From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0F0A9C433F5 for ; Wed, 11 May 2022 05:13:05 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 81A206B0073; Wed, 11 May 2022 01:13:05 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 7C81C6B0075; Wed, 11 May 2022 01:13:05 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 669806B0078; Wed, 11 May 2022 01:13:05 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 53BB36B0073 for ; Wed, 11 May 2022 01:13:05 -0400 (EDT) Received: from smtpin24.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay11.hostedemail.com (Postfix) with ESMTP id 29603812E7 for ; Wed, 11 May 2022 05:13:05 +0000 (UTC) X-FDA: 79452293130.24.B30D0BA Received: from mail-pj1-f43.google.com (mail-pj1-f43.google.com [209.85.216.43]) by imf29.hostedemail.com (Postfix) with ESMTP id 328501200B7 for ; Wed, 11 May 2022 05:12:56 +0000 (UTC) Received: by mail-pj1-f43.google.com with SMTP id l7-20020a17090aaa8700b001dd1a5b9965so1056158pjq.2 for ; Tue, 10 May 2022 22:13:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bytedance-com.20210112.gappssmtp.com; s=20210112; h=message-id:date:mime-version:user-agent:subject:content-language:to :cc:references:from:in-reply-to:content-transfer-encoding; bh=muchCbIST8CyazuMb2Tg5TYhrbA5UHp4Q53GXoBGlLg=; b=doOz+BgPF18Bg3tSulZJ3yWh3PEMfvVeL14hl+TBSbVibcnvqPXwbdFZ1uuyBf0x9/ 4/YnsHef7mQMcfraHB9ccw0sjMt231gPEMpcGkwEAy+D+ErzKD7o6iQhnrIu29s5Qrol 66CyR+R0LpNYRE8PJRmToihMPjzKRky2wsdWnoudveqIvm7Q0QPf0rTkt5UvskxtO0V3 hKSmXYqnpQ6eCP5T7OU51OI/WNX0uPAIV/z/P84RrRxRHNv8miscrXYyrjc4J7qe+PRu ssym9c6YtBNECvAEeKmfmdZmRCnq1hmerN1SWH2rxwJZnuzs+E8cYZC29ZIQ6oQzX5mA ixTg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent:subject :content-language:to:cc:references:from:in-reply-to :content-transfer-encoding; bh=muchCbIST8CyazuMb2Tg5TYhrbA5UHp4Q53GXoBGlLg=; b=I1Iyld7NZ0ufy/nFsChvLPWXbSGLezZn3NCc81OFmgbJpqKaIwFmlb/nobW4HRthWv RYNLGfKqWPO+Bn4msAQf3KKS9ykOEvF72BvnpqHlZaYCunZRPbp/TrQ0lT5UDxRQbseN lg7dQOQ4obpN6tzPppeqfynTLUyDT4B6yaQieYZ95LraY+dnEh866rGSoIkD37URekm0 ZvM3HXx5Sj+YPKERSxZGorJM7Tlsj0ylbmJGBe5z9T/BXZNQVxN/7gPbpjRQU7bTIxSR /JJLwPq/VtJ6NYaS/Zw5VFmnm8VYyXrjcQ+rtuGNSSs4lOyY/CUCrFO5q3uBK7IdycFi Uvww== X-Gm-Message-State: AOAM532/3tgBk3hkZ/9VoTHRlubN9cbJeMnnWfc10SGuVliFWd2L1rN2 ZEUFDdcV1ymSHr5cHGfVoEgntw== X-Google-Smtp-Source: ABdhPJzGqMVbnyHBk+BhSzTl7IFFvsN8ZyzwAY1jD2lcfIeCi28OIfvNufz9fEzoAu8UVWVd+U+Zrw== X-Received: by 2002:a17:902:db05:b0:15e:b542:3f23 with SMTP id m5-20020a170902db0500b0015eb5423f23mr23636870plx.143.1652245981709; Tue, 10 May 2022 22:13:01 -0700 (PDT) Received: from [10.254.203.126] ([139.177.225.242]) by smtp.gmail.com with ESMTPSA id a4-20020aa794a4000000b0050dc76281edsm486928pfl.199.2022.05.10.22.12.58 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 10 May 2022 22:13:01 -0700 (PDT) Message-ID: Date: Wed, 11 May 2022 13:12:55 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.9.0 Subject: Re: [PATCH 1/2] mm: fix missing handler for __GFP_NOWARN Content-Language: en-US To: akpm@linux-foundation.org Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, akinobu.mita@gmail.com, vbabka@suse.cz, gregkh@linuxfoundation.org, jirislaby@kernel.org, rostedt@goodmis.org References: <20220510113809.80626-1-zhengqi.arch@bytedance.com> From: Qi Zheng In-Reply-To: <20220510113809.80626-1-zhengqi.arch@bytedance.