Received: by 10.223.185.116 with SMTP id b49csp982793wrg; Wed, 14 Feb 2018 09:47:01 -0800 (PST) X-Google-Smtp-Source: AH8x2253FUbkfdmSFR3RMCUR3gAVg/16tY/GWgIyoH7Yf6HdsU1h6aFzx6tw/ArAgj28ZarQ8UOW X-Received: by 10.98.234.19 with SMTP id t19mr23640pfh.74.1518630421835; Wed, 14 Feb 2018 09:47:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518630421; cv=none; d=google.com; s=arc-20160816; b=kBNXxjvA7viYImSr88jgds2O2I+4gDw5260SjUVt5DqobAPYIRKvJvTaKCFGIrROBe T7eCDdtdUXeENJiyJWNhTe9axZfwIXGrNtdL8sletFmM9TsXOYmA+pjksjiY+IFQ2nXg 6HueYHYr8xdr31/i/OF9iUqPLbva7LrF3RYUBrvpmkU0h6RWWe1pyHF8/Z2zKD6pflen Xn5NGb3uDaGWDuw+9Wa/eHO7mf3qfhoHUPVlQHC98P2jwzLev7NwMT21K7++aFRl8oK/ CoUmBK7Zlfk1NPzgqoBNSGUWp08gCoQURAbuwphoZDbeK+0eVEo5T2JHJer9SsRhwvZQ Na7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=WFFCp+BRx7arc6Cdg27gwwMdre9xHXM51Q91BtBncD0=; b=zeV7AIpUWC8mYoWXzmll3H3izIsLkAvO+X4Kx6k1FfiO6A89YQkBgB+NJgPayg2tXr 80fz0hapvPqxc3Q2pJkJFr4rnNY2L56fqKxMuB1+cyBOzTw9kDjCGSe1S42yWocvq0ix g/E5ZnNnz7Nkc7drPJAHGgx/EQXogEmFSsTAIASGusqORnlUzSJNO5cElXIalwz6/GZl mPhce7XWIR6ExhqqNKKhXHKmcf8hZV9g6l6JxhAcqETamHJuPF9nrauwkAE8zGZmlD5b oJUOuX5Z2331KmcLfeRRruy78oW+FCXncAe2VA3PtWV6WacTLX4UQarCkVWamowBLcV9 SHyg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l1si55042pgn.324.2018.02.14.09.46.46; Wed, 14 Feb 2018 09:47:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161524AbeBNRp5 (ORCPT + 99 others); Wed, 14 Feb 2018 12:45:57 -0500 Received: from www62.your-server.de ([213.133.104.62]:51223 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1161455AbeBNRpj (ORCPT ); Wed, 14 Feb 2018 12:45:39 -0500 Received: from [62.202.221.8] (helo=linux.home) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-SHA:256) (Exim 4.85_2) (envelope-from ) id 1em17c-0003kY-Op; Wed, 14 Feb 2018 18:45:32 +0100 Subject: Re: [PATCH net] bpf: cpumap: use GFP_KERNEL instead of GFP_ATOMIC in __cpu_map_entry_alloc() To: "Michael S. Tsirkin" , Jason Wang Cc: ast@kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Michal Hocko , Matthew Wilcox , Jesper Dangaard Brouer , akpm@linux-foundation.org, dhowells@redhat.com, hannes@cmpxchg.org References: <1518617854-4486-1-git-send-email-jasowang@redhat.com> <20180214190311-mutt-send-email-mst@kernel.org> From: Daniel Borkmann Message-ID: Date: Wed, 14 Feb 2018 18:45:32 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <20180214190311-mutt-send-email-mst@kernel.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.99.3/24314/Wed Feb 14 10:21:29 2018) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/14/2018 06:04 PM, Michael S. Tsirkin wrote: > On Wed, Feb 14, 2018 at 10:17:34PM +0800, Jason Wang wrote: >> There're several implications after commit 0bf7800f1799 ("ptr_ring: >> try vmalloc() when kmalloc() fails") with the using of vmalloc() since >> can't allow GFP_ATOMIC but mandate GFP_KERNEL. This will lead a WARN >> since cpumap try to call with GFP_ATOMIC. Fortunately, entry >> allocation of cpumap can only be done through syscall path which means >> GFP_ATOMIC is not necessary, so fixing this by replacing GFP_ATOMIC >> with GFP_KERNEL. >> >> Reported-by: syzbot+1a240cdb1f4cc88819df@syzkaller.appspotmail.com >> Fixes: 0bf7800f1799 ("ptr_ring: try vmalloc() when kmalloc() fails") >> Cc: Michal Hocko >> Cc: Daniel Borkmann >> Cc: Matthew Wilcox >> Cc: Jesper Dangaard Brouer >> Cc: akpm@linux-foundation.org >> Cc: dhowells@redhat.com >> Cc: hannes@cmpxchg.org >> Signed-off-by: Jason Wang > > Frankly I'd start with the revert. The original patch was rushed > into net without enough justification IMHO, and we just seem to keep > piling up these things. How about deferring all these ideas > to net-next? It's up to you if you think a revert is needed. The below is fine and small enough in any case for cpumap, imho. >> kernel/bpf/cpumap.c | 2 +- >> 1 file changed, 1 insertion(+), 1 deletion(-) >> >> diff --git a/kernel/bpf/cpumap.c b/kernel/bpf/cpumap.c >> index fbfdada6..a4bb0b3 100644 >> --- a/kernel/bpf/cpumap.c >> +++ b/kernel/bpf/cpumap.c >> @@ -334,7 +334,7 @@ static int cpu_map_kthread_run(void *data) >> static struct bpf_cpu_map_entry *__cpu_map_entry_alloc(u32 qsize, u32 cpu, >> int map_id) >> { >> - gfp_t gfp = GFP_ATOMIC|__GFP_NOWARN; >> + gfp_t gfp = GFP_KERNEL | __GFP_NOWARN; >> struct bpf_cpu_map_entry *rcpu; >> int numa, err; >> >> -- >> 2.7.4