Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp6425949rwl; Mon, 9 Jan 2023 08:11:30 -0800 (PST) X-Google-Smtp-Source: AMrXdXtbegiJxRbhQqEi/UiJgaRwAyVVOOt9HeebR5ZwGhJKkm5w19D2pOPxh8LPZrPmxMkzhvP5 X-Received: by 2002:a17:907:7d8f:b0:7c1:f63:8f66 with SMTP id oz15-20020a1709077d8f00b007c10f638f66mr28359624ejc.51.1673280690703; Mon, 09 Jan 2023 08:11:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673280690; cv=none; d=google.com; s=arc-20160816; b=G8dB69kMiY2wR7c69eZkZkrBIh1m0+Jiuf5PQAPzfqn75Yn6KaTWc6YNTWLXFbB+Eb ysWic8oRj07DLiUSRFGd5LH6JvouturC6hphqwsMHV3i8bfCQl12JkD3IiDoljqQCQWy +wW6Wf7BRyvQlzcG51TiJtOSGlVNbSWuvQGgeLS7PuMfpwbnxe/DJtcfsjnC8r2pg75j bwq68oHg4LYin3iMtxnwasgGCf1k3dQtsxnb/JAKqTutr/PH7mT3mFA2riItgh85JpX2 +LUt8ZG6u7UwWb17JtiMC0SA3fLNa/B9V/DG5fllJvOT6hOBd7a3CJ15wbXP0qlguogf KReQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=OTiE94DWTqreF7H0O/DeI5IYF1+Qxs1+noUSvGBkGJw=; b=StCvtIm4XPfTjqb+BfVyaFHKJcq6TSW+8/Vgg8Wda8JpJA5t9Lj6dP6U6Xp00bLveR hahn2aIk6sC2GOp5UXq3P56nU6unbWM8M4WunL05EGN8d/Q85/tvnlAzTVNiz6BaGtjV y3jFNGuqewtpD5a40dZ2eZOx8hRFkvFVr1lsgLsr/B2wmNcqbbe/l0s7YhFPnYhb3v3H ndxjSAttKaDdp994wWrcHC92BIOjvLwK/CNWUU/Racm3RcnmS/rNiFaA2NE142Ijl77i hRwBcOJCfGuGXjQ92W0H87FKh087shZlmU6M9PER0T1b/Is0ek01Enz9Iwl0oysk9SaC EAhQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id xc2-20020a170907074200b0084bbb86a74fsi10415804ejb.540.2023.01.09.08.11.17; Mon, 09 Jan 2023 08:11:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237289AbjAIPSj (ORCPT + 53 others); Mon, 9 Jan 2023 10:18:39 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33226 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237187AbjAIPRz (ORCPT ); Mon, 9 Jan 2023 10:17:55 -0500 Received: from outbound-smtp46.blacknight.com (outbound-smtp46.blacknight.com [46.22.136.58]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2BE642BC7 for ; Mon, 9 Jan 2023 07:17:36 -0800 (PST) Received: from mail.blacknight.com (pemlinmail04.blacknight.ie [81.17.254.17]) by outbound-smtp46.blacknight.com (Postfix) with ESMTPS id B3A48FA8C8 for ; Mon, 9 Jan 2023 15:17:35 +0000 (GMT) Received: (qmail 18620 invoked from network); 9 Jan 2023 15:17:35 -0000 Received: from unknown (HELO morpheus.112glenside.lan) (mgorman@techsingularity.net@[84.203.198.246]) by 81.17.254.9 with ESMTPA; 9 Jan 2023 15:17:35 -0000 From: Mel Gorman To: Linux-MM Cc: Andrew Morton , Michal Hocko , NeilBrown , Thierry Reding , Matthew Wilcox , Vlastimil Babka , LKML , Mel Gorman Subject: [PATCH 5/7] mm/page_alloc.c: Allow __GFP_NOFAIL requests deeper access to reserves Date: Mon, 9 Jan 2023 15:16:29 +0000 Message-Id: <20230109151631.24923-6-mgorman@techsingularity.net> X-Mailer: git-send-email 2.35.3 In-Reply-To: <20230109151631.24923-1-mgorman@techsingularity.net> References: <20230109151631.24923-1-mgorman@techsingularity.net> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Currently __GFP_NOFAIL allocations without any other flags can access 25% of the reserves but these requests imply that the system cannot make forward progress until the allocation succeeds. Allow __GFP_NOFAIL access to 75% of the min reserve. Signed-off-by: Mel Gorman --- mm/page_alloc.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mm/page_alloc.c b/mm/page_alloc.c index 6f41b84a97ac..d2df78f5baa2 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -5308,7 +5308,7 @@ __alloc_pages_slowpath(gfp_t gfp_mask, unsigned int order, * could deplete whole memory reserves which would just make * the situation worse */ - page = __alloc_pages_cpuset_fallback(gfp_mask, order, ALLOC_HARDER, ac); + page = __alloc_pages_cpuset_fallback(gfp_mask, order, ALLOC_MIN_RESERVE|ALLOC_HARDER, ac); if (page) goto got_pg; -- 2.35.3