From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pl0-f69.google.com (mail-pl0-f69.google.com [209.85.160.69]) by kanga.kvack.org (Postfix) with ESMTP id 457226B0003 for ; Mon, 21 May 2018 18:12:36 -0400 (EDT) Received: by mail-pl0-f69.google.com with SMTP id bd7-v6so10837591plb.20 for ; Mon, 21 May 2018 15:12:36 -0700 (PDT) Received: from mga05.intel.com (mga05.intel.com. [192.55.52.43]) by mx.google.com with ESMTPS id ba9-v6si15142653plb.110.2018.05.21.15.12.34 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 21 May 2018 15:12:34 -0700 (PDT) Subject: Re: Why do we let munmap fail? References: From: Dave Hansen Message-ID: Date: Mon, 21 May 2018 15:12:32 -0700 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org List-ID: To: Daniel Colascione , linux-mm@kvack.org Cc: Tim Murray , Minchan Kim On 05/21/2018 03:07 PM, Daniel Colascione wrote: > Now let's return to max_map_count itself: what is it supposed to achieve? > If we want to limit application kernel memory resource consumption, let's > limit application kernel memory resource consumption, accounting for it on > a byte basis the same way we account for other kernel objects allocated on > behalf of userspace. Why should we have a separate cap just for the VMA > count? VMAs consume kernel memory and we can't reclaim them. That's what it boils down to.