[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ZDabMEUFE2N3dvxZ@dhcp22.suse.cz>
Date: Wed, 12 Apr 2023 13:51:12 +0200
From: Michal Hocko <mhocko@...e.com>
To: Jaewon Kim <jaewon31.kim@...sung.com>
Cc: "jstultz@...gle.com" <jstultz@...gle.com>,
"tjmercier@...gle.com" <tjmercier@...gle.com>,
"sumit.semwal@...aro.org" <sumit.semwal@...aro.org>,
"daniel.vetter@...ll.ch" <daniel.vetter@...ll.ch>,
"akpm@...ux-foundation.org" <akpm@...ux-foundation.org>,
"hannes@...xchg.org" <hannes@...xchg.org>,
"linux-mm@...ck.org" <linux-mm@...ck.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"jaewon31.kim@...il.com" <jaewon31.kim@...il.com>
Subject: Re: [PATCH v3] dma-buf/heaps: system_heap: avoid too much allocation
On Wed 12-04-23 20:37:59, Jaewon Kim wrote:
> Limiting dmabuf memory may be required. But I think there
> is no nice and reasonable way so far.
If that is really the way then the patch doesn't really add a big
benefit. It doesn't really prevent OOMs (or panics due to OOM) as the
allocator still allows to consume arbitrary amount of memory. The
provided check is not able to tell between buggy and legit calls.
--
Michal Hocko
SUSE Labs
Powered by blists - more mailing lists