Received: by 2002:a05:6602:2086:0:0:0:0 with SMTP id a6csp4619860ioa; Wed, 27 Apr 2022 07:37:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyN3jOEaJkz6Ys1gkosbcOiR0SyTiZzi/g06ccG8cGlh6RFDJpkA3hC9WUZA9SIUECJ1lcN X-Received: by 2002:a63:4e45:0:b0:39d:4d2d:815e with SMTP id o5-20020a634e45000000b0039d4d2d815emr23894843pgl.198.1651070256671; Wed, 27 Apr 2022 07:37:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651070256; cv=none; d=google.com; s=arc-20160816; b=ySUFdTPWeiAB/85w6j15eTrK+Wpu0PrktuRQ5NMQdRqg89KOsZFML0cfPeyyomhM0m vIDFfm8IY7cNJCRIByMT7b0t76fj/znl6gfU2+r+wX4dGYps6x3ec5RMoTr/mJ0GK98k x/01veMQyGP4p/iHRIZ37YzsUyZgHqOQluBLvBvmPe0esXaiHoCquBcVTTvmFy5ElGp/ 9YYCWx56BZmkPkyvkKah8yGdgQ7ozqBugdNSRNM+X2x54sD8MilMTkjezHeRBfeu50q0 zQpBpjQXPuZs1qk7BZRDluXxLJwZaO2YfbDeKHIqbqWUv0lil9DZa3tiT7qEy768nTlZ BZbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=qG8YIn3JE35g9Ne+urDhvDL4HbkCFi0xkUxB0TL6o3I=; b=NL2xSJGG4tYdkOMfYouy1ihNu6zXYY1nnWmwOYNA++ykbOeNugtfti/zofOy7pXDsD 94xai5sjKB3guNJwzNwEDxu2m+laHLuKJOoK9xx8ijEz2hS6BNas5de5oMVMav+tSUMH soyQW6QUcYoYit1XCNPNi9tPBUf43lXaX6QEcYqPXFYpvxRgYvgrnIs8J8zWe2iptjWL ekje82qfZxkb4bJtFPWgAl9qSDa9ytHF567X6v9BI9h4AW5bf7Ys0mLbfN/ChwIERK0F ScGYBwdFVXO0aPgpMui+jGOnKplLIj8jHgAKrWqGnXImQuAR838vzRjkzMRVlWeKVKR5 f25w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=FagGEF92; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id e11-20020a17090301cb00b0015a16b86c56si2246954plh.81.2022.04.27.07.37.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Apr 2022 07:37:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=FagGEF92; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id E51EC4F464; Wed, 27 Apr 2022 07:09:38 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237308AbiD0OMo (ORCPT + 99 others); Wed, 27 Apr 2022 10:12:44 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55852 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237259AbiD0OMn (ORCPT ); Wed, 27 Apr 2022 10:12:43 -0400 Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9FD534EF58; Wed, 27 Apr 2022 07:09:31 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id DA6CE1F37B; Wed, 27 Apr 2022 14:09:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1651068569; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=qG8YIn3JE35g9Ne+urDhvDL4HbkCFi0xkUxB0TL6o3I=; b=FagGEF9266faGYZUHMQ7LBbOYJ6Buy1ny6xrAtyvD5345V/OyTl5AOYA8+hHWKvYXPZLMK rm8B6wrD7trua5Vddbu7bWthowMxia9peAgV7nb6c44uDpqNIvs26PjxF7HLsaI5dPeQW6 fItKqnIsFzukl0ZnrGQUDIED8UGpC6c= Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 9D37C13A39; Wed, 27 Apr 2022 14:09:29 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id sNVVJZlOaWLLbQAAMHmgww (envelope-from ); Wed, 27 Apr 2022 14:09:29 +0000 Date: Wed, 27 Apr 2022 16:09:28 +0200 From: Michal =?iso-8859-1?Q?Koutn=FD?= To: David Vernet Cc: akpm@linux-foundation.org, tj@kernel.org, roman.gushchin@linux.dev, linux-kernel@vger.kernel.org, linux-mm@kvack.org, cgroups@vger.kernel.org, hannes@cmpxchg.org, mhocko@kernel.org, shakeelb@google.com, kernel-team@fb.com, Richard Palethorpe Subject: Re: [PATCH v2 2/5] cgroup: Account for memory_recursiveprot in test_memcg_low() Message-ID: <20220427140928.GD9823@blackbody.suse.cz> References: <20220423155619.3669555-1-void@manifault.com> <20220423155619.3669555-3-void@manifault.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220423155619.3669555-3-void@manifault.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello David. On Sat, Apr 23, 2022 at 08:56:19AM -0700, David Vernet wrote: > This unfortunately broke the memcg tests, which asserts that a sibling > that experienced reclaim but had a memory.low value of 0, would not > observe any memory.low events. This patch updates test_memcg_low() to > account for the new behavior introduced by memory_recursiveprot. I think the test is correct, there should be no (not even recursive) protection in this particular case (when the remaining siblings consume all of parental protection). This should be fixed in the kernel (see also [1], no updates from me yet :-/) Michal [1] https://lore.kernel.org/lkml/20220322182248.29121-1-mkoutny@suse.com/