Received: by 10.192.165.156 with SMTP id m28csp1578320imm; Wed, 18 Apr 2018 11:59:21 -0700 (PDT) X-Google-Smtp-Source: AIpwx48IJnMHqIwtnHupF9poZoyYxzMabvCZRYz9n+BXMtX/8thMrwPp4OFp9XfSGmRBDX3j9zYK X-Received: by 10.99.119.78 with SMTP id s75mr2655207pgc.162.1524077961670; Wed, 18 Apr 2018 11:59:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524077961; cv=none; d=google.com; s=arc-20160816; b=X9nfGt8mdj1/u8zYAc/YB98rXTw2+WY2UhoMq9xhfac+4QSTDlb7LcGZ8litnr8Z3p eZ7C/b1SXq/5i4758y+6n9KMEMcjYomB+vfW8Xs0SiRhGffmDTCt2J76uZC+isOe1ZFv huTiOA+SiDj+dTPIhUAAr55MkE3ehxjS7shKnTOilezxAMU3aWMum+BREzJgGNxabn96 OVxaTOpQujsHnU7c+qArDfQTUq6Uz2EfZ3+9rsWDWYUjA3xYBO6Z3CcpoNv3qrvsobzr 6EpoladYjLPGXAHjvYAu4SMFsSa5M+vjLTL1jj7sCz44Zo8LEUjOuOvemG1Olx7XT/r2 uyCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature :arc-authentication-results; bh=nlVt1jAH02PMVug0Rw3PaANzMO8LaMZTZojpKg4GpT0=; b=nd6gTPwBsSsrxUY4XswYLkHJi+E6vue5RJpPZjsuEN8M//gh8TFO5wYPx2xYT630cp KjhRy/IpdKrdo1CvxKk/PrF+BcI0JgHNLXk3ZWoj3t7WrHhjuPX+/4hZ8PSW6Z2jNyDC 5WJBYRiAdVkBgiTQPIJoa3XnUrlkSsFk+SZjxK7EMbaJZpNk7ril0YrUFjy9QZKy/9qZ RMLvkfBLOLd6qkYqq1fDnbCeIlk9KrRjf2vtZDBfMARfryVWS4lkIHmhrbGFI+2Z4L58 dAIlUJhMFYtkheo6Z8qpz6mE20ed9XJM/YeyBq28A8yXsXqhu5a38Rxt7YPOvjQlDhgz Yxhg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Ldpl3zKm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n1-v6si1715884pld.546.2018.04.18.11.59.07; Wed, 18 Apr 2018 11:59:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Ldpl3zKm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752647AbeDRS6D (ORCPT + 99 others); Wed, 18 Apr 2018 14:58:03 -0400 Received: from mail-pl0-f47.google.com ([209.85.160.47]:34034 "EHLO mail-pl0-f47.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751866AbeDRS6C (ORCPT ); Wed, 18 Apr 2018 14:58:02 -0400 Received: by mail-pl0-f47.google.com with SMTP id z12-v6so1666816plo.1 for ; Wed, 18 Apr 2018 11:58:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:in-reply-to:message-id:references :user-agent:mime-version; bh=nlVt1jAH02PMVug0Rw3PaANzMO8LaMZTZojpKg4GpT0=; b=Ldpl3zKmpa1kgoE+zRWgJWIOByQO7Ihl+dFtOTmBphqNIdKmYp7gfMQMgLSmczFisj hsapPhdIhGvVl/0uvReRMr13ad66P2TcbvHMf1bWgGY4mO6HuafewYiB6JpMZzirlA7+ neaZQzUHKp71JCRMIvyEIT9sxROiTzlfY2x6aMSvl2PWRabpWVDLcfGOy6py1NTa3XPI T+kW5l9/cyjucmz8pHRAc2L1hzVl75Yk00IMbnP8ntiYlqN9oPU8BKw9N3brG3ql+zzL izAAIrDvyeEP3CChCtUuYMQb7lflyGZ11xg4S0qcu5uB9xMaUg6SY/wNylif2hPa0Qkj eELw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:in-reply-to:message-id :references:user-agent:mime-version; bh=nlVt1jAH02PMVug0Rw3PaANzMO8LaMZTZojpKg4GpT0=; b=cQ69lpiWpW5aaBIutXWMW9IZ1XoHxxSHdJddhTKFvbYF5cJfZ+eTxgtyC9Tx1cxzvb zn3uYeehQyB170GPndwxqmiMUYRuQq6Yr7FJ/tj0L5jObvUE7dh1UxIuiCLZ8iGWXUT7 ziKbsbSIOvmJwDHR4w6sTO/L4mgJzr3eEhZyCTAXz5PBCvouCEwbmyEPm3HxAoOsgzBK r9DOE6+fRkUClUNq0SZruiJLm2O0YaaKXdo5xxFMh8l1d6lpOm74v1Z59cNX9xPT/3Z+ 3cZv9OuC6hlDamcQNdbEUpf8E7pWVRrkuT75JgDi18kxFfPvuR5ldmONAbuWkX9vD+QI i/OQ== X-Gm-Message-State: ALQs6tBBva+V4xPkIswU5StKO7X8S/r+eQ+I39uqUCl4IcBPut1ghRo0 LKJ+mShc5RSjricfHEXD1v3V6w== X-Received: by 2002:a17:902:9890:: with SMTP id s16-v6mr3162494plp.132.1524077881692; Wed, 18 Apr 2018 11:58:01 -0700 (PDT) Received: from [2620:15c:17:3:3a5:23a7:5e32:4598] ([2620:15c:17:3:3a5:23a7:5e32:4598]) by smtp.gmail.com with ESMTPSA id l129sm2961223pgl.89.2018.04.18.11.58.00 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 18 Apr 2018 11:58:01 -0700 (PDT) Date: Wed, 18 Apr 2018 11:58:00 -0700 (PDT) From: David Rientjes X-X-Sender: rientjes@chino.kir.corp.google.com To: Michal Hocko cc: Minchan Kim , Andrew Morton , LKML , linux-mm , Johannes Weiner , Vladimir Davydov Subject: Re: [PATCH] mm:memcg: add __GFP_NOWARN in __memcg_schedule_kmem_cache_create In-Reply-To: <20180418132715.GD17484@dhcp22.suse.cz> Message-ID: References: <20180418022912.248417-1-minchan@kernel.org> <20180418072002.GN17484@dhcp22.suse.cz> <20180418074117.GA210164@rodete-desktop-imager.corp.google.com> <20180418075437.GP17484@dhcp22.suse.cz> <20180418132328.GB210164@rodete-desktop-imager.corp.google.com> <20180418132715.GD17484@dhcp22.suse.cz> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 18 Apr 2018, Michal Hocko wrote: > > Okay, no problem. However, I don't feel we need ratelimit at this moment. > > We can do when we got real report. Let's add just one line warning. > > However, I have no talent to write a poem to express with one line. > > Could you help me? > > What about > pr_info("Failed to create memcg slab cache. Report if you see floods of these\n"); > Um, there's nothing actionable here for the user. Even if the message directed them to a specific email address, what would you ask the user for in response if they show a kernel log with 100 of these? Probably ask them to use sysrq at the time it happens to get meminfo. But any user initiated sysrq is going to reveal very different state of memory compared to when the kmalloc() actually failed. If this really needs a warning, I think it only needs to be done once and reveal the state of memory similar to how slub emits oom warnings. But as the changelog indicates, the system is oom and we couldn't reclaim. We can expect this happens a lot on systems with memory pressure. What is the warning revealing that would be actionable?