_MAFAIL? We _do_have several levels of how hard to try and we have users relying on that. And do not forget about costly vs. non-costly sizes. That being said, we should not hijack this thread more and further enhancements should be discussed separatelly. I am all for making the whole allocation api less obscure but keep in mind that we have really hard historical restrictions. -- Michal Hocko SUSE Labs