Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1304915pxb; Wed, 20 Oct 2021 02:20:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw+m/IMcoOud+yQtWU0EXWcJDcuVWfSAOp89rty4UuIOYnsO0cw2J9MHWdZM9Fz5/Vuoksr X-Received: by 2002:a63:705e:: with SMTP id a30mr24443969pgn.14.1634721652202; Wed, 20 Oct 2021 02:20:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634721652; cv=none; d=google.com; s=arc-20160816; b=AJC7wpIqZIGUsO0h/mUs8C6i5u762hSUk5Dif/ZLzeL0imnYODv5h0DnXGluy0bUT2 94fMzbyE6KAlDvIu1wdRyUZVzFzT5oNfNkiQQ1EVJaVoXzEg4TNLL5/nydR4BwZAzli3 u+ixfM5Y84BsovPgEO8oMPC8OdYkt+OkEtdcJ5kvOQJoSAo4CdDuOnMNig9/Dx+1Oybz qXseh5X8TmgqeHiow7QSrzJSdqebxVXGqZ7Y7sGfG3YyvHCpcyJ+H8p8LSXa/Db74oV9 eK7LzKrMN4Qp2Nxo2VgYwjHlafFNqVgNhLC/PvS6OzxezxzbnHmgDIpNm8kfGTmpkRJ4 XcFw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=BPvjtKQOd7fMC/9/+8JIUhUxh+2Qtv3moJhg8NLiHcw=; b=hh7yy8tNVZbnEVZz6KhV9nW4emgJZkXW7qCdTQnhbPMOUue76+cA8MIo1XWwSDcRkG KbwMxCebqwSTJeXztNfkCqO3VHE9vsDmzYjBxUhxrgvpwXMyNDZCKoWk3DnNkewTt8/r qKAPh9fOKSMZqzg70VtoqAGD0xG71MFoXbtn7cMVWcMErrVNB6SwGQaURp7WrvSfEw5g WPyzYrnGGIRtD8AShEFiCUdYTi4kKyCZpUx83Iym7fCLWUfv2PDo86IYwcVAJDJi6GJx YuNyz2WheMMH8afJHvLYbim4y/HQR4akWHTPd2iOQ0aDZ9jAuTBVByVSpPD5NrlsYO1l BKGw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=awmXIrfS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=suse.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h14si3003308plf.172.2021.10.20.02.20.39; Wed, 20 Oct 2021 02:20:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=awmXIrfS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=suse.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229771AbhJTJUc (ORCPT + 99 others); Wed, 20 Oct 2021 05:20:32 -0400 Received: from smtp-out1.suse.de ([195.135.220.28]:53214 "EHLO smtp-out1.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229663AbhJTJUa (ORCPT ); Wed, 20 Oct 2021 05:20:30 -0400 Received: from relay2.suse.de (relay2.suse.de [149.44.160.134]) by smtp-out1.suse.de (Postfix) with ESMTP id DADA321A95; Wed, 20 Oct 2021 09:18:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1634721495; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=BPvjtKQOd7fMC/9/+8JIUhUxh+2Qtv3moJhg8NLiHcw=; b=awmXIrfSpc3o/SPaF6WaZAChHlN33ooMtYKNDMhPf/HHkoQk7qfj/Q/spZ5DhVbgTIOoin a2M69P4ECgh8NtrjfRAlZWAqyPTGO1qAFnttsXBpQqEDzzFAjLHG/a1X4dJ1kUlIaMJ3LB SARONEeIU6m24Y5NKJ46AJbENt2wuY4= Received: from suse.cz (unknown [10.100.201.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by relay2.suse.de (Postfix) with ESMTPS id A8187A3B81; Wed, 20 Oct 2021 09:18:15 +0000 (UTC) Date: Wed, 20 Oct 2021 11:18:15 +0200 From: Michal Hocko To: Uladzislau Rezki Cc: linux-mm@kvack.org, Dave Chinner , Neil Brown , Andrew Morton , Christoph Hellwig , linux-fsdevel@vger.kernel.org, LKML , Ilya Dryomov , Jeff Layton Subject: Re: [RFC 2/3] mm/vmalloc: add support for __GFP_NOFAIL Message-ID: References: <20211018114712.9802-1-mhocko@kernel.org> <20211018114712.9802-3-mhocko@kernel.org> <20211019110649.GA1933@pc638.lan> <20211019194658.GA1787@pc638.lan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 20-10-21 10:25:06, Michal Hocko wrote: [...] > > > The flag itself is not really necessary down there as long as we > > > guarantee that the high level logic doesn't fail. In this case we keep > > > retrying at __vmalloc_node_range level which should be possible to cover > > > all callers that can control gfp mask. I was thinking to put it into > > > __get_vm_area_node but that was slightly more hairy and we would be > > > losing the warning which might turn out being helpful in cases where the > > > failure is due to lack of vmalloc space or similar constrain. Btw. do we > > > want some throttling on a retry? > > > > > I think adding kind of schedule() will not make things worse and in corner > > cases could prevent a power drain by CPU. It is important for mobile devices. > > I suspect you mean schedule_timeout here? Or cond_resched? I went with a > later for now, I do not have a good idea for how to long to sleep here. > I am more than happy to change to to a sleep though. Forgot to paste the follow up I have staged currently --- commit 66fea55e5543fa234692a70144cd63c7a1bca32f Author: Michal Hocko Date: Wed Oct 20 10:12:45 2021 +0200 fold me "mm/vmalloc: add support for __GFP_NOFAIL" - add cond_resched diff --git a/mm/vmalloc.c b/mm/vmalloc.c index 0fb5413d9239..f7098e616883 100644 --- a/mm/vmalloc.c +++ b/mm/vmalloc.c @@ -2944,6 +2944,7 @@ static void *__vmalloc_area_node(struct vm_struct *area, gfp_t gfp_mask, do { ret = vmap_pages_range(addr, addr + size, prot, area->pages, page_shift); + cond_resched(); } while ((gfp_mask & __GFP_NOFAIL) && (ret < 0)); if ((gfp_mask & (__GFP_FS | __GFP_IO)) == __GFP_IO) @@ -3034,8 +3035,10 @@ void *__vmalloc_node_range(unsigned long size, unsigned long align, warn_alloc(gfp_mask, NULL, "vmalloc error: size %lu, vm_struct allocation failed", real_size); - if (gfp_mask & __GFP_NOFAIL) + if (gfp_mask & __GFP_NOFAIL) { + cond_resched(); goto again; + } goto fail; } -- Michal Hocko SUSE Labs