Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp5015229imm; Tue, 19 Jun 2018 03:44:08 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIm/DX4ZB3Pb6F9gsWZT1u4RWz0v/nykVtFEHgbVYvuD1j54sqHZD1Uw9PMVBr99OVfml6G X-Received: by 2002:a17:902:7891:: with SMTP id q17-v6mr18626574pll.186.1529405048915; Tue, 19 Jun 2018 03:44:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529405048; cv=none; d=google.com; s=arc-20160816; b=M9mh4uM3fhM3Hnnvzgs0VUv6zt39LNITS3WzS6LRWj6AVhYvnN/Ue/48yuVFkKbXG+ yRKxg5EgmtplfwXHWALrpHDAsQN3r1SYFEpx+0thhkeqcriTO193oDBJU7cXMqG60txm A/Tck1ivu49Zh9S3WTCSm0dQR8tdsw5iVuUGttmdQ1JpvSzQ6fwdIqEQV25kuijj+POh O9AofLOcu89m7llb/BJJ2xVgPe167vLGT6oTjC9QoiYOsNR02MGVcqqn1TN7gQj1tgWy ptyDrGn3m+K7ZLJYrpG7/CtSY7ikEP3vq316Uik1ukWcvDxHM+6hZdK3qHSdXRyAPy5T D9DQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=4bHJBMrJUUl5gOKpmKz8X8rO/BvkhSH531fnoEZVqBk=; b=DXmPC+pYujxYeyJ73TLw2XAg7ruXbsUArq6M3DDM4uBAmBRX9IU9+5ruejFRyDevin vdAcQJ+PWkkIbGS6e1QVfW2quMzeUGx+9o43xbKQ71UY/EoJ4QtV12pnnDH8YxPvprlV eP7XmnonoSwotjE8U73iU0Dxrj/KZhRgGp5cIW07TDzjntaFqFm244UhIKhcC6Vqt1aO DwvNXkWzpzBo1+uqSzY59/e9pNZFjq+2s1ZKuwqHJcvwylgE5yGuPqIyPtKn7MC6uR1H 6Jt0322KxKTHZvqxKlJUbrARLcr1ap/bQ4cUOWi2iFF3X5FV9/93Ib6Pn2zdAtaq7Epg Ar+w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k191-v6si14191242pgd.19.2018.06.19.03.43.54; Tue, 19 Jun 2018 03:44:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966124AbeFSKnR (ORCPT + 99 others); Tue, 19 Jun 2018 06:43:17 -0400 Received: from mx2.suse.de ([195.135.220.15]:54195 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965187AbeFSKnO (ORCPT ); Tue, 19 Jun 2018 06:43:14 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext-too.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 9E609ABF4; Tue, 19 Jun 2018 10:43:12 +0000 (UTC) Date: Tue, 19 Jun 2018 12:43:12 +0200 From: Michal Hocko To: Mikulas Patocka Cc: jing xia , Mike Snitzer , agk@redhat.com, dm-devel@redhat.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: Re: dm bufio: Reduce dm_bufio_lock contention Message-ID: <20180619104312.GD13685@dhcp22.suse.cz> References: <20180614073153.GB9371@dhcp22.suse.cz> <20180615073201.GB24039@dhcp22.suse.cz> <20180615115547.GH24039@dhcp22.suse.cz> <20180615130925.GI24039@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.5 (2018-04-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 18-06-18 18:11:26, Mikulas Patocka wrote: [...] > I grepped the kernel for __GFP_NORETRY and triaged them. I found 16 cases > without a fallback - those are bugs that make various functions randomly > return -ENOMEM. Well, maybe those are just optimistic attempts to allocate memory and have a fallback somewhere else. So I would be careful calling them outright bugs. But maybe you are right. > Most of the callers provide callback. > > There is another strange flag - __GFP_RETRY_MAYFAIL - it provides two > different functions - if the allocation is larger than > PAGE_ALLOC_COSTLY_ORDER, it retries the allocation as if it were smaller. > If the allocations is smaller than PAGE_ALLOC_COSTLY_ORDER, > __GFP_RETRY_MAYFAIL will avoid the oom killer (larger order allocations > don't trigger the oom killer at all). Well, the primary purpose of this flag is to provide a consistent failure behavior for all requests regardless of the size. > So, perhaps __GFP_RETRY_MAYFAIL could be used instead of __GFP_NORETRY in > the cases where the caller wants to avoid trigerring the oom killer (the > problem is that __GFP_NORETRY causes random failure even in no-oom > situations but __GFP_RETRY_MAYFAIL doesn't). myabe yes. > So my suggestion is - fix these obvious bugs when someone allocates memory > with __GFP_NORETRY without any fallback - and then, __GFP_NORETRY could be > just changed to return NULL instead of sleeping. No real objection to fixing wrong __GFP_NORETRY usage. But __GFP_NORETRY can sleep. Nothing will really change in that regards. It does a reclaim and that _might_ sleep. But seriously, isn't the best way around the throttling issue to use PF_LESS_THROTTLE? -- Michal Hocko SUSE Labs