Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp531344imm; Wed, 15 Aug 2018 01:16:50 -0700 (PDT) X-Google-Smtp-Source: AA+uWPwIwD5nzLERgX57HCUvEfmgOdf0K2xYuBghx9QGxZfvu3cVUnhI5HYlGuWCmfjMDPQ+6uNA X-Received: by 2002:a63:9311:: with SMTP id b17-v6mr24207818pge.261.1534321010218; Wed, 15 Aug 2018 01:16:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534321010; cv=none; d=google.com; s=arc-20160816; b=IVAq2/q4TdNT3AvcRWKmaHjdSLU01H5nISo+YKrZrra9pZBjS2V8RM+bAzMa75lBYZ RO6/iMi8pTX6+DMWkJEasnI7njjgWltMwm55HupqURvfTO/wgjPYLHrf+fuB/X0gBDVn k2aOi6UC8SuwJt0XgAL0ic2zCUwFVTscHljpHQxZjFfQm68BtgPNDscHJ9ldaahWvG7i 9KJ7OXIkoZvHvyd3yw76GwiuCfFbD0OwLkcZIjku/hGkpm+cadMukbVv8qftRLcWxrc0 r+fTN4t2l13jizBhv17Vb6ZpFJQ0nrb3eySW2sbIGww1LkeuQku+j42AANDW6s/d2MLd hcfw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=uD6mBmZXRPtq19YtpQKPTP4zl4urSaTxPBijCYzLweQ=; b=RqIEyhHMpcSXef6XL1WO7vfp6IrSXSTUehNJZW89YW/wvGsDYf+tj0T3gvP566Fd4x FHeBzDZvSi6J7PTnnbRkNOMLOILDvh4dBg8vX8cGS/6vvPOP7jnHGSQX0fmAhjdvTRav v3kd8nKGZ6HvDn0tm4UzicUvNMfCpfnpjs8ux6wjK/gXrUq7B/AVCqttUFvCw26wek4Z qxTieJeVdxMf1ljvLB6dvzicDjSqnUkzHpsVkMNLTFHVXBGQ3hAOVmmux06P9KT05fTX rziM/wlvbBfN+nfvHRrmfcg6eS55JHlMZXRvFERtFkgcdqyi5HiR1/9ld820/EQK2Gta Owyg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u6-v6si18461600plr.437.2018.08.15.01.16.34; Wed, 15 Aug 2018 01:16:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728669AbeHOLGy (ORCPT + 99 others); Wed, 15 Aug 2018 07:06:54 -0400 Received: from mx2.suse.de ([195.135.220.15]:60290 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726155AbeHOLGx (ORCPT ); Wed, 15 Aug 2018 07:06:53 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id D45ABADCD; Wed, 15 Aug 2018 08:15:40 +0000 (UTC) Date: Wed, 15 Aug 2018 10:15:39 +0200 From: Michal Hocko To: Mike Rapoport Cc: linux-mm@kvack.org, Jonathan Corbet , Matthew Wilcox , Vlastimil Babka , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH] docs/core-api: add memory allocation guide Message-ID: <20180815081539.GN32645@dhcp22.suse.cz> References: <1534314887-9202-1-git-send-email-rppt@linux.vnet.ibm.com> <20180815063649.GB24091@rapoport-lnx> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180815063649.GB24091@rapoport-lnx> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 15-08-18 09:36:49, Mike Rapoport wrote: > (this time with the subject, sorry for the noise) > > On Wed, Aug 15, 2018 at 09:34:47AM +0300, Mike Rapoport wrote: > > As Vlastimil mentioned at [1], it would be nice to have some guide about > > memory allocation. I've drafted an initial version that tries to summarize > > "best practices" for allocation functions and GFP usage. > > > > [1] https://www.spinics.net/lists/netfilter-devel/msg55542.html > > > > From 8027c0d4b750b8dbd687234feda63305d0d5a057 Mon Sep 17 00:00:00 2001 > > From: Mike Rapoport > > Date: Wed, 15 Aug 2018 09:10:06 +0300 > > Subject: [RFC PATCH] docs/core-api: add memory allocation guide > > > > Signed-off-by: Mike Rapoport > > --- > > Documentation/core-api/gfp_mask-from-fs-io.rst | 2 + > > Documentation/core-api/index.rst | 1 + > > Documentation/core-api/memory-allocation.rst | 117 +++++++++++++++++++++++++ > > Documentation/core-api/mm-api.rst | 2 + > > 4 files changed, 122 insertions(+) > > create mode 100644 Documentation/core-api/memory-allocation.rst > > > > diff --git a/Documentation/core-api/gfp_mask-from-fs-io.rst b/Documentation/core-api/gfp_mask-from-fs-io.rst > > index e0df8f4..e7c32a8 100644 > > --- a/Documentation/core-api/gfp_mask-from-fs-io.rst > > +++ b/Documentation/core-api/gfp_mask-from-fs-io.rst > > @@ -1,3 +1,5 @@ > > +.. _gfp_mask_from_fs_io: > > + > > ================================= > > GFP masks used from FS/IO context > > ================================= > > diff --git a/Documentation/core-api/index.rst b/Documentation/core-api/index.rst > > index cdc2020..8afc0da 100644 > > --- a/Documentation/core-api/index.rst > > +++ b/Documentation/core-api/index.rst > > @@ -27,6 +27,7 @@ Core utilities > > errseq > > printk-formats > > circular-buffers > > + memory-allocation > > mm-api > > gfp_mask-from-fs-io > > timekeeping > > diff --git a/Documentation/core-api/memory-allocation.rst b/Documentation/core-api/memory-allocation.rst > > new file mode 100644 > > index 0000000..b1f2ad5 > > --- /dev/null > > +++ b/Documentation/core-api/memory-allocation.rst > > @@ -0,0 +1,117 @@ > > +======================= > > +Memory Allocation Guide > > +======================= > > + > > +Linux supplies variety of APIs for memory allocation. You can allocate > > +small