Received: by 10.192.165.148 with SMTP id m20csp3623378imm; Mon, 23 Apr 2018 09:30:59 -0700 (PDT) X-Google-Smtp-Source: AIpwx48BWV20f1K5f63o8SiesNcCSbpwNETmaVFDD37+4XV6ZSSzD0mf0rgh5TgThLuWi1fwrEn4 X-Received: by 2002:a17:902:b105:: with SMTP id q5-v6mr21979564plr.173.1524501059256; Mon, 23 Apr 2018 09:30:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524501059; cv=none; d=google.com; s=arc-20160816; b=Vv7JRwbkdWpIHK9pgs7cbmbVyymiH2re6BTD027bPWCTVqseyf95f8nJXbCyMIvyoD zQQ00ELRTa3rXrk0NIoX4mY0dvdbJmN2vgwcr641ncKxbS0AbPKdilW9BDT6Z9daEzEV sLxZY1wZGC08g0idmH+amdHTGenTD/fEWCsLiBv3topW7OyINkGNYCHV8V9GFZjh6i6U GRHMSJ2TqkNDN4oaN7pj461UVCnMpDXSy07Oo9R1Pb4k5Y62mAJZrse+CCZlikN7+I26 42ww8tR4b7rH0DRPG009/CtM0qyGclGjfPZldq7bSDs4z6OopH8l8RG6/b+PSaZbIq47 z/vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=icK2NRxvvrpR/Wg+HXX+6N2RrU1Lv61ZQQ4StBRsXAk=; b=wSCDDBeq3G33MdT/v8WNaP6O4JLZI/5Zfu1LIiXKMgJacMHb/xoyocTq9EBRa88+7o QEETPP87gps5kL1lAC4pbw+RqjaWSdueKtNI8v8Aiq/b9d/qwshL74QGhD3QgmiOgykd LjQpis8kT4ya3guTvtpWum8BXfs8v4QmDLRuMGViXDqtRF779fWVYxJ5u3lS42ZHmCZc Fln4n19x4cfsJF9190XN59dioEJZm0NTiJTrgUm2YrzcXsqGO1O2TqE7lxqJEXSJ/siz vf0X4V8pYXLcc4pFrMh7o9s2CS4AC68wT9+KinksFt0i8Jur2Gy+nHXikXTbehl9IHuz ZreA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r16si10978312pfh.333.2018.04.23.09.30.44; Mon, 23 Apr 2018 09:30:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755614AbeDWPKX (ORCPT + 99 others); Mon, 23 Apr 2018 11:10:23 -0400 Received: from mx2.suse.de ([195.135.220.15]:47440 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755435AbeDWPKU (ORCPT ); Mon, 23 Apr 2018 11:10:20 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 7E667AEEB; Mon, 23 Apr 2018 15:10:18 +0000 (UTC) Date: Mon, 23 Apr 2018 09:10:15 -0600 From: Michal Hocko To: Mikulas Patocka Cc: Matthew Wilcox , David Miller , Andrew Morton , linux-mm@kvack.org, eric.dumazet@gmail.com, edumazet@google.com, bhutchings@solarflare.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, mst@redhat.com, jasowang@redhat.com, virtualization@lists.linux-foundation.org, dm-devel@redhat.com, Vlastimil Babka Subject: Re: [PATCH] kvmalloc: always use vmalloc if CONFIG_DEBUG_VM Message-ID: <20180423151015.GT17484@dhcp22.suse.cz> References: <20180418.134651.2225112489265654270.davem@davemloft.net> <20180420130852.GC16083@dhcp22.suse.cz> <20180420210200.GH10788@bombadil.infradead.org> <20180421144757.GC14610@bombadil.infradead.org> <20180422130356.GG17484@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 23-04-18 10:24:02, Mikulas Patocka wrote: [...] I am not going to comment on your continuous accusations. We can discuss patches but general rants make very limited sense. > > > > I already said that we can change it from CONFIG_DEBUG_VM to > > > > CONFIG_DEBUG_SG - or to whatever other option you may want, just to make > > > > sure that it is enabled in distro debug kernels by default. > > > > > > Yes, and I think that's the right idea. So send a v2 and ignore the > > > replies that are clearly relating to an earlier version of the patch. > > > Not everybody reads every mail in the thread before responding to one they > > > find interesting. Yes, ideally, one would, but sometimes one doesn't. > > > > And look here. This is yet another ad-hoc idea. We have many users of > > kvmalloc which have no relation to SG, yet you are going to control > > their behavior by CONFIG_DEBUG_SG? No way! (yeah evil again) > > Why aren't you constructive and pick up pick up the CONFIG flag? Because config doesn't make that much of a sense. You do not want a permanent vmalloc fallback unconditionally. Debugging option which changes the behavior completely is not useful IMNHO. Besides that who is going to enable it? > > Really, we have a fault injection framework and this sounds like > > something to hook in there. > > The testing people won't set it up. They install the "kernel-debug" > package and run the tests in it. > > If you introduce a hidden option that no one knows about, no one will use > it. then make sure people know about it. Fuzzers already do test fault injections. -- Michal Hocko SUSE Labs