Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp6313552ybp; Tue, 15 Oct 2019 12:59:14 -0700 (PDT) X-Google-Smtp-Source: APXvYqxNSkfzz5bLtDvzPFCr3ogoHNwMQPnOBYCOi3fsFybuc3sNzKbQqUkRh+cA+A4L16ufPazu X-Received: by 2002:a17:906:2295:: with SMTP id p21mr36153330eja.8.1571169554352; Tue, 15 Oct 2019 12:59:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571169554; cv=none; d=google.com; s=arc-20160816; b=ICkgyWEAo6k0Z8Jtp/BtmVP5nk8p4Tcw/8Yt76Y8virvO8HMlOJNuMAHverR1QwsS2 0tgqbfK7sZMMPmkr6PAawsUYXVj8Fw7bXdd3s6H5dZwOgaO1xNljtgvkGxCtZ/zJoDM9 pDH6J1ymmy74/3So5H+zWhxz9qFsD+Y+SaUMQ34BJkLHRGP/PQqd3C6xv5/ajz3b18hz Cg/cUEG0AkCkxYbEnOXUaXOy9T8FNqZqm3S/CmeQvK35NtzHbQITlltlBkWzicQ92eK1 llXZSaxzvT0twUssPM5lJbXcYutXXyjAnhjVZfca/eoKl1vLvJOETpQLFto1lyDcIadB 5lSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=7czjHeR/FYw7akeQYJ1942FO11nkZtthgVwneKW5uvk=; b=cEqdidhT+ne0p7jUeScTOaze+BBG9l5ukC34fZdOHfJPzzxJZ/ykT6c9liqlKlDSQx 7LovrF9GfbDqPEPHNreXVUoddu1aYEUn1sx0Bu8A+gQFRXK46iUYFuM0hLbojD2bFJzj nP89CYYvoD+tBZidAIqD2F6xna0RlCiW5czqdhAk+p0MsyTAYy+PUSlclhgEw6S7mMke WNUu2QDP/x3EcNQRSr/qRMKpqzPFwB1+fqSh3e8fHKChCZfL0t2bvZA288F5sMTsvWby GT5kG0AIEXtZPvnAN/fQwQwHncIknTfkdlFZcxIVMZkxCiWNTn1dvKswZFSs04PGvxD3 xFtw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel-dk.20150623.gappssmtp.com header.s=20150623 header.b=o9XGBBs9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 57si17046641edz.280.2019.10.15.12.58.51; Tue, 15 Oct 2019 12:59:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel-dk.20150623.gappssmtp.com header.s=20150623 header.b=o9XGBBs9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729326AbfJOQNm (ORCPT + 99 others); Tue, 15 Oct 2019 12:13:42 -0400 Received: from mail-io1-f67.google.com ([209.85.166.67]:41281 "EHLO mail-io1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726689AbfJOQNl (ORCPT ); Tue, 15 Oct 2019 12:13:41 -0400 Received: by mail-io1-f67.google.com with SMTP id n26so47132962ioj.8 for ; Tue, 15 Oct 2019 09:13:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernel-dk.20150623.gappssmtp.com; s=20150623; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=7czjHeR/FYw7akeQYJ1942FO11nkZtthgVwneKW5uvk=; b=o9XGBBs9WdsZoPM4Xp2XRT3UqqzpM17jhvw7ktI5q0Edsw8K2MrsOFEJoH6bMrVb45 k6NlaB5CIDT5y/uhk+bJHPAbIAzdNtZM3XS7ZV0bqt5sXn6osREMH6DDBKgzvCjMizNl uxBMCdAlPDZSzlPBI6UHPnbQPLDOoAtLqYpFulKfCBGQFuSh0fkVttCEjdQiErfDo6PF o1VuVtiCPL1M0JORafeFgSDGfqoVDBGOog5a5CPm1Pca2HQAFliP6+B2trLRWOxf0zyl 6SrvtmOQ9RTZiS68/6r0/pGdaazpjCHBUez6idMJOwu6Wo8dlJvSUrIcpwgfnfmfYReu pdqA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=7czjHeR/FYw7akeQYJ1942FO11nkZtthgVwneKW5uvk=; b=kFttmJiQOFT+ml7kWvNeLRDAtMkmdXn9vVzr8beS4m0LA+jjKsoFHqgMgMW9arUPIX mbt3g/E5ngdtCeYNFpQo0KLMeFksQUpkUFAYlJV68N96BHxBe4V3Br91drbutFNlwO1y IyO+fmv9+4+H81tyNBMSdyOKeZR8HUYkmZDhYvqWj3QBZfWXG7o+MvyR2fZ4hPsgcTH2 XSN0boRDfSdPGCZ+y/yMm6Z6C/i5cX+LGjpvjUdEEGe5hNjkX6wTAezcTCS/l28FFcs1 27bxpTi86sx+FN9iSQSrARqeZZBzVAoSKXBsmNz7ZdHWgqBPV0OdOqVe764L6iJaHOFy l8pQ== X-Gm-Message-State: APjAAAVJtzNorKjrNPeL0mX3VaUBSINklf4lfLNs9G7+/TGxirTj3sH9 T3KHpaOFikq3PRNtwkiCEz3e/A== X-Received: by 2002:a6b:b54a:: with SMTP id e71mr25689901iof.132.1571156020825; Tue, 15 Oct 2019 09:13:40 -0700 (PDT) Received: from [192.168.1.159] ([65.144.74.34]) by smtp.gmail.com with ESMTPSA id q3sm14539813ioi.68.2019.10.15.09.13.39 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 15 Oct 2019 09:13:39 -0700 (PDT) Subject: Re: [PATCH block/for-linus] blkcg: Fix multiple bugs in blkcg_activate_policy() To: Tejun Heo Cc: Julia Lawall , kbuild-all@lists.01.org, linux-kernel@vger.kernel.org, kernel-team@fb.com, linux-block@vger.kernel.org References: <20191015154827.GK18794@devbig004.ftw2.facebook.com> <07cbc404-65db-b236-9ae2-558197b8cdb6@kernel.dk> <20191015160347.GM18794@devbig004.ftw2.facebook.com> From: Jens Axboe Message-ID: <8406cdae-fa26-3db5-f97d-347059cdbc16@kernel.dk> Date: Tue, 15 Oct 2019 10:13:38 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0 MIME-Version: 1.0 In-Reply-To: <20191015160347.GM18794@devbig004.ftw2.facebook.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/15/19 10:03 AM, Tejun Heo wrote: > blkcg_activate_policy() has the following bugs. > > * cf09a8ee19ad ("blkcg: pass @q and @blkcg into > blkcg_pol_alloc_pd_fn()") added @blkcg to ->pd_alloc_fn(); however, > blkcg_activate_policy() ends up using pd's allocated for the root > blkcg for all preallocations, so ->pd_init_fn() for non-root blkcgs > can be passed in pd's which are allocated for the root blkcg. > > For blk-iocost, this means that ->pd_init_fn() can write beyond the > end of the allocated object as it determines the length of the flex > array at the end based on the blkcg's nesting level. > > * Each pd is initialized as they get allocated. If alloc fails, the > policy will get freed with pd's initialized on it. > > * After the above partial failure, the partial pds are not freed. > > This patch fixes all the above issues by > > * Restructuring blkcg_activate_policy() so that alloc and init passes > are separate. Init takes place only after all allocs succeeded and > on failure all allocated pds are freed. > > * Unifying and fixing the cleanup of the remaining pd_prealloc. Great thanks, applied. -- Jens Axboe