Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3228466imu; Sat, 24 Nov 2018 00:35:18 -0800 (PST) X-Google-Smtp-Source: AFSGD/XpLtDQQ6ygXByoYoQI7CPk2VkR90MjJukOU2Qg3/dZHpRf1tbT/PSRJw6EARjO5tRgkeBV X-Received: by 2002:a63:8742:: with SMTP id i63mr17005680pge.298.1543048518723; Sat, 24 Nov 2018 00:35:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543048518; cv=none; d=google.com; s=arc-20160816; b=kPXxvDdq5cw52/1c6VGrhzxw/aaCvbYf+b4urEiXjVlL7t+Q52eLuB6ObaIbj+RvUq Kir8Xo40qDagOCRS54KK2oUxn0NFQ7/nrHvTs9IFxDTceyKG47swj/ydqKyPq5EABctY ntY0NcJj+RG5KXudcBsZxa9p/nahH/6RJOHk0LccVMoK+nlgG8MHDM5VkmS1TBdWg4i4 dQH9NP8ClqW2tjOwZ6PyIaBNbD3NggUPuNVKqR8iFQsu6RUivVSrTYvYhJUI0xF66h7h kKikSHhbSuNMayu15e8Xr92qX+R9dEYI6KwTZXBuRdENJPrrD6y45A3sIkTSdYF1ZjZc MDvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=fzh3puIlKLmeXQwstku776TxZDrNtGPCzX0O1MCuR7o=; b=IY0tUsJqMKE0Ky50M/ktnui0wMp16167q2qE2bAGMjg5a/HoIXRayV+F8v5IOOoWUn 6L+KnLdu7CLQJZ1qycRIPku5FkimAQs/uvU+Y1SN6MWrQvW9/YRJU4Fmn9yS6RGUA/dW tLYFaqwtA/AVThqeLKCXSPLrdiqjWQco3g50PgPyrzS/Lq6tfgTyAPUny+eVv+L6Qakx RS/oGWcpu+k2MSekYMA3uSSDFQF4Hu6xFZwJElMz7vrWUDkDRK81DEpRdAC/xiqzAOmo rhd9ZePCuHUG7XtM6obGJpsuSZpRvbZmNSWUzbRC1wzQX3OtABqTMYjIEYsfEykTOmvd VDhg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 14-v6si63005220pfw.217.2018.11.24.00.35.04; Sat, 24 Nov 2018 00:35:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2410037AbeKXAOw (ORCPT + 99 others); Fri, 23 Nov 2018 19:14:52 -0500 Received: from mx2.suse.de ([195.135.220.15]:43454 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2388620AbeKXAOw (ORCPT ); Fri, 23 Nov 2018 19:14:52 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id CABB4AD7D; Fri, 23 Nov 2018 13:30:38 +0000 (UTC) Date: Fri, 23 Nov 2018 14:30:38 +0100 From: Michal Hocko To: Daniel Vetter Cc: Linux Kernel Mailing List , Linux MM , intel-gfx , dri-devel , Andrew Morton , Christian =?iso-8859-1?Q?K=F6nig?= , David Rientjes , Jerome Glisse , Paolo Bonzini , Daniel Vetter Subject: Re: [PATCH 1/3] mm: Check if mmu notifier callbacks are allowed to fail Message-ID: <20181123133038.GQ8625@dhcp22.suse.cz> References: <20181122165106.18238-1-daniel.vetter@ffwll.ch> <20181122165106.18238-2-daniel.vetter@ffwll.ch> <20181123111557.GG8625@dhcp22.suse.cz> <20181123123057.GK4266@phenom.ffwll.local> <20181123124358.GJ8625@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 23-11-18 14:15:11, Daniel Vetter wrote: > On Fri, Nov 23, 2018 at 1:43 PM Michal Hocko wrote: > > On Fri 23-11-18 13:30:57, Daniel Vetter wrote: > > > On Fri, Nov 23, 2018 at 12:15:57PM +0100, Michal Hocko wrote: > > > > On Thu 22-11-18 17:51:04, Daniel Vetter wrote: > > > > > Just a bit of paranoia, since if we start pushing this deep into > > > > > callchains it's hard to spot all places where an mmu notifier > > > > > implementation might fail when it's not allowed to. > > > > > > > > What does WARN give you more than the existing pr_info? Is really > > > > backtrace that interesting? > > > > > > Automated tools have to ignore everything at info level (there's too much > > > of that). I guess I could do something like > > > > > > if (blockable) > > > pr_warn(...) > > > else > > > pr_info(...) > > > > > > WARN() is simply my goto tool for getting something at warning level > > > dumped into dmesg. But I think the pr_warn with the callback function > > > should be enough indeed. > > > > I wouldn't mind s@pr_info@pr_warn@ > > Well that's too much, because then it would misfire in the oom > testcase, where failing is ok (desireble even, we want to avoid > blocking after all). So needs to be a switch (or else we need to > filter it in results, and that's a bit a maintenance headache from a > CI pov). I thought the failure should be rare enough that warning about them can be actually useful. E.g. in the oom case we can live with the failure because we want to release _some_ memory but know about a callback that prevents us to go the full way might be interesting. But I do not really feel strongly about this. I find WARN a bit abuse because the trace is unlikely going to help us much. If you want to make a verbosity depending on the blockable context then I will surely not stand in the way. -- Michal Hocko SUSE Labs