Received: by 10.192.165.148 with SMTP id m20csp1279376imm; Wed, 25 Apr 2018 15:59:20 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+c7RoU/3N4AC4E0xjhaBIbQ6qV682Of2TG7Y0StLmcMretoNYYtOWDDzNEJCkJYbApaoME X-Received: by 10.98.92.129 with SMTP id q123mr29778158pfb.252.1524697160747; Wed, 25 Apr 2018 15:59:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524697160; cv=none; d=google.com; s=arc-20160816; b=m3097rW/xtcGVnGjC0a+Zq0pNriGODDfDm5KJBZzSIBQNgfz4BzfMYijVEwuI0waSG ZibiPJMQxiK2bLfv3FFyZo/BDzsvK0Bq7tUCoe6eIrGktEP+jHj7BK/xUncZZMaUfD3r 3Vh93ldRrM9ujzcTZ5QXLY7mXrujNg6I3+OlvjiAf1Tg4FPixORFladZUgfHFBLWYUwE pv20I0cf/BOw8f0jDV6ZxSh9AlMEQzRVX9YdV2QBm8+QsBjs34YxUODV/1PBkQAnqVS8 xgrQ2X+X1Etvl8pgOc0ACKX/ffcL5eTubTBGaUn/FPZ0mmdYRxcPv8CpjSiMjaI4w5CL sabA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=fsPp3yqS3fJbkbkRo3awjvqOqe2Xn75oA0hUWrwQWBM=; b=AF0V7JlZl/T5VtODPdIRIsz5N5F2KxPRcuSqCKULTxCD/p5fCX95q/LfiRm7Uc/MK1 8c635kEJ4ZeZHHfPY7p68g8OTEEzQPXu7nd6dDJUP3V6ReRqod/lTK/Z/I4GZ0KYnePn dpsnof1bijlI4OrT2xD0sfiC0jfat/36lVGf0jYehn4QXFyt9ju1X5GbuE4+ye0VVClo O/LqbJ6gjxkvsfXkgs//CqoMpJQWlZd2fGV49djM/MffSqCkvBcqfoUAhlgOtM9W3k8H H2+K9WHlQs3Mjie8Anm99wzddzoZLFUo5A/nKPiAZ5DLXunfLD7j6PClpbyPla6RR6w7 VpfQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i71si4644475pge.436.2018.04.25.15.59.06; Wed, 25 Apr 2018 15:59:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754010AbeDYW4y (ORCPT + 99 others); Wed, 25 Apr 2018 18:56:54 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:59296 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753774AbeDYW4u (ORCPT ); Wed, 25 Apr 2018 18:56:50 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 057C081A88B6; Wed, 25 Apr 2018 22:56:50 +0000 (UTC) Received: from file01.intranet.prod.int.rdu2.redhat.com (file01.intranet.prod.int.rdu2.redhat.com [10.11.5.7]) by smtp.corp.redhat.com (Postfix) with ESMTPS id CB41F2023239; Wed, 25 Apr 2018 22:56:49 +0000 (UTC) Received: from file01.intranet.prod.int.rdu2.redhat.com (localhost [127.0.0.1]) by file01.intranet.prod.int.rdu2.redhat.com (8.14.4/8.14.4) with ESMTP id w3PMunLs031737; Wed, 25 Apr 2018 18:56:49 -0400 Received: from localhost (mpatocka@localhost) by file01.intranet.prod.int.rdu2.redhat.com (8.14.4/8.14.4/Submit) with ESMTP id w3PMunR8031733; Wed, 25 Apr 2018 18:56:49 -0400 X-Authentication-Warning: file01.intranet.prod.int.rdu2.redhat.com: mpatocka owned process doing -bs Date: Wed, 25 Apr 2018 18:56:49 -0400 (EDT) From: Mikulas Patocka X-X-Sender: mpatocka@file01.intranet.prod.int.rdu2.redhat.com To: David Rientjes cc: James Bottomley , dm-devel@redhat.com, eric.dumazet@gmail.com, mst@redhat.com, netdev@vger.kernel.org, jasowang@redhat.com, Randy Dunlap , linux-kernel@vger.kernel.org, Matthew Wilcox , Michal Hocko , linux-mm@kvack.org, edumazet@google.com, Andrew Morton , virtualization@lists.linux-foundation.org, David Miller , Vlastimil Babka Subject: Re: [dm-devel] [PATCH v5] fault-injection: introduce kvmalloc fallback options In-Reply-To: Message-ID: References: <20180421144757.GC14610@bombadil.infradead.org> <20180423151545.GU17484@dhcp22.suse.cz> <20180424170349.GQ17484@dhcp22.suse.cz> <20180424173836.GR17484@dhcp22.suse.cz> <1114eda5-9b1f-4db8-2090-556b4a37c532@infradead.org> <1524694663.4100.21.camel@HansenPartnership.com> User-Agent: Alpine 2.02 (LRH 1266 2009-07-14) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Wed, 25 Apr 2018 22:56:50 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Wed, 25 Apr 2018 22:56:50 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'mpatocka@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 25 Apr 2018, David Rientjes wrote: > On Wed, 25 Apr 2018, Mikulas Patocka wrote: > > > You need to enable it on boot. Enabling it when the kernel starts to > > execute userspace code is already too late (because you would miss > > kvmalloc calls in the kernel boot path). > > Is your motivation that since kvmalloc() never falls back to vmalloc() on > boot because fragmentation is not be an issue at boot that we should catch > bugs where it would matter if it had fallen back? If we are worrying > about falling back to vmalloc before even initscripts have run I think we > have bigger problems. The same driver can be compiled directly into the kernel or be loaded as a module. If the user (or the person preparing distro kernel) compiles the driver directly into the kernel, kvmalloc should be tested on that driver, because a different user or distribution can compile that driver as a module. Mikulas