Received: by 10.192.165.148 with SMTP id m20csp1273043imm; Wed, 25 Apr 2018 15:50:56 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqgEA70ybT8XLC4B4nNJon2SxVLgfhGDtsYb42KuHx66ie3wuLwU6tSSk1LgTXVRq7vy5Y5 X-Received: by 10.98.65.93 with SMTP id o90mr3103668pfa.140.1524696656396; Wed, 25 Apr 2018 15:50:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524696656; cv=none; d=google.com; s=arc-20160816; b=ikl6CKC/3g/JeYoW5NK5KFeC9ZefhxKRNuldITYScoaqgzBtHA2Bp7c6VXQOwWz55H DoMi7fnJWUNc1+uIO3t1XAr3pKPMOh85yhUIvgcHExfa0I17T5zAxguykV41LQMlMXW/ DGBm4N2KC0gkRtORQMchiSn+VvanwYygZGbK0pJPOyHiOTyRwtawxufsWBn2sY5u1DWf CQfQ8lqChfGP4y6jqc78IUITmqgAg4sDvCAJ71iziw4RQQyJ96XYfYe/P3IDD48tLCSq 2H0wBLNAl/V4FkfwTZ591ooUW8453BDRTz+qCG6ZB5NVTwhfEAk3/JW7W80pSFLH/GWc oQVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature :arc-authentication-results; bh=oN8rN2ej6G3GhsYk/MMTgvuxfrjgI6MzYoMqp867HAc=; b=Uv7VkbiXkK8iHgF/eQfL7+Cf18AyNV0wrKPh0pTkYJhOD7Ovs/eB/1PRu+tk3MDTqs tYwCRPNscUD4JPNU6F9WWeas+/zy04hKc3m+nOXFDgN4SzeRzlSuJp81Wq6Bo3aJlEKi EuXrP0mlmjmnnY5qT1s/TcP818GTRLvtW+GTSdirz+o41Jtc5nWWxJMWW2Ps8hzXc5hl HjaJXDtj3L1V4cURrrY/92bII+cEISLhVldqZgcKiTLkuji2G98gVf5O7Qx6R3WU6Yaj jL8ZNDqf+jgPc1imKz3b97HIR/XC67SuFFkLii1xop9sLQMFmwCthT7x+TRrDvSb4gxz 2Yaw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=wBSOzI7w; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q11si10818275pgv.661.2018.04.25.15.50.41; Wed, 25 Apr 2018 15:50:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=wBSOzI7w; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753894AbeDYWti (ORCPT + 99 others); Wed, 25 Apr 2018 18:49:38 -0400 Received: from mail-pg0-f41.google.com ([74.125.83.41]:39317 "EHLO mail-pg0-f41.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753701AbeDYWtg (ORCPT ); Wed, 25 Apr 2018 18:49:36 -0400 Received: by mail-pg0-f41.google.com with SMTP id b9so14366306pgf.6 for ; Wed, 25 Apr 2018 15:49:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:in-reply-to:message-id:references :user-agent:mime-version; bh=oN8rN2ej6G3GhsYk/MMTgvuxfrjgI6MzYoMqp867HAc=; b=wBSOzI7wWoxkf46GfSfXRFVETmBWfpxpLYZ4CCI/Ln5eAsQlmvuIH1WQ3S6Zsq2h1P ugBcpexa0zcX622z1RLQq+LLLcvFKECg3Wi4gMp++c4Ty+ur06sIMzBShO06jQ4OhEMr ukAtdMTURYR3q6+hWdb6qhtZVHiOQiltBwUNOmnB+v7MhY07OXjb8q6Up9lBI8zBGMMe WxT2yXaRmb6OwFO86KunbA+6NprHKf0S8Y/gi9lepQ6EB7JVuz3R/bPS7T2lZETs0ucF nI5Su0uV8IOCX9vssd91ovQ7P1F8Ty5w57RBiqcMMrnzMQOxd8GjXuu53fLdFzsinNh+ CE2g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:in-reply-to:message-id :references:user-agent:mime-version; bh=oN8rN2ej6G3GhsYk/MMTgvuxfrjgI6MzYoMqp867HAc=; b=ovi4F3hCnTTY9ceOUrHVyMCCo9UEKLjw7ahZAXeFGs1J4RyPg8+ZeiCE1+Av5o6GKW mqBOo2ruBV8NrVK/7thWqiaqZ6eAG4tHwbVPckEvLD50JHz93KAv0lBasVtADmxQmpXI z1P3ZPdxPePmJySAW5qns/QqylCqAoPL7QYoXiSZTlppF8Ekj5FPOsy2NAuO1edaSfxQ Mjyr3evADHzusX4QBOiEPKnNV5W5PTlnOQmVqv4ENQINm2pj+xfc2p5nuH8t9J1RnORA wZcd/nhV1TbC+LaGYa3hOlVQ1Hdn63o0+drQ5QmtB4I1us0zACd8+IJRWiHvIAqfkTnI 1Dbg== X-Gm-Message-State: ALQs6tAvK2KFV7F59AyiQZFU+v5mK1wMOXid+a9APljcCWThxiTM7ANI eJHGVKZeTXm2/1W0VfB4y170Ug== X-Received: by 2002:a17:902:b589:: with SMTP id a9-v6mr8464000pls.149.1524696576154; Wed, 25 Apr 2018 15:49:36 -0700 (PDT) Received: from [2620:15c:17:3:3a5:23a7:5e32:4598] ([2620:15c:17:3:3a5:23a7:5e32:4598]) by smtp.gmail.com with ESMTPSA id w19sm3069972pgv.59.2018.04.25.15.49.35 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 25 Apr 2018 15:49:35 -0700 (PDT) Date: Wed, 25 Apr 2018 15:49:34 -0700 (PDT) From: David Rientjes X-X-Sender: rientjes@chino.kir.corp.google.com To: Mikulas Patocka cc: James Bottomley , dm-devel@redhat.com, eric.dumazet@gmail.com, mst@redhat.com, netdev@vger.kernel.org, jasowang@redhat.com, Randy Dunlap , linux-kernel@vger.kernel.org, Matthew Wilcox , Michal Hocko , linux-mm@kvack.org, edumazet@google.com, Andrew Morton , virtualization@lists.linux-foundation.org, David Miller , Vlastimil Babka Subject: Re: [dm-devel] [PATCH v5] fault-injection: introduce kvmalloc fallback options In-Reply-To: Message-ID: References: <20180421144757.GC14610@bombadil.infradead.org> <20180423151545.GU17484@dhcp22.suse.cz> <20180424170349.GQ17484@dhcp22.suse.cz> <20180424173836.GR17484@dhcp22.suse.cz> <1114eda5-9b1f-4db8-2090-556b4a37c532@infradead.org> <1524694663.4100.21.camel@HansenPartnership.com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 25 Apr 2018, Mikulas Patocka wrote: > You need to enable it on boot. Enabling it when the kernel starts to > execute userspace code is already too late (because you would miss > kvmalloc calls in the kernel boot path). > Is your motivation that since kvmalloc() never falls back to vmalloc() on boot because fragmentation is not be an issue at boot that we should catch bugs where it would matter if it had fallen back? If we are worrying about falling back to vmalloc before even initscripts have run I think we have bigger problems.