Received: by 10.192.165.148 with SMTP id m20csp780774imm; Wed, 25 Apr 2018 07:35:15 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+HttvI10zbLSAgVKdkpyq94qdSwuPEF9cB8AKjNfUGGpVtVnp3HpDLVLJ9cqPa4/9i1DmC X-Received: by 10.99.115.78 with SMTP id d14mr12179917pgn.1.1524666914955; Wed, 25 Apr 2018 07:35:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524666914; cv=none; d=google.com; s=arc-20160816; b=mfC97x4bb+QjGVDz40Z2PxV+sVzF/1T1KaajSE0BqKRO/2ETQ0WPdamVMd4XMjZi28 hv+b8IRNiZAYkNgK/mnJhudi6ZBetDRhb8d6jzPHLsA80t5MJpc5F7VMjuNQxFjJZG89 Cyi+HHqy9UCFq6qAqdwmnqujUALW2t0JO5y5ktmZYnsX/3E//B83iyBEBFb5HppMrLCH 0ERqCn+UziTrzgVcFyUDM3u/s/rVBZ3nzC+WSZlQOLEMvX7P12umxaTQHyIUwxD3yS32 6ZqnnWQq6JwzPsTgxz6iza0ZcshGXBPb4VKpuufHPApaSukXfOt0l9Rc+06LucCUWu7A BhwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:thread-index:thread-topic :content-transfer-encoding:mime-version:subject:references :in-reply-to:message-id:cc:to:reply-to:from:date :arc-authentication-results; bh=Xfz04ZUcVk/GThBMr4GwFCETDXvUQBZDEAT/lhvz3uk=; b=bVk0ZhkKIsjyll0d0IZHZMkP5aGuTtFNLmCzoapCaiGih8aezjRX4EwUOvlNDYLlDg KR+ggRUYpknFOk45lqqrPcN7miXZm+Hf1uTUsLnXRIuF/SYSNI+EvHvqh/cy354iCuSf atWtVnzwmVX5wyDEUKzwuFWUQ21WjA/VaEs1lioJBaSib4VjssmLkJFZjn8DFD+YbXZk 1CLAWQDeBvjelCayIAQMTqcCZ+j+KlLiYXj3CvdCpK9TZqHfAL66DOstLe+T6Sc4mMMM 4Dmc3K3NP78QCTf8VIiXnPMuW4lZBlv/0cjeOBOf029H0DT8hZOKBw1BPcpz5aZhZ9/E +rmQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 59-v6si16278137plp.179.2018.04.25.07.34.59; Wed, 25 Apr 2018 07:35:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754594AbeDYOdv (ORCPT + 99 others); Wed, 25 Apr 2018 10:33:51 -0400 Received: from mx1.redhat.com ([209.132.183.28]:37460 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753508AbeDYOdt (ORCPT ); Wed, 25 Apr 2018 10:33:49 -0400 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 8EFD4356CA; Wed, 25 Apr 2018 14:33:49 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.20]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 6EC361001640; Wed, 25 Apr 2018 14:33:49 +0000 (UTC) Received: from zmail23.collab.prod.int.phx2.redhat.com (zmail23.collab.prod.int.phx2.redhat.com [10.5.83.28]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 46A98180596E; Wed, 25 Apr 2018 14:33:49 +0000 (UTC) Date: Wed, 25 Apr 2018 10:33:49 -0400 (EDT) From: Chunyu Hu Reply-To: Chunyu Hu To: Catalin Marinas Cc: Michal Hocko , Chunyu Hu , Dmitry Vyukov , LKML , Linux-MM Message-ID: <978702110.19841228.1524666829157.JavaMail.zimbra@redhat.com> In-Reply-To: <20180425125154.GA29722@MBP.local> References: <1524243513-29118-1-git-send-email-chuhu@redhat.com> <20180422125141.GF17484@dhcp22.suse.cz> <20180424132057.GE17484@dhcp22.suse.cz> <20180424134148.qkvqqa4c37l6irvg@armageddon.cambridge.arm.com> <482146467.19754107.1524649841393.JavaMail.zimbra@redhat.com> <20180425125154.GA29722@MBP.local> Subject: Re: [RFC] mm: kmemleak: replace __GFP_NOFAIL to GFP_NOWAIT in gfp_kmemleak_mask MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Originating-IP: [10.68.5.41, 10.4.195.8] Thread-Topic: kmemleak: replace __GFP_NOFAIL to GFP_NOWAIT in gfp_kmemleak_mask Thread-Index: pBQ/tV+qtZ7HPT+DqawRyrojOrxvAA== X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.30]); Wed, 25 Apr 2018 14:33:49 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ----- Original Message ----- > From: "Catalin Marinas" > To: "Chunyu Hu" > Cc: "Michal Hocko" , "Chunyu Hu" , "Dmitry Vyukov" , > "LKML" , "Linux-MM" > Sent: Wednesday, April 25, 2018 8:51:55 PM > Subject: Re: [RFC] mm: kmemleak: replace __GFP_NOFAIL