Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp1859929pxb; Wed, 30 Mar 2022 11:24:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJybaHdpiarLi7uEAYEGaGcrZPU9IRcO8THxrCJ3SicNaH2rehZeKs4kt6FGFHHJkIEVVM1v X-Received: by 2002:a17:906:3144:b0:6ce:de5d:5e3b with SMTP id e4-20020a170906314400b006cede5d5e3bmr884336eje.689.1648664641762; Wed, 30 Mar 2022 11:24:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648664641; cv=none; d=google.com; s=arc-20160816; b=gvb7p+RAaEZhZ1zJxEPmX72CqCnqjLEX4/bKd3mZJUi4/utm+V0Jb8qJvX29yWApty /GbufONLiR3+eyGoyT4UsdaluBLTkSB/A3UjcUTFDKlaSdPU3UIQy5zPFo9Pl5jBZ91g CCVFVfxezlZsP58CqIS935FIM2CF8SV99PTZea36jyeoxfn11hNI50zxwM5N3izSC+GI wXiNvs1KR436AjRfh8DayvT+O1dRxs+ty6aMSQmMcABNni0pfP4wxMXie9fLLhN5Iwla GcE4Jg2aYTW740cafZelyhk+XI6CKc3nX4tIxzGreB7YEHPfO8E/NbBndRrgFClS4TZb qKpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Um5MncWQPFK069jInV5QbM0hF4fayUXS1W56obOkrFk=; b=egdUbk7W69zRpgRnCPHeTRI9ePNG8r894BYIJmCSxclWKvx+WfQ1+RiDw7lDnjcj4M znXgS8yEj36aMCdBWRoEuJ+m6U3GzUsqvnKrKH2h+S44ZNIPlHdnY3Iwg+8WFkCcaMUd R5zjTF7yN+BvpOzD7Ceekm73G/o8Ae7+bE7gAil/52FqXmCs1Ry5StL/bgD3wtLZn6PR 92BiaRFgVmICqykoEme6ERZMssDIxYdfQOu24HXPxE+FBQNO3SeHBMyZI5FqErdkOrIS 1bVwlFnm7SJit524kwTv52r0lt5wkUEjHjQNdh9hDqZ2U+0D/PR1spl2ZJKaxa4ucCrP JM4g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=gojrEkSR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e5-20020a17090658c500b006dfe7bc2fafsi28062435ejs.56.2022.03.30.11.23.18; Wed, 30 Mar 2022 11:24:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=gojrEkSR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244083AbiC3IIG (ORCPT + 99 others); Wed, 30 Mar 2022 04:08:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45398 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244092AbiC3IIF (ORCPT ); Wed, 30 Mar 2022 04:08:05 -0400 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BD61D2E6B8 for ; Wed, 30 Mar 2022 01:06:19 -0700 (PDT) Received: from relay2.suse.de (relay2.suse.de [149.44.160.134]) by smtp-out1.suse.de (Postfix) with ESMTP id 7A9B221605; Wed, 30 Mar 2022 08:06:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1648627578; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Um5MncWQPFK069jInV5QbM0hF4fayUXS1W56obOkrFk=; b=gojrEkSRQEgWFK1XNxkCS3aNTUXaXPocr2R7tm2tGJZ9AYJ4wWLbcKFl9rl2BKHSSgcBp8 +RrlEZ/jEkqw3j2XXMdTPhVVwj7f4T+mJIawfsl7XKqgMUy5ZNW3PB28N/9/crLubb+OKm kUQUTXQEcU5iVDguo8N3rp2jEDU99p0= Received: from suse.cz (unknown [10.100.201.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by relay2.suse.de (Postfix) with ESMTPS id 3F6BCA3B9B; Wed, 30 Mar 2022 08:06:18 +0000 (UTC) Date: Wed, 30 Mar 2022 10:06:17 +0200 From: Michal Hocko To: Jaewon Kim Cc: minchan@kernel.org, ngupta@vflare.org, senozhatsky@chromium.org, akpm@linux-foundation.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, s.suk@samsung.com, jaewon31.kim@gmail.com Subject: Re: [PATCH] zram_drv: add __GFP_NOWARN flag on call to zs_malloc Message-ID: References: <20220330052502.26072-1-jaewon31.kim@samsung.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220330052502.26072-1-jaewon31.kim@samsung.com> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 30-03-22 14:25:02, Jaewon Kim wrote: > The page allocation with GFP_NOIO may fail. And zram can handle this > allocation failure. We do not need to print log for this. GFP_NOIO doesn't have any special meaning wrt to failures. zram allocates from the memory reclaim context which is a bad design IMHO. The failure you are seeing indicates that PF_MEMALLOC context (memory reclaim) which is allow to dip into memory reserves without any limit cannot find any memory! This is really bad and it is good to learn about that. Your description doesn't really explain why we should be ignoring that situation. Is the memory allocation failure gracefully recoverable? -- Michal Hocko SUSE Labs