Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4450223pxj; Tue, 25 May 2021 08:16:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJysbi9C3FU55kolde7qJ+xyjgMYl3YYZQ96zi2Dwkw8vOCyEvpR9TEoW4Aa7aqLzH7ZraO6 X-Received: by 2002:a17:906:fa90:: with SMTP id lt16mr28784485ejb.411.1621955786384; Tue, 25 May 2021 08:16:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621955786; cv=none; d=google.com; s=arc-20160816; b=CnvMxYdHTgvmPtusjR7cVRB8K1prPr1lszWpcfdoWe4qlw6TXdOr6MyeUq0Z22RBkE d9agjVhvbrqELrNDuVa3lAu5LUCFqj9OaDT31nCzVT8od7oUZqUsGZY9MacQpBclAiMx NTIi/b7dYhjktVTiLWl4tOUnXjHJeqVCWAbPwe/IdlQ5yaKoegoAEaueqgZVTrwLHCzo zMNr2LaGROnUJum1Yhgp5DLIINpGQOhvIfH8vQ+6U9yirddDSVGTlZHWTiPDVcw0/mOl o0x7d+vkaJlrahS9KIuF0fIR//TbpEX93JzdW7eGiMzC6b+vllkusFpzeehKRzFz6Ek2 R3vg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=HJlOkP4mUju/dPSLB8GTqn+x4pJGw5nCk0+jhsMw2Yk=; b=s0Y4t0g5g8Dkaf/ROMayvRKPpgOILaQF3oFTKoQMrkmZhwuS/YCzQliylk5hrI0n1f dK4HPDs2Nt+TnzG4M1BEBlKa3KHvaLUDGs5w4at+v3dwPoIDtbufSeKzX4v62lMNlmQX quB7LgvjKbYKXhL+Jdt6ToBtBx+3No7p+HoYNWTDLVDUwCXB12/z8GleUE8beZUthSuJ sEEZ0SSJls3/hT4RXqsrvfF46jlbJudSZljMTKJr8zqhTim3WpIyDB5uJsyMw+trIVFw pzXVDKzAfAEMDRUccbwjeyY1tyIgSuJs2iEurAtNaG0sn7cG02asqQvIJwyllPGDOI3i wasA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g14si15706795edr.106.2021.05.25.08.15.38; Tue, 25 May 2021 08:16:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230226AbhEYKO5 (ORCPT + 99 others); Tue, 25 May 2021 06:14:57 -0400 Received: from outbound-smtp17.blacknight.com ([46.22.139.234]:39243 "EHLO outbound-smtp17.blacknight.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230418AbhEYKOw (ORCPT ); Tue, 25 May 2021 06:14:52 -0400 Received: from mail.blacknight.com (pemlinmail02.blacknight.ie [81.17.254.11]) by outbound-smtp17.blacknight.com (Postfix) with ESMTPS id 9CA181C3C35 for ; Tue, 25 May 2021 11:13:21 +0100 (IST) Received: (qmail 17676 invoked from network); 25 May 2021 10:13:21 -0000 Received: from unknown (HELO techsingularity.net) (mgorman@techsingularity.net@[84.203.23.168]) by 81.17.254.9 with ESMTPSA (AES256-SHA encrypted, authenticated); 25 May 2021 10:13:21 -0000 Date: Tue, 25 May 2021 11:13:20 +0100 From: Mel Gorman To: Vlastimil Babka Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, Christoph Lameter , David Rientjes , Pekka Enberg , Joonsoo Kim , Sebastian Andrzej Siewior , Thomas Gleixner , Jesper Dangaard Brouer , Peter Zijlstra , Jann Horn Subject: Re: [RFC 01/26] mm, slub: allocate private object map for sysfs listings Message-ID: <20210525101320.GJ30378@techsingularity.net> References: <20210524233946.20352-1-vbabka@suse.cz> <20210524233946.20352-2-vbabka@suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline In-Reply-To: <20210524233946.20352-2-vbabka@suse.cz> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 25, 2021 at 01:39:21AM +0200, Vlastimil Babka wrote: > Slub has a static spinlock protected bitmap for marking which objects are on > freelist when it wants to list them, for situations where dynamically > allocating such map can lead to recursion or locking issues, and on-stack > bitmap would be too large. > > The handlers of sysfs files alloc_calls and free_calls also currently use this > shared bitmap, but their syscall context makes it straightforward to allocate a > private map before entering locked sections, so switch these processing paths > to use a private bitmap. > > Signed-off-by: Vlastimil Babka Acked-by: Mel Gorman -- Mel Gorman SUSE Labs