Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp2233059ima; Mon, 22 Oct 2018 06:36:09 -0700 (PDT) X-Google-Smtp-Source: ACcGV63PSp8WKWqhG/TcA1GYuXimw3hu5AU0kKLNLbOGHDD2rZ0djVOpGEUi7t1foMx4/DK4opnQ X-Received: by 2002:a62:3245:: with SMTP id y66-v6mr36562245pfy.72.1540215369110; Mon, 22 Oct 2018 06:36:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540215369; cv=none; d=google.com; s=arc-20160816; b=Vl9hybsVVuMtST+01REqO6BGTZBqI/GJVhMo+UiuQQI3Fmp9AP2rx7CgFo3/KhwJtQ bqBAUVVj3LHkDu6cl0K0i74OJF7+iq17bQhwRN38j3yDVWvia6+kTXJyAXyX++xEkKba LFEN4gHhoAh6YHnqCXA9Fak4o6BtgGneGS8fkDg7vFftqDY8xgEvtSggjylBf9icerpN l8XFrGXNiBO64CW8t5KOOkwc9zOuQsoBhxZWRRnVFSSyADm/9pqiTBjwud1L9MbhGLzS KEAnrPCA+ngWXejNmMIBej8F9rYTfQtoKWve0Dh/oiRDgWp6DG9dE+vSn2seuaupdQZJ 1T/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=c8oYrdMyYnjsIPiiLs1QRVY+GQxjcS0eq5wUCD//9Cw=; b=lY1gosz4Y9/DFH/QnnKNvspWuPVpNyRIH6aiaoWpTDPO7ALwspkl70I3RE4w/nJicV pFOSePBGknqWIVMxEfK1JdyqH6P7CEuKwgrZslL+fFqYIhRod1YbBXX/ctcZXmZ0CsH7 +ypkhvm2PY5nULaUjhaesT68i0hzkPbDk4esOstvJRyGso/lpQmXKiZq5R5oYOVCR4eb xADUHBnYRv2Q7Eq4Ebdy615wayM16NHECtH3pyzqnqrPnN81aesZeeekR1pXo0wtAava Q1NHdLJiXxgP0Mq916xYCf8eJEL/gp8qy68Coiy5Shc7f/+UZjjwyVjSVvO9RqnRIPP9 nfYw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z20-v6si32762587pfe.245.2018.10.22.06.35.45; Mon, 22 Oct 2018 06:36:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728364AbeJVVKO (ORCPT + 99 others); Mon, 22 Oct 2018 17:10:14 -0400 Received: from mx2.suse.de ([195.135.220.15]:40892 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727210AbeJVVKO (ORCPT ); Mon, 22 Oct 2018 17:10:14 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id B813AAFC0; Mon, 22 Oct 2018 12:51:45 +0000 (UTC) Date: Mon, 22 Oct 2018 14:51:42 +0200 From: Michal Hocko To: "Uladzislau Rezki (Sony)" Cc: Matthew Wilcox , Andrew Morton , linux-mm@kvack.org, LKML , Thomas Garnier , Oleksiy Avramchenko , Steven Rostedt , Joel Fernandes , Thomas Gleixner , Ingo Molnar , Tejun Heo Subject: Re: [RFC PATCH 0/2] improve vmalloc allocation Message-ID: <20181022125142.GD18839@dhcp22.suse.cz> References: <20181019173538.590-1-urezki@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181019173538.590-1-urezki@gmail.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, I haven't read through the implementation yet but I have say that I really love this cover letter. It is clear on intetion, it covers design from high level enough to start discussion and provides a very nice testing coverage. Nice work! I also think that we need a better performing vmalloc implementation long term because of the increasing number of kvmalloc users. I just have two mostly workflow specific comments. > A test-suite patch you can find here, it is based on 4.18 kernel. > ftp://vps418301.ovh.net/incoming/0001-mm-vmalloc-stress-test-suite-v4.18.patch Can you fit this stress test into the standard self test machinery? > It is fixed by second commit in this series. Please see more description in > the commit message of the patch. Bug fixes should go first and new functionality should be built on top. A kernel crash sounds serious enough to have a fix marked for stable. If the fix is too hard/complex then we might consider a revert of the faulty commit. > > 3) This one is related to PCPU allocator(see pcpu_alloc_test()). In that > stress test case i see that SUnreclaim(/proc/meminfo) parameter gets increased, > i.e. there is a memory leek somewhere in percpu allocator. It sounds like > a memory that is allocated by pcpu_get_vm_areas() sometimes is not freed. > Resulting in memory leaking or "Kernel panic": > > ---[ end Kernel panic - not syncing: Out of memory and no killable processes... It would be great to pin point this one down before the rework as well. Thanks a lot! -- Michal Hocko SUSE Labs