Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp11797ybe; Tue, 3 Sep 2019 16:43:12 -0700 (PDT) X-Google-Smtp-Source: APXvYqx6Hc3KdwTom5Pb+Fcdnkq+fjDHj5vUR3WDWqg8KfMkpZGLY/2qG2pugc1muqR0/lIwY0qv X-Received: by 2002:a17:90a:3524:: with SMTP id q33mr1877646pjb.37.1567554192818; Tue, 03 Sep 2019 16:43:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567554192; cv=none; d=google.com; s=arc-20160816; b=SvcT01tdRE2gNgDf5sYQQ5jS6XnsIj7IzoVCJjZl56ZfaDyuY4EI5reNrI+brwpcCS GMayABks+AUBPkazWMnaqZDdXS9aahrEq+OYSqR0HbWiOHXmpAuOWxa7k5rzhZtcBlC3 i2tbY8Arom03BjNqvoopigHy7OAcahj1vc0al0daMINBhSLAMY7vjHW0BbYHLpKke2v3 Su4FNhI5DiyBMvxeT5fi8YTzgowYNVbpAQ+TI8CJZZwYfMra33hbtMkH1yiHXYxTi7dF d8OEtkMdOsvQVJmls+NifxeLnggOZVIZGhvXj8GPlwkG3zng0CV1w3WvugMXMG2EEYSl aHsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=d3Uvki+kfJgt1m0UONqlkiavQ6oLL7OnGA9HqPCX/bA=; b=CCWerWk6rCo1eu3BDO8TnQ/TTO0ftPuqBWrK+/fniOlLYcX6/zQ20EL+gxN3KYHMcC m6FkxDliux58Yl2xE3kMaC9lKe8ZrbRubLL7/8dLIRyh8jDTgQcO0YAkUlKr3YXLy8MT rLF3t/JBS0rfZ9UYlPRKnWwpuYzXqpfikOvy0vAtLX7Ff0yHQLWEEJFT/AVFpPEka+zD x/n06NEnfTy5H/JjlC0hT/Sfkph84d1qd66dKDGs8+c7Zf+p5iAvJkfgRl/fpkhLqZQ6 6sAy4jC+wWhhqZ3nWQ5ZX3dol3zKuwvksInoVkkJ7HKp+8YDZdpXjUQ7r0BCaNMSXcNG mDhQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@axtens.net header.s=google header.b=AIRHruYm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o21si16264431pll.169.2019.09.03.16.42.56; Tue, 03 Sep 2019 16:43:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@axtens.net header.s=google header.b=AIRHruYm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726925AbfICXmI (ORCPT + 99 others); Tue, 3 Sep 2019 19:42:08 -0400 Received: from mail-pf1-f193.google.com ([209.85.210.193]:44258 "EHLO mail-pf1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725882AbfICXmH (ORCPT ); Tue, 3 Sep 2019 19:42:07 -0400 Received: by mail-pf1-f193.google.com with SMTP id q21so6891924pfn.11 for ; Tue, 03 Sep 2019 16:42:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axtens.net; s=google; h=from:to:cc:subject:in-reply-to:references:date:message-id :mime-version; bh=d3Uvki+kfJgt1m0UONqlkiavQ6oLL7OnGA9HqPCX/bA=; b=AIRHruYm217BkNNbELn4rzWRu2lVdGvFiEuUy9/LBzLsYWn7tEdN22R8Y7Ix3jRzU8 vi11fisWq8csSt4oXJS1lipZtvV1zI0lONGn1udWn9lzDMaQDTMGUVK4vRHDPXY3cGe+ f5BwJ5lmavFRl45vKN4vFDlQq5lLGETQewU3g= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:in-reply-to:references:date :message-id:mime-version; bh=d3Uvki+kfJgt1m0UONqlkiavQ6oLL7OnGA9HqPCX/bA=; b=gtOIe72HZtDKCMWcXlQoRGfZNGDvWyJ2Jgp+RtRnyNNYiiMmd3RYs6EEznuFeaYwgE 6GoJq/jRGPwswZxprk7g/rUh9aaz0AGvsEljeI8ExasFdzi37Eerii0pg+4aWBCMgl/P MlgTk21JLlNApy+W0bzgsUBgjUm4E7vhkzmZq+TCZ/NB8FqKcXdrzesM/QsTenPl5J7T 11AWOsbDutRnXZbuknrTr8Cl5vh9mlizKxrgGHu7uiO3lws5xNa/NVMMsNKFsVtA7Eug IoICCzU92gM1Js0AdarwNtWnXU3EhAAhF8Mcc5eQ6vvCv7zefW3AMSknhEBMOtm8HtNf Tdxw== X-Gm-Message-State: APjAAAXvFrgwKwo2RCIwnb50Azl1WFX0KS1agv8n1CgTFk4+SeHgcXVO 81TCO3s0T/u+36e5f9fKkuNY4A== X-Received: by 2002:a17:90a:cb89:: with SMTP id a9mr1908300pju.93.1567554126677; Tue, 03 Sep 2019 16:42:06 -0700 (PDT) Received: from localhost (ppp167-251-205.static.internode.on.net. [59.167.251.205]) by smtp.gmail.com with ESMTPSA id m24sm6976787pfa.37.2019.09.03.16.42.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Sep 2019 16:42:05 -0700 (PDT) From: Daniel Axtens To: Andrey Konovalov Cc: kasan-dev , Linux Memory Management List , the arch/x86 maintainers , Andrey Ryabinin , Alexander Potapenko , Andy Lutomirski , LKML , Mark Rutland , Dmitry Vyukov , Christophe Leroy , PowerPC , gor@linux.ibm.com Subject: Re: [PATCH v7 5/5] kasan debug: track pages allocated for vmalloc shadow In-Reply-To: References: <20190903145536.3390-1-dja@axtens.net> <20190903145536.3390-6-dja@axtens.net> Date: Wed, 04 Sep 2019 09:41:51 +1000 Message-ID: <87ef0xt0ao.fsf@dja-thinkpad.axtens.net> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Andrey Konovalov writes: > On Tue, Sep 3, 2019 at 4:56 PM Daniel Axtens wrote: >> >> Provide the current number of vmalloc shadow pages in >> /sys/kernel/debug/kasan_vmalloc/shadow_pages. > > Maybe it makes sense to put this into /sys/kernel/debug/kasan/ > (without _vmalloc) and name e.g. vmalloc_shadow_pages? In case we want > to expose more generic KASAN debugging info later. We certainly could. I just wonder if this patch is useful on an ongoing basis. I wrote it to validate my work on lazy freeing of shadow pages - which is why I included it - but I'm not sure it has much ongoing value beyond demonstrating that the freeing code works. If we think it's worth holding on to this patch, I can certainly adjust the paths. Regards, Daniel > >> >> Signed-off-by: Daniel Axtens >> >> --- >> >> Merging this is probably overkill, but I leave it to the discretion >> of the broader community. >> >> On v4 (no dynamic freeing), I saw the following approximate figures >> on my test VM: >> >> - fresh boot: 720 >> - after test_vmalloc: ~14000 >> >> With v5 (lazy dynamic freeing): >> >> - boot: ~490-500 >> - running modprobe test_vmalloc pushes the figures up to sometimes >> as high as ~14000, but they drop down to ~560 after the test ends. >> I'm not sure where the extra sixty pages are from, but running the >> test repeately doesn't cause the number to keep growing, so I don't >> think we're leaking. >> - with vmap_stack, spawning tasks pushes the figure up to ~4200, then >> some clearing kicks in and drops it down to previous levels again. >> --- >> mm/kasan/common.c | 26 ++++++++++++++++++++++++++ >> 1 file changed, 26 insertions(+) >> >> diff --git a/mm/kasan/common.c b/mm/kasan/common.c >> index e33cbab83309..e40854512417 100644 >> --- a/mm/kasan/common.c >> +++ b/mm/kasan/common.c >> @@ -35,6 +35,7 @@ >> #include >> #include >> #include >> +#include >> >> #include >> >> @@ -750,6 +751,8 @@ core_initcall(kasan_memhotplug_init); >> #endif >> >> #ifdef CONFIG_KASAN_VMALLOC >> +static u64 vmalloc_shadow_pages; >> + >> static int kasan_populate_vmalloc_pte(pte_t *ptep, unsigned long addr, >> void *unused) >> { >> @@ -776,6 +779,7 @@ static int kasan_populate_vmalloc_pte(pte_t *ptep, unsigned long addr, >> if (likely(pte_none(*ptep))) { >> set_pte_at(&init_mm, addr, ptep, pte); >> page = 0; >> + vmalloc_shadow_pages++; >> } >> spin_unlock(&init_mm.page_table_lock); >> if (page) >> @@ -829,6 +833,7 @@ static int kasan_depopulate_vmalloc_pte(pte_t *ptep, unsigned long addr, >> if (likely(!pte_none(*ptep))) { >> pte_clear(&init_mm, addr, ptep); >> free_page(page); >> + vmalloc_shadow_pages--; >> } >> spin_unlock(&init_mm.page_table_lock); >> >> @@ -947,4 +952,25 @@ void kasan_release_vmalloc(unsigned long start, unsigned long end, >> (unsigned long)shadow_end); >> } >> } >> + >> +static __init int kasan_init_vmalloc_debugfs(void) >> +{ >> + struct dentry *root, *count; >> + >> + root = debugfs_create_dir("kasan_vmalloc", NULL); >> + if (IS_ERR(root)) { >> + if (PTR_ERR(root) == -ENODEV) >> + return 0; >> + return PTR_ERR(root); >> + } >> + >> + count = debugfs_create_u64("shadow_pages", 0444, root, >> + &vmalloc_shadow_pages); >> + >> + if (IS_ERR(count)) >> + return PTR_ERR(root); >> + >> + return 0; >> +} >> +late_initcall(kasan_init_vmalloc_debugfs); >> #endif >> -- >> 2.20.1 >> >> -- >> You received this message because you are subscribed to the Google Groups "kasan-dev" group. >> To unsubscribe from this group and stop receiving emails from it, send an email to kasan-dev+unsubscribe@googlegroups.com. >> To view this discussion on the web visit https://groups.google.com/d/msgid/kasan-dev/20190903145536.3390-6-dja%40axtens.net.