Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp4507134ybi; Mon, 15 Jul 2019 09:59:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqwJpMKADBQy0WvPai/Q3mkucTolgB8hpDdsggZt36jB+8CVcpjIo7OOvd04w/1cwMEU7tR3 X-Received: by 2002:a17:902:2a68:: with SMTP id i95mr30032282plb.167.1563209991323; Mon, 15 Jul 2019 09:59:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563209991; cv=none; d=google.com; s=arc-20160816; b=BQJ+v5lvqGS6DU1SxeJsmM8r++vPToIWQ+K+TULPwWDsMWGMgOOnmZaHA0JNW9F6ob ZvgJt+bOz/0Fjgu2+l1KUg+P/nqdoYAnVpH83JX4kMHSZYypeOzXWZ57n/0f5gFjf0iP q0h/+ucLdOImqitXXnFXX/raSJQNCtL4dCA+J6ESjnuPumiNxqainWyLmAkYsqwaH4to iuGOfs25c+1kCaVYYA2Syk/1wAKDiuyn55ptlWF3NBaA5TBXs8rFSlXbhS40qDlYHojm dwL7h7VhhaUA0Fu/zqo0Qs2GY9BdVyKB6eTAIzjZn/hK3nYbV9ePatoMpVsoYTIs958O 79xw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=ULXV39pNHGikizkxwRCBtvYSHzgqvtTQ2vGt7g7eQ8M=; b=ziezxVqNfTiOmy8CWSbr7jGcOwEsL/JvvSDP2Ul/iFgM+udWF8nN1BYyqxacFylKNo qzapsSvRy07dCBylocT8U111QWMxITTQICj9p/FgKi2MkSecKg5P40bOBgC/Eppq+Ll8 +P6Xz/PbBttG7cZZMBbFOgFAOgRuOCoyykP4qcRtGZgE2943pVs2xBuBszf28ZasSdPp 6OofoKoTAh5GcM0JZtcASA7xbBoSqyIBKsiJm317HCFVxFgSrPQ3NDdi5mzWR7clH+Dd RFYkCVF5+mw2KzndkOKjeVQMxpzZUf7G0OL/a7C4mxQoHCpgjTv0T/DvmSzCxnIDo9Gb gIIQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v13si16040029pgr.282.2019.07.15.09.59.34; Mon, 15 Jul 2019 09:59:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731382AbfGOQ6Y (ORCPT + 99 others); Mon, 15 Jul 2019 12:58:24 -0400 Received: from out30-131.freemail.mail.aliyun.com ([115.124.30.131]:51743 "EHLO out30-131.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729533AbfGOQ6Y (ORCPT ); Mon, 15 Jul 2019 12:58:24 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R391e4;CH=green;DM=||false|;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04420;MF=yang.shi@linux.alibaba.com;NM=1;PH=DS;RN=7;SR=0;TI=SMTPD_---0TX.M-FQ_1563209898; Received: from US-143344MP.local(mailfrom:yang.shi@linux.alibaba.com fp:SMTPD_---0TX.M-FQ_1563209898) by smtp.aliyun-inc.com(127.0.0.1); Tue, 16 Jul 2019 00:58:20 +0800 Subject: Re: [PATCH] mm: page_alloc: document kmemleak's non-blockable __GFP_NOFAIL case To: Qian Cai , Catalin Marinas , Michal Hocko Cc: "dvyukov@google.com" , "akpm@linux-foundation.org" , "linux-mm@kvack.org" , "linux-kernel@vger.kernel.org" References: <1562964544-59519-1-git-send-email-yang.shi@linux.alibaba.com> <20190715131732.GX29483@dhcp22.suse.cz> <1563203882.4610.1.camel@lca.pw> From: Yang Shi Message-ID: <82cbc350-c2a8-e653-208a-a533771fe653@linux.alibaba.com> Date: Mon, 15 Jul 2019 09:58:14 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <1563203882.4610.1.camel@lca.pw> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/15/19 8:18 AM, Qian Cai wrote: > On Mon, 2019-07-15 at 10:01 -0500, Catalin Marinas wrote: >> On 15 Jul 2019, at 08:17, Michal Hocko wrote: >>> On Sat 13-07-19 04:49:04, Yang Shi wrote: >>>> When running ltp's oom test with kmemleak enabled, the below warning was >>>> triggerred since kernel detects __GFP_NOFAIL & ~__GFP_DIRECT_RECLAIM is >>>> passed in: >>> kmemleak is broken and this is a long term issue. I thought that >>> Catalin had something to address this. >> What needs to be done in the short term is revert commit >> d9570ee3bd1d4f20ce63485f5ef05663866fe6c0. Longer term the solution is to embed >> kmemleak metadata into the slab so that we don’t have the situation where the >> primary slab allocation success but the kmemleak metadata fails. >> >> I’m on holiday for one more week with just a phone to reply from but feel free >> to revert the above commit. I’ll follow up with a better solution. > Well, the reverting will only make the situation worst for the kmemleak under > memory pressure. In the meantime, if someone wants to push for the mempool I think this is expected by reverting that commit since kmemleak metadata could fail. But, it could fail too even though that commit is not reverted if the context is non-blockable. > solution with tunable pool sizes along with the reverting, that could be an > improvement. > > https://lore.kernel.org/linux-mm/20190328145917.GC10283@arrakis.emea.arm.com/