Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp821899ybe; Wed, 11 Sep 2019 05:22:01 -0700 (PDT) X-Google-Smtp-Source: APXvYqxs83YF/ZgcWEG379rkxgtpZT3L/ZPr/t58gCI4r/g0/BIJA594hyXqUPW2n2R00ti56Yty X-Received: by 2002:a17:906:660c:: with SMTP id b12mr2268582ejp.102.1568204521509; Wed, 11 Sep 2019 05:22:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568204521; cv=none; d=google.com; s=arc-20160816; b=HWnrGVtV9CIUEh7HjPSAzZr3MJDnWUs9z6pBittcmyfhf9CfjptaQM5qRLOSOd8wQl DqY/9qv6rzSf2wTcxOLiRw++3nnXXH9nkeTyFAMP28/L2DhPl7QopiXr6Y5WWgaZBobz glpppe30B/y5X40YDlq60VXg/Jhw9LTohR0i/QupTLaCMnKR/1DLsxu+I5yzB3PATRkW vNadrrjDiVKln6s+qaiZEuJGrkrVqB3cKtQD6MejBDPwQFNcnuvGj9kPdXI+CIpYkCnS WCLH8KLAe8+EhHrMse5Una53H1sm+n0j8ZR81vGLAWg+qfKiLsZKa8nFwrgyodq1Txcy ebig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=hb9FR2DoYNvQB+rUk3ej3ejEydMBhwpkvkUJWbW/cEg=; b=ui1OCeHCXgF0dOmUP9gLZFxgjihoO0gD4WZltXK4exIohLxRd71U+oTqb7PR8tA7UK tRRT62avuTjPnujEkrD8XQkxjK01PrLIF1++sRaHlH/zfoS2H3fFoCovavSLQb5aTQTu XZ9Pqs+/1ej3pPqLPmCOtA/kZZ4Zg4l8qIeCounb1ObtO7dWnEMwmzO+KifUx36gi60z 0RDBkT/LFLpirR8bikTrlo4oKbT1BiZ8w2EabIqw3oLs+1K8wOaX7iVUe+FxtY14yAD6 ovU5AaXNLOV5t3DhfRqjmOvqGGIPxmweaic5KTqJm8TPZ4/2nPQlYPeExkSH6euef2my 7NsQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x15si13362675eda.53.2019.09.11.05.21.36; Wed, 11 Sep 2019 05:22:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727740AbfIKMTp (ORCPT + 99 others); Wed, 11 Sep 2019 08:19:45 -0400 Received: from mx2.suse.de ([195.135.220.15]:58008 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726911AbfIKMTp (ORCPT ); Wed, 11 Sep 2019 08:19:45 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 2C828B667; Wed, 11 Sep 2019 12:19:42 +0000 (UTC) Date: Wed, 11 Sep 2019 14:19:41 +0200 From: Michal Hocko To: "Michael S. Tsirkin" Cc: Alexander Duyck , Alexander Duyck , virtio-dev@lists.oasis-open.org, kvm list , Catalin Marinas , David Hildenbrand , Dave Hansen , LKML , Matthew Wilcox , linux-mm , Andrew Morton , will@kernel.org, linux-arm-kernel@lists.infradead.org, Oscar Salvador , Yang Zhang , Pankaj Gupta , Konrad Rzeszutek Wilk , Nitesh Narayan Lal , Rik van Riel , lcapitulino@redhat.com, "Wang, Wei W" , Andrea Arcangeli , ying.huang@intel.com, Paolo Bonzini , Dan Williams , Fengguang Wu , "Kirill A. Shutemov" Subject: Re: [PATCH v9 0/8] stg mail -e --version=v9 \ Message-ID: <20190911121941.GU4023@dhcp22.suse.cz> References: <20190907172225.10910.34302.stgit@localhost.localdomain> <20190910124209.GY2063@dhcp22.suse.cz> <20190910144713.GF2063@dhcp22.suse.cz> <20190910175213.GD4023@dhcp22.suse.cz> <1d7de9f9f4074f67c567dbb4cc1497503d739e30.camel@linux.intel.com> <20190911113619.GP4023@dhcp22.suse.cz> <20190911080804-mutt-send-email-mst@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190911080804-mutt-send-email-mst@kernel.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 11-09-19 08:08:38, Michael S. Tsirkin wrote: > On Wed, Sep 11, 2019 at 01:36:19PM +0200, Michal Hocko wrote: > > On Tue 10-09-19 14:23:40, Alexander Duyck wrote: > > [...] > > > We don't put any limitations on the allocator other then that it needs to > > > clean up the metadata on allocation, and that it cannot allocate a page > > > that is in the process of being reported since we pulled it from the > > > free_list. If the page is a "Reported" page then it decrements the > > > reported_pages count for the free_area and makes sure the page doesn't > > > exist in the "Boundary" array pointer value, if it does it moves the > > > "Boundary" since it is pulling the page. > > > > This is still a non-trivial limitation on the page allocation from an > > external code IMHO. I cannot give any explicit reason why an ordering on > > the free list might matter (well except for page shuffling which uses it > > to make physical memory pattern allocation more random) but the > > architecture seems hacky and dubious to be honest. It shoulds like the > > whole interface has been developed around a very particular and single > > purpose optimization. > > > > I remember that there was an attempt to report free memory that provided > > a callback mechanism [1], which was much less intrusive to the internals > > of the allocator yet it should provide a similar functionality. Did you > > see that approach? How does this compares to it? Or am I completely off > > when comparing them? > > > > [1] mostly likely not the latest version of the patchset > > http://lkml.kernel.org/r/1502940416-42944-5-git-send-email-wei.w.wang@intel.com > > Linus nacked that one. He thinks invoking callbacks with lots of > internal mm locks is too fragile. I would be really curious how much he would be happy about injecting other restrictions on the allocator like this patch proposes. This is more intrusive as it has a higher maintenance cost longterm IMHO. -- Michal Hocko SUSE Labs