to GFP_NOWAIT in gfp_kmemleak_mask > > On Wed, Apr 25, 2018 at 05:50:41AM -0400, Chunyu Hu wrote: > > ----- Original Message ----- > > > From: "Catalin Marinas" > > > On Tue, Apr 24, 2018 at 07:20:57AM -0600, Michal Hocko wrote: > > > > On Mon 23-04-18 12:17:32, Chunyu Hu wrote: > > > > [...] > > > > > So if there is a new flag, it would be the 25th bits. > > > > > > > > No new flags please. Can you simply store a simple bool into > > > > fail_page_alloc > > > > and have save/restore api for that? > > > > > > For kmemleak, we probably first hit failslab. Something like below may > > > do the trick: > > > > > > diff --git a/mm/failslab.c b/mm/failslab.c > > > index 1f2f248e3601..63f13da5cb47 100644 > > > --- a/mm/failslab.c > > > +++ b/mm/failslab.c > > > @@ -29,6 +29,9 @@ bool __should_failslab(struct kmem_cache *s, gfp_t > > > gfpflags) > > > if (failslab.cache_filter && !(s->flags & SLAB_FAILSLAB)) > > > return false; > > > > > > + if (s->flags & SLAB_NOLEAKTRACE) > > > + return false; > > > + > > > return should_fail(&failslab.attr, s->object_size); > > > } > > > > This maybe is the easy enough way for skipping fault injection for > > kmemleak slab object. > > This was added to avoid kmemleak tracing itself, so could be used for > other kmemleak-related cases. > > > > Can we get a second should_fail() via should_fail_alloc_page() if a new > > > slab page is allocated? > > > > looking at code path below, what do you mean by getting a second > > should_fail() via fail_alloc_page? > > Kmemleak calls kmem_cache_alloc() on a cache with SLAB_LEAKNOTRACE, so the > first point of failure injection is __should_failslab() which we can > handle with the slab flag. The slab allocator itself ends up calling > alloc_pages() to allocate a slab page (and __GFP_NOFAIL is explicitly > cleared). Here we have the second potential failure injection via Indeed. > fail_alloc_page(). That's unless the order < fail_page_alloc.min_order > which I think is the default case (min_order = 1 while the slab page > allocation for kmemleak would need an order of 0. It's not ideal but we > may get away with it. In my workstation, I checked the value shown is order=2 [mm]# cat /sys/kernel/slab/kmemleak_object/order 2 [mm]# uname -r 4.17.0-rc1.syzcaller+ If order is 2, then not into the branch, no false is returned, so not skipped.. static bool should_fail_alloc_page(gfp_t gfp_mask, unsigned int order) { if (order < fail_page_alloc.min_order) return false; > > > Seems we need to insert the flag between alloc_slab_page and > > alloc_pages()? Without GFP flag, it's difficult to pass info to > > should_fail_alloc_page and keep simple at same time. > > Indeed. > > > Or as Michal suggested, completely disabling page alloc fail injection > > when kmemleak enabled. And enable it again when kmemleak off. > > Dmitry's point was that kmemleak is still useful to detect leaks on the > error path where errors are actually introduced by the fault injection. > Kmemleak cannot cope with allocation failures as it needs a pretty > precise tracking of the allocated objects. understand. > > An alternative could be to not free the early_log buffer in kmemleak and > use that memory in an emergency when allocation fails (though I don't > particularly like this). > > Yet another option is to use NOFAIL and remove NORETRY in kmemleak when > fault injection is enabled. I'm going to have a try this way to see if any warning can be seen when running. This should be the best if it works fine. > > -- > Catalin > -- Regards, Chunyu Hu