chunks using `kmalloc` or `kmem_cache_alloc` families, large > > +virtually contiguous areas using `vmalloc` and it's derivatives, or > > +you can directly request pages from the page allocator with > > +`__get_free_pages`. It is also possible to use more specialized I would rather not mention __get_free_pages. alloc_pages is a more generic API and less subtle one. If you want to mention __get_free_pages then please make sure to mention the subtlety (namely that is can allocate only lowmem memory). > > +allocators, for instance `cma_alloc` or `zs_malloc`. > > + > > +Most of the memory allocations APIs use GFP flags to express how that > > +memory should be allocated. The GFP acronym stands for "get free > > +pages", the underlying memory allocation function. > > + > > +Diversity of the allocation APIs combined with the numerous GFP flags > > +makes the question "How should I allocate memory?" not that easy to > > +answer, although very likely you should use > > + > > +:: > > + > > + kzalloc(, GFP_KERNEL); > > + > > +Of course there are cases when other allocation APIs and different GFP > > +flags must be used. > > + > > +Get Free Page flags > > +=================== > > + > > +The GFP flags control the allocators behavior. They tell what memory > > +zones can be used, how hard the allocator should try to find a free > > +memory, whether the memory can be accessed by the userspace etc. The > > +:ref:`Documentation/core-api/mm-api.rst ` provides > > +reference documentation for the GFP flags and their combinations and > > +here we briefly outline their recommended usage: > > + > > + * Most of the times ``GFP_KERNEL`` is what you need. Memory for the > > + kernel data structures, DMAable memory, inode cache, all these and > > + many other allocations types can use ``GFP_KERNEL``. Note, that > > + using ``GFP_KERNEL`` implies ``GFP_RECLAIM``, which means that > > + direct reclaim may be triggered under memory pressure; the calling > > + context must be allowed to sleep. > > + * If the allocation is performed from an atomic context, e.g > > + interrupt handler, use ``GFP_ATOMIC``. GFP_NOWAIT please. GFP_ATOMIC should be only used if accessing memory reserves is justified. E.g. fallback allocation would be too costly. It should be also noted that these allocation are quite likely to fail especially under memory pressure. > > + * Untrusted allocations triggered from userspace should be a subject > > + of kmem accounting and must have ``__GFP_ACCOUNT`` bit set. There > > + is handy ``GFP_KERNEL_ACCOUNT`` shortcut for ``GFP_KERNEL`` > > + allocations that should be accounted. > > + * Userspace allocations should use either of the ``GFP_USER``, > > + ``GFP_HIGHUSER`` and ``GFP_HIGHUSER_MOVABLE`` flags. The longer > > + the flag name the less restrictive it is. > > + > > + The ``GFP_HIGHUSER_MOVABLE`` does not require that allocated > > + memory will be directly accessible by the kernel or the hardware > > + and implies that the data may move. @may move@is movable@ > > + The ``GFP_HIGHUSER`` means that the allocated memory is not > > + movable, but it is not required to be directly accessible by the > > + kernel or the hardware. An example may be a hardware allocation > > + that maps data directly into userspace but has no addressing > > + limitations. > > + > > + The ``GFP_USER`` means that the allocated memory is not movable > > + and it must be directly accessible by the kernel or the > > + hardware. It is typically used by hardware for buffers that are > > + mapped to userspace (e.g. graphics) that hardware still must DMA > > + to. > > + > > +You may notice that quite a few allocations in the existing code > > +specify ``GFP_NOIO`` and ``GFP_NOFS``. Historically, they were used to > > +prevent recursion deadlocks caused by direct memory reclaim calling > > +back into the FS or IO paths and blocking on already held > > +resources. Since 4.12 the preferred way to address this issue is to > > +use new scope APIs described in > > +:ref:`Documentation/core-api/gfp_mask-from-fs-io.rst `. > > + > > +Another legacy GFP flags are ``GFP_DMA`` and ``GFP_DMA32``. They are > > +used to ensure that the allocated memory is accessible by hardware > > +with limited addressing capabilities. So unless you are writing a > > +driver for a device with such restrictions, avoid using these flags. And even with HW with restrictions it is preferable to use dma_alloc* APIs Looks nice otherwise. Thanks! With the above changes feel free to add Acked-by: Michal Hocko -- Michal Hocko SUSE Labs