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 328501200B7 X-Stat-Signature: hmezgxmkkd87ac5ezpyd5kbu5oghm1cd X-Rspam-User: Authentication-Results: imf29.hostedemail.com; dkim=pass header.d=bytedance-com.20210112.gappssmtp.com header.s=20210112 header.b=doOz+BgP; spf=pass (imf29.hostedemail.com: domain of zhengqi.arch@bytedance.com designates 209.85.216.43 as permitted sender) smtp.mailfrom=zhengqi.arch@bytedance.com; dmarc=pass (policy=none) header.from=bytedance.com X-HE-Tag: 1652245976-726634 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 2022/5/10 7:38 PM, Qi Zheng wrote: > We expect no warnings to be issued when we specify __GFP_NOWARN, but > currently in paths like alloc_pages() and kmalloc(), there are still > some warnings printed, fix it. Hi Andrew, Maybe we only need to deal with memory allocation failures, such as should_fail() (This leads to deadlock in PATCH[2/2]). These WARN_ON_ONCE()s report usage problems and should not be printed. If they are printed, we should fix these usage problems. Thanks, Qi > > Signed-off-by: Qi Zheng > --- > include/linux/fault-inject.h | 2 ++ > lib/fault-inject.c | 3 +++ > mm/failslab.c | 3 +++ > mm/internal.h | 11 +++++++++++ > mm/page_alloc.c | 22 ++++++++++++---------- > 5 files changed, 31 insertions(+), 10 deletions(-) > > diff --git a/include/linux/fault-inject.h b/include/linux/fault-inject.h > index 2d04f6448cde..9f6e25467844 100644 > --- a/include/linux/fault-inject.h > +++ b/include/linux/fault-inject.h > @@ -20,6 +20,7 @@ struct fault_attr { > atomic_t space; > unsigned long verbose; > bool task_filter; > + bool no_warn; > unsigned long stacktrace_depth; > unsigned long require_start; > unsigned long require_end; > @@ -39,6 +40,7 @@ struct fault_attr { > .ratelimit_state = RATELIMIT_STATE_INIT_DISABLED, \ > .verbose = 2, \ > .dname = NULL, \ > + .no_warn = false, \ > } > > #define DECLARE_FAULT_ATTR(name) struct fault_attr name = FAULT_ATTR_INITIALIZER > diff --git a/lib/fault-inject.c b/lib/fault-inject.c > index ce12621b4275..423784d9c058 100644 > --- a/lib/fault-inject.c > +++ b/lib/fault-inject.c > @@ -41,6 +41,9 @@ EXPORT_SYMBOL_GPL(setup_fault_attr); > > static void fail_dump(struct fault_attr *attr) > { > + if (attr->no_warn) > + return; > + > if (attr->verbose > 0 && __ratelimit(&attr->ratelimit_state)) { > printk(KERN_NOTICE "FAULT_INJECTION: forcing a failure.\n" > "name %pd, interval %lu, probability %lu, " > diff --git a/mm/failslab.c b/mm/failslab.c > index f92fed91ac23..58df9789f1d2 100644 > --- a/mm/failslab.c > +++ b/mm/failslab.c > @@ -30,6 +30,9 @@ bool __should_failslab(struct kmem_cache *s, gfp_t gfpflags) > if (failslab.cache_filter && !(s->flags & SLAB_FAILSLAB)) > return false; > > + if (gfpflags & __GFP_NOWARN) > + failslab.attr.no_warn = true; > + > return should_fail(&failslab.attr, s->object_size); > } > > diff --git a/mm/internal.h b/mm/internal.h > index cf16280ce132..7a268fac6559 100644 > --- a/mm/internal.h > +++ b/mm/internal.h > @@ -35,6 +35,17 @@ struct folio_batch; > /* Do not use these with a slab allocator */ > #define GFP_SLAB_BUG_MASK (__GFP_DMA32|__GFP_HIGHMEM|~__GFP_BITS_MASK) > > +#define WARN_ON_ONCE_GFP(cond, gfp) ({ \ > + static bool __section(".data.once") __warned; \ > + int __ret_warn_once = !!(cond); \ > + \ > + if (unlikely(!(gfp & __GFP_NOWARN) && __ret_warn_once && !