Received: by 10.192.165.148 with SMTP id m20csp4989364imm; Tue, 24 Apr 2018 11:43:41 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+3TIXOKJUZhnSiD8Gy+IQ/X+kmOJ7zZuTorbnpj5zKupGbZ9jqpkn5KEniBxMI0X9bCKae X-Received: by 10.99.141.193 with SMTP id z184mr16394136pgd.114.1524595421263; Tue, 24 Apr 2018 11:43:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524595421; cv=none; d=google.com; s=arc-20160816; b=aAuyuDFDlhKkwggJwcoI3ZoOGjB3xNKoV0Fy9E4iZJ3XYKFpdp/cfM1GJ7SAtahPhd /j0r+LDamPDtwo5mOB/Cx75+3IFmbrrNZlJxHiSBU6uTHkiyh3CnjoCExas3tyekDE2i txCzQByFWUBPga1k51jG9rpElMIkU2cwFlmSXq2kkcLyiFOL4L1SHvZ3BvDqbHzqNNjT hgxIyd+VJoJu1nhX7vWZox3q/IAMoyNO3VdvvqnR100vZjtsddMLpnpEXjbdmSHfVcLk F2rD8eb1BdeLhW7UwpzdELthJMog0mKjXuQ5dUlOZOib+6FsfVVCo5thn+oMPu7ZXPiV wttg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=oL8I4ZNKlAihJtGkE3/3Yfi63JyOdGbhNFt42UNMGgA=; b=w+upiahgEch8CPUa18f8NYdMtsbm3a3ll5mVdqQchvQiuSC0U1Jo642a44CirR1+4q 7sJ+SGUzdHD808sxJmZ3JWnE+TJ1EIiTsq27JHLxmiMMyzzIFas8J3Pt+4NOABuAtajJ i9mxqgF0E1a7q8AU+Zm+PV3cv2NPSvJPjxjYP+sQhC83oR8+5Hb74+Msf4oRNCJcZGnY n9mZPofj1FrmEH75uvlYYigg9U6jRVlv9iOQDABf4+AumGT558jfu7nCNbGgOlsOkT/i JbODEw734MgmCr4+aAy469YTbric2V6Eew6UQwOjVdmstys8umWjvDAEGB76B4CSFTyV Jfnw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g7si14229023pfm.106.2018.04.24.11.43.27; Tue, 24 Apr 2018 11:43:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751840AbeDXSlw (ORCPT + 99 others); Tue, 24 Apr 2018 14:41:52 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:59148 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751443AbeDXSlu (ORCPT ); Tue, 24 Apr 2018 14:41:50 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 5562540711B2; Tue, 24 Apr 2018 18:41:49 +0000 (UTC) Received: from file01.intranet.prod.int.rdu2.redhat.com (file01.intranet.prod.int.rdu2.redhat.com [10.11.5.7]) by smtp.corp.redhat.com (Postfix) with ESMTPS id E32A72026990; Tue, 24 Apr 2018 18:41:48 +0000 (UTC) Received: from file01.intranet.prod.int.rdu2.redhat.com (localhost [127.0.0.1]) by file01.intranet.prod.int.rdu2.redhat.com (8.14.4/8.14.4) with ESMTP id w3OIfmuS020942; Tue, 24 Apr 2018 14:41:48 -0400 Received: from localhost (mpatocka@localhost) by file01.intranet.prod.int.rdu2.redhat.com (8.14.4/8.14.4/Submit) with ESMTP id w3OIflWs020938; Tue, 24 Apr 2018 14:41:47 -0400 X-Authentication-Warning: file01.intranet.prod.int.rdu2.redhat.com: mpatocka owned process doing -bs Date: Tue, 24 Apr 2018 14:41:47 -0400 (EDT) From: Mikulas Patocka X-X-Sender: mpatocka@file01.intranet.prod.int.rdu2.redhat.com To: Matthew Wilcox cc: Michal Hocko , David Miller , Andrew Morton , linux-mm@kvack.org, eric.dumazet@gmail.com, edumazet@google.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, mst@redhat.com, jasowang@redhat.com, virtualization@lists.linux-foundation.org, dm-devel@redhat.com, Vlastimil Babka , Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim Subject: Re: [PATCH v3] kvmalloc: always use vmalloc if CONFIG_DEBUG_SG In-Reply-To: <20180424171651.GC30577@bombadil.infradead.org> Message-ID: References: <20180420130852.GC16083@dhcp22.suse.cz> <20180420210200.GH10788@bombadil.infradead.org> <20180421144757.GC14610@bombadil.infradead.org> <20180423151545.GU17484@dhcp22.suse.cz> <20180424034643.GA26636@bombadil.infradead.org> <20180424171651.GC30577@bombadil.infradead.org> User-Agent: Alpine 2.02 (LRH 1266 2009-07-14) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Tue, 24 Apr 2018 18:41:49 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Tue, 24 Apr 2018 18:41:49 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'mpatocka@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 24 Apr 2018, Matthew Wilcox wrote: > On Tue, Apr 24, 2018 at 08:29:14AM -0400, Mikulas Patocka wrote: > > > > > > On Mon, 23 Apr 2018, Matthew Wilcox wrote: > > > > > On Mon, Apr 23, 2018 at 08:06:16PM -0400, Mikulas Patocka wrote: > > > > Some bugs (such as buffer overflows) are better detected > > > > with kmalloc code, so we must test the kmalloc path too. > > > > > > Well now, this brings up another item for the collective TODO list -- > > > implement redzone checks for vmalloc. Unless this is something already > > > taken care of by kasan or similar. > > > > The kmalloc overflow testing is also not ideal - it rounds the size up to > > the next slab size and detects buffer overflows only at this boundary. > > > > Some times ago, I made a "kmalloc guard" patch that places a magic number > > immediatelly after the requested size - so that it can detect overflows at > > byte boundary > > ( https://www.redhat.com/archives/dm-devel/2014-September/msg00018.html ) > > > > That patch found a bug in crypto code: > > ( http://lkml.iu.edu/hypermail/linux/kernel/1409.1/02325.html ) > > Is it still worth doing this, now we have kasan? The kmalloc guard has much lower overhead than kasan. (BTW. when I tried kasan, it oopsed with persistent memory) Mikulas