Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1002390pxb; Tue, 26 Oct 2021 00:38:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzHP+RKl1SOZ8e/ReVhHnI7UhL21xdBFGAzHTnm+VwZQILNGsR3MXDhhni1PJMAb1xVjNPs X-Received: by 2002:a17:906:3ac6:: with SMTP id z6mr28443078ejd.196.1635233910873; Tue, 26 Oct 2021 00:38:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635233910; cv=none; d=google.com; s=arc-20160816; b=u8MJzQRfF4x58MCKukMWHRfRPAYciNrv1QKdPYoJm+9oVMXK8sG9dyShRo2u8FqcrF mAuBT/GUpfHqV7tIF9hb2aNOv/gzWbiTsn8eqjuU1p1uqUdEJNz1016R+KKwoJ4Rj1xN fMrRzLJ8iCTECbTEkMLbtniLoZgOc0la/05yj8/4gTmpYHG2neNeK7gwMUKI28UXF9X0 2pfqkxe6ssWoK+F81GjJPwweguVGzCx3d7pe8GAYz1Y6p8goV1LvmMuXidrnTPm1bQYH U1f6nZtdlr0Mm8ManS+tpJfBXICfqDtnghCa4S6PfAi56XrbPZ4IsV4UsPhqMFN+I5u4 pL/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=EfZ134/uZ+lGhJW8rE30an18ctrr3KRMnpEcmnbtvg4=; b=I+5G2NN2OWR3TIeksaqYiGG5Xi34ueRNxk3f5jb8ZR93tThxRLnL2smubEftSSXQrW CWQ5AGY9g5LhXHmVzWcmAyWG3Ud2y+144fsIRdCmLfhxarFQ8d8wPV+OJjz9H5jbnGAI 8WOSIm06RXMPMPponzBgrj7C9VNtVUeF4KzZvjupEgmvcdjPJ1aBvoSFV51CVIbcEv+M 8wCucKO5+1n+D6H08NGXp7ZseLBFfrU/LeC/cTw5SOfMUN4RKxwXesiPYgQyGXIs60Zy 6of1MlKiwRDkSg5+E50uatrnKRSN05ILpiiDj2VYIDCwXcRFtU8fEP63ZpxOIR+7B9UO c4cQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=jvGN7I5N; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=suse.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p16si45306edy.436.2021.10.26.00.38.06; Tue, 26 Oct 2021 00:38:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=jvGN7I5N; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=suse.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231246AbhJZHT1 (ORCPT + 99 others); Tue, 26 Oct 2021 03:19:27 -0400 Received: from smtp-out2.suse.de ([195.135.220.29]:36266 "EHLO smtp-out2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230504AbhJZHTX (ORCPT ); Tue, 26 Oct 2021 03:19:23 -0400 Received: from relay2.suse.de (relay2.suse.de [149.44.160.134]) by smtp-out2.suse.de (Postfix) with ESMTP id 1E4C71F770; Tue, 26 Oct 2021 07:16:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1635232619; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=EfZ134/uZ+lGhJW8rE30an18ctrr3KRMnpEcmnbtvg4=; b=jvGN7I5NEwtF3c2TalafkUNm8rG8IjySDu/jAz6T2ecydsgCY+ftnP+l2/0wPsMNfCsbJt gW63oRc80Qw0DVmMm3OkvZQDWS9ZPIhI3hx19ZounPaY0tUxGCxGvXMZNPIOvG6ZqHB6Ns PWSd4xGbjsRRI/1Qv4FqoXVnBce2cy0= Received: from suse.cz (unknown [10.100.201.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by relay2.suse.de (Postfix) with ESMTPS id E0F28A3B83; Tue, 26 Oct 2021 07:16:58 +0000 (UTC) Date: Tue, 26 Oct 2021 09:16:57 +0200 From: Michal Hocko To: NeilBrown Cc: Uladzislau Rezki , Linux Memory Management List , Dave Chinner , Andrew Morton , Christoph Hellwig , linux-fsdevel@vger.kernel.org, LKML , Ilya Dryomov , Jeff Layton Subject: Re: [RFC 2/3] mm/vmalloc: add support for __GFP_NOFAIL Message-ID: References: <20211020192430.GA1861@pc638.lan> <163481121586.17149.4002493290882319236@noble.neil.brown.name> <20211021104038.GA1932@pc638.lan> <163485654850.17149.3604437537345538737@noble.neil.brown.name> <20211025094841.GA1945@pc638.lan> <163520582122.16092.9250045450947778926@noble.neil.brown.name> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <163520582122.16092.9250045450947778926@noble.neil.brown.name> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 26-10-21 10:50:21, Neil Brown wrote: > On Mon, 25 Oct 2021, Uladzislau Rezki wrote: > > On Fri, Oct 22, 2021 at 09:49:08AM +1100, NeilBrown wrote: > > > However I'm not 100% certain, and the behaviour might change in the > > > future. So having one place (the definition of memalloc_retry_wait()) > > > where we can change the sleeping behaviour if the alloc_page behavour > > > changes, would be ideal. Maybe memalloc_retry_wait() could take a > > > gfpflags arg. > > > > > At sleeping is required for __get_vm_area_node() because in case of lack > > of vmap space it will end up in tight loop without sleeping what is > > really bad. > > > So vmalloc() has two failure modes. alloc_page() failure and > __alloc_vmap_area() failure. The caller cannot tell which... > > Actually, they can. If we pass __GFP_NOFAIL to vmalloc(), and it fails, > then it must have been __alloc_vmap_area() which failed. > What do we do in that case? > Can we add a waitq which gets a wakeup when __purge_vmap_area_lazy() > finishes? > If we use the spinlock from that waitq in place of free_vmap_area_lock, > then the wakeup would be nearly free if no-one was waiting, and worth > while if someone was waiting. Is this really required to be part of the initial support? -- Michal Hocko SUSE Labs