__warned)) { \ > + __warned = true; \ > + WARN_ON(1); \ > + } \ > + unlikely(__ret_warn_once); \ > +}) > + > void page_writeback_init(void); > > static inline void *folio_raw_mapping(struct folio *folio) > diff --git a/mm/page_alloc.c b/mm/page_alloc.c > index 0e42038382c1..2bf4ce4d0e2f 100644 > --- a/mm/page_alloc.c > +++ b/mm/page_alloc.c > @@ -3722,7 +3722,7 @@ struct page *rmqueue(struct zone *preferred_zone, > * We most definitely don't want callers attempting to > * allocate greater than order-1 page units with __GFP_NOFAIL. > */ > - WARN_ON_ONCE((gfp_flags & __GFP_NOFAIL) && (order > 1)); > + WARN_ON_ONCE_GFP((gfp_flags & __GFP_NOFAIL) && (order > 1), gfp_flags); > > do { > page = NULL; > @@ -3799,6 +3799,9 @@ static bool __should_fail_alloc_page(gfp_t gfp_mask, unsigned int order) > (gfp_mask & __GFP_DIRECT_RECLAIM)) > return false; > > + if (gfp_mask & __GFP_NOWARN) > + fail_page_alloc.attr.no_warn = true; > + > return should_fail(&fail_page_alloc.attr, 1 << order); > } > > @@ -4346,7 +4349,8 @@ __alloc_pages_may_oom(gfp_t gfp_mask, unsigned int order, > */ > > /* Exhausted what can be done so it's blame time */ > - if (out_of_memory(&oc) || WARN_ON_ONCE(gfp_mask & __GFP_NOFAIL)) { > + if (out_of_memory(&oc) || > + WARN_ON_ONCE_GFP(gfp_mask & __GFP_NOFAIL, gfp_mask)) { > *did_some_progress = 1; > > /* > @@ -4902,8 +4906,8 @@ __alloc_pages_slowpath(gfp_t gfp_mask, unsigned int order, > * We also sanity check to catch abuse of atomic reserves being used by > * callers that are not in atomic context. > */ > - if (WARN_ON_ONCE((gfp_mask & (__GFP_ATOMIC|__GFP_DIRECT_RECLAIM)) == > - (__GFP_ATOMIC|__GFP_DIRECT_RECLAIM))) > + if (WARN_ON_ONCE_GFP((gfp_mask & (__GFP_ATOMIC|__GFP_DIRECT_RECLAIM)) == > + (__GFP_ATOMIC|__GFP_DIRECT_RECLAIM), gfp_mask)) > gfp_mask &= ~__GFP_ATOMIC; > > retry_cpuset: > @@ -5117,7 +5121,7 @@ __alloc_pages_slowpath(gfp_t gfp_mask, unsigned int order, > * All existing users of the __GFP_NOFAIL are blockable, so warn > * of any new users that actually require GFP_NOWAIT > */ > - if (WARN_ON_ONCE(!can_direct_reclaim)) > + if (WARN_ON_ONCE_GFP(!can_direct_reclaim, gfp_mask)) > goto fail; > > /* > @@ -5125,7 +5129,7 @@ __alloc_pages_slowpath(gfp_t gfp_mask, unsigned int order, > * because we cannot reclaim anything and only can loop waiting > * for somebody to do a work for us > */ > - WARN_ON_ONCE(current->flags & PF_MEMALLOC); > + WARN_ON_ONCE_GFP(current->flags & PF_MEMALLOC, gfp_mask); > > /* > * non failing costly orders are a hard requirement which we > @@ -5133,7 +5137,7 @@ __alloc_pages_slowpath(gfp_t gfp_mask, unsigned int order, > * so that we can identify them and convert them to something > * else. > */ > - WARN_ON_ONCE(order > PAGE_ALLOC_COSTLY_ORDER); > + WARN_ON_ONCE_GFP(order > PAGE_ALLOC_COSTLY_ORDER, gfp_mask); > > /* > * Help non-failing allocations by giving them access to memory > @@ -5379,10 +5383,8 @@ struct page *__alloc_pages(gfp_t gfp, unsigned int order, int preferred_nid, > * There are several places where we assume that the order value is sane > * so bail out early if the request is out of bound. > */ > - if (unlikely(order >= MAX_ORDER)) { > - WARN_ON_ONCE(!(gfp & __GFP_NOWARN)); > + if (WARN_ON_ONCE_GFP(order >= MAX_ORDER, gfp)) > return NULL; > - } > > gfp &= gfp_allowed_mask; > /* -- Thanks, Qi