Received: by 10.192.165.148 with SMTP id m20csp483837imm; Wed, 25 Apr 2018 02:52:33 -0700 (PDT) X-Google-Smtp-Source: AB8JxZr/LDhzm8y4G1WZxISuFRpdV/gvbuigdu/chb4/ZDqY4jRucX99zIda6BJufArqXQ3OuG4O X-Received: by 2002:a17:902:d882:: with SMTP id b2-v6mr4870247plz.381.1524649953486; Wed, 25 Apr 2018 02:52:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524649953; cv=none; d=google.com; s=arc-20160816; b=AraIBQCnX0J4r0SN4//aArxdEfXvW/PVI91ihBX1OhuxUnE0lZfMkp/8rgQ3SJQStN +SaUtQq9MVBxjQFBixhW3/ZkT34rUYEpIqaWzzpq8aQUKv/DfbT3Y6g6jDWWsp7ISC76 mtyywlc3bP3ZpFQ6eeXrprPNUsKOIaJ6g9sbihhVbZeqrJh4gAIjWk+gR4vdSoHLV3b3 TvveVyztforNMWADatPOqQC0FMRHp49pzL9YkQlqxXYEaCpL5FsrweuR84BbMGc4Znnc p+s0BEdwYjsV2g46/GnPn2Bat6FPWi4mlQSaHEJLlKz67fkLYMptlO8HIjMFsMGDIDdC 6OeQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:thread-index:thread-topic :content-transfer-encoding:mime-version:subject:references :in-reply-to:message-id:cc:to:reply-to:from:date :arc-authentication-results; bh=2sXDMiFHafkJhtDxlobV6CHA8OMrarz0V2l3/yjUBR4=; b=XzSQIHBOSCD3PgZ9sf/IPik3ANfbvB8L+qE7JNBgSnPWf7UKd3v+6V9X4d21R/Dyi2 3olv8aePVePqK7k6Nvdo99rFsD04EnOVEEirwEbIGZnhAp/rxVvWDgL7Fxh27R+SGBY1 Hj/82wvcCjdedaFzWr3Q3oNK/0Yc13rHNPnRDrqAmCkIvZxiGGpbAz8EnmLODupJh2ac T14VpW2VjxclnRismpyawn+6KlMo4Xz/bmN+MhksDtkeW7tyjtRVkazNFVo7sH02qf1S Lsim8xAXMyFtckRd53pKejW7oZ3Ubjsh5GcmkepE0ZeB0Q73G/NB19XYZxE8Fb8AGpQs d/vA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 37-v6si15730085plq.288.2018.04.25.02.52.19; Wed, 25 Apr 2018 02:52:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751647AbeDYJur (ORCPT + 99 others); Wed, 25 Apr 2018 05:50:47 -0400 Received: from mx1.redhat.com ([209.132.183.28]:40256 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751353AbeDYJum (ORCPT ); Wed, 25 Apr 2018 05:50:42 -0400 Received: from smtp.corp.redhat.com (int-mx12.intmail.prod.int.phx2.redhat.com [10.5.11.27]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 1128A30FA02F; Wed, 25 Apr 2018 09:50:42 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id DAB911BCE2; Wed, 25 Apr 2018 09:50:41 +0000 (UTC) Received: from zmail23.collab.prod.int.phx2.redhat.com (zmail23.collab.prod.int.phx2.redhat.com [10.5.83.28]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 9A4B04CA9E; Wed, 25 Apr 2018 09:50:41 +0000 (UTC) Date: Wed, 25 Apr 2018 05:50:41 -0400 (EDT) From: Chunyu Hu Reply-To: Chunyu Hu To: Catalin Marinas Cc: Michal Hocko , Chunyu Hu , Dmitry Vyukov , LKML , Linux-MM Message-ID: <482146467.19754107.1524649841393.JavaMail.zimbra@redhat.com> In-Reply-To: <20180424134148.qkvqqa4c37l6irvg@armageddon.cambridge.arm.com> References: <1524243513-29118-1-git-send-email-chuhu@redhat.com> <20180420175023.3c4okuayrcul2bom@armageddon.cambridge.arm.com> <20180422125141.GF17484@dhcp22.suse.cz> <20180424132057.GE17484@dhcp22.suse.cz> <20180424134148.qkvqqa4c37l6irvg@armageddon.cambridge.arm.com> Subject: Re: [RFC] mm: kmemleak: replace __GFP_NOFAIL to GFP_NOWAIT in gfp_kmemleak_mask MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Originating-IP: [10.68.5.41, 10.4.195.2] Thread-Topic: kmemleak: replace __GFP_NOFAIL to GFP_NOWAIT in gfp_kmemleak_mask Thread-Index: uXmCgClxRLoW8QmHLoEoZBP1sasVfA== X-Scanned-By: MIMEDefang 2.84 on 10.5.11.27 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.43]); Wed, 25 Apr 2018 09:50:42 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ----- Original Message ----- > From: "Catalin Marinas" > To: "Michal Hocko" > Cc: "Chunyu Hu" , "Dmitry Vyukov" , "Chunyu Hu" , "LKML" > , "Linux-MM" > Sent: Tuesday, April 24, 2018 9:41:48 PM > Subject: Re: [RFC] mm: kmemleak: replace __GFP_NOFAIL to GFP_NOWAIT in gfp_kmemleak_mask > > On Tue, Apr 24, 2018 at 07:20:57AM -0600, Michal Hocko wrote: > > On Mon 23-04-18 12:17:32, Chunyu Hu wrote: > > [...] > > > So if there is a new flag, it would be the 25th bits. > > > > No new flags please. Can you simply store a simple bool into > > fail_page_alloc > > and have save/restore api for that? > > For kmemleak, we probably first hit failslab. Something like below may > do the trick: > > diff --git a/mm/failslab.c b/mm/failslab.c > index 1f2f248e3601..63f13da5cb47 100644 > --- a/mm/failslab.c > +++ b/mm/failslab.c > @@ -29,6 +29,9 @@ bool __should_failslab(struct kmem_cache *s, gfp_t > gfpflags) > if (failslab.cache_filter && !(s->flags & SLAB_FAILSLAB)) > return false; > > + if (s->flags & SLAB_NOLEAKTRACE) > + return false; > + > return should_fail(&failslab.attr, s->object_size); > } This maybe is the easy enough way for skipping fault injection for kmemleak slab object. > > > Can we get a second should_fail() via should_fail_alloc_page() if a new > slab page is allocated? looking at code path blow, what do you mean by getting a second should_fail() via fail_alloc_page? Seems we need to insert the flag between alloc_slab_page and alloc_pages()? Without GFP flag, it's difficult to pass info to should_fail_alloc_page and keep simple at same time. Or as Michal suggested, completely disabling page alloc fail injection when kmemleak enabled. And enable it again when kmemleak off. alloc_slab_page <========= flag to change the behavior of should_fail_alloc_page alloc_pages alloc_pages_current __alloc_pages_nodemask prepare_alloc_pages should_fail_alloc_page > > -- > Catalin > -- Regards, Chunyu Hu