Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp3476174ybl; Mon, 27 Jan 2020 04:53:19 -0800 (PST) X-Google-Smtp-Source: APXvYqzBD2rRZZ7iI1+AyY+PO/ocFPFbiG1OgDQtKivOyVhdzaXY2kogf/MAREO0V2q7thPKdZvO X-Received: by 2002:a05:6830:1608:: with SMTP id g8mr11858129otr.169.1580129599594; Mon, 27 Jan 2020 04:53:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580129599; cv=none; d=google.com; s=arc-20160816; b=T0uhsPIr3Cxop7XPu0KH8NckQLn1+bdiuzorn7JM4gbOZr0lAsvfYjxGg6B/k4Gh8H WQ1Ymz3w4noj6WeQhK/Nbgvl5NOlKWgiDwb3YUVgN6ji2iBrYNWL8KqM14s6wQI6QhYp IgCV44cBYIpo+GKqM99y2/tmQ7scaAHSbDkWn8yDJq/2w+ZrVCIDK2xtLe81LkxP0q6P b5SJhmobQ4jqeXruPlE1YI0SArGviGfm5hL8v7+pMMxEwUjna6w842hueqx7zCRj548q aWTi+Gao6YLshXzuMmcO+BOZQtk8fObEAHvADbKo/WMu1PXpULHEWkHhooU2zsGqg7h6 lM+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=L7X1k4eDAf2P7uN6axSXlVdpMKiQS7N+GE/E26wcBNA=; b=hlATpB6BGt0o0UWidP9eNB0G5IqtRt9qQ432n2qj63YeNrHOe7tdkfDYf3ObPXTN13 FSeCR0ymjWCYxzqp5UTPcK01iXRAdAIVb5csrtLfvlsxXmYgmyyoJwtR6ifXITUY+70M YvuTCkWAU/O0XfBowJeyB2g1oXCPNjgAeVx7bK4CftFRtzgdOTvlb4ZP2IFHH9QdTakc PYVdnDdqbSWl7K1K+1VTDNP7+fes80n15nTskDIrMh5OYF84AgB4dtEuL9K+OfbKHSWZ kByK8sukk5JeaGysnQsYLUjwsQhWMFpPtUFesC2YiMX3nkMDclAu2miAEOW4qrxFMkoI RIKw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@yandex-team.ru header.s=default header.b=za+d3Q3d; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.ru Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g10si7033017otn.12.2020.01.27.04.53.08; Mon, 27 Jan 2020 04:53:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@yandex-team.ru header.s=default header.b=za+d3Q3d; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.ru Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730478AbgA0Mvo (ORCPT + 99 others); Mon, 27 Jan 2020 07:51:44 -0500 Received: from forwardcorp1j.mail.yandex.net ([5.45.199.163]:50126 "EHLO forwardcorp1j.mail.yandex.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726145AbgA0Mvn (ORCPT ); Mon, 27 Jan 2020 07:51:43 -0500 Received: from mxbackcorp1g.mail.yandex.net (mxbackcorp1g.mail.yandex.net [IPv6:2a02:6b8:0:1402::301]) by forwardcorp1j.mail.yandex.net (Yandex) with ESMTP id 4E5BE2E0DBD; Mon, 27 Jan 2020 15:51:39 +0300 (MSK) Received: from sas2-3e4aeb094591.qloud-c.yandex.net (sas2-3e4aeb094591.qloud-c.yandex.net [2a02:6b8:c08:7192:0:640:3e4a:eb09]) by mxbackcorp1g.mail.yandex.net (mxbackcorp/Yandex) with ESMTP id eB2c93SM0d-pbmSUpmb; Mon, 27 Jan 2020 15:51:39 +0300 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex-team.ru; s=default; t=1580129499; bh=L7X1k4eDAf2P7uN6axSXlVdpMKiQS7N+GE/E26wcBNA=; h=In-Reply-To:Message-ID:From:Date:References:To:Subject:Cc; b=za+d3Q3ddLp2bCGEeG0c8t8kr4cMsda8ABQqy2IgPO1/REOg6oFUg0BfzdhXnuT9U I5SJvFpLCPPY9SPTAg1YL/0ArT/bkIKqDqPVUVwXP3bBhVC3aAklSGPE2d63q7XEG0 gnhicVcgLZA9UCNGWlLp2zpKMGrfshFA90J71yR4= Authentication-Results: mxbackcorp1g.mail.yandex.net; dkim=pass header.i=@yandex-team.ru Received: from dynamic-red.dhcp.yndx.net (dynamic-red.dhcp.yndx.net [2a02:6b8:0:40c:8448:fbcc:1dac:c863]) by sas2-3e4aeb094591.qloud-c.yandex.net (smtpcorp/Yandex) with ESMTPSA id 4ycFeB9RGg-pbYaAS3o; Mon, 27 Jan 2020 15:51:37 +0300 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client certificate not present) Subject: Re: [PATCH 1/1] mm: sysctl: add panic_on_mm_error sysctl To: Grzegorz Halat , linux-kernel@vger.kernel.org Cc: linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, linux-doc@vger.kernel.org, ssaner@redhat.com, atomlin@redhat.com, oleksandr@redhat.com, vbendel@redhat.com, kirill@shutemov.name, borntraeger@de.ibm.com, Andrew Morton , Iurii Zaikin , Kees Cook , Luis Chamberlain , Jonathan Corbet References: <20200127101100.92588-1-ghalat@redhat.com> From: Konstantin Khlebnikov Message-ID: Date: Mon, 27 Jan 2020 15:51:37 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.2 MIME-Version: 1.0 In-Reply-To: <20200127101100.92588-1-ghalat@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-CA Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 27/01/2020 13.11, Grzegorz Halat wrote: > Memory management subsystem performs various checks at runtime, > if an inconsistency is detected then such event is being logged and kernel > continues to run. While debugging such problems it is helpful to collect > memory dump as early as possible. Currently, there is no easy way to panic > kernel when such error is detected. > > It was proposed[1] to panic the kernel if panic_on_oops is set but this > approach was not accepted. One of alternative proposals was introduction of > a new sysctl. > > The patch adds panic_on_mm_error sysctl. If the sysctl is set then the > kernel will be crashed when an inconsistency is detected by memory > management. This currently means panic when bad page or bad PTE > is detected(this may be extended to other places in MM). > > Another use case of this sysctl may be in security-wise environments, > it may be more desired to crash machine than continue to run with > potentially damaged data structures. > > [1] https://marc.info/?l=linux-mm&m=142649500728327&w=2 > > Signed-off-by: Grzegorz Halat > --- > Documentation/admin-guide/sysctl/kernel.rst | 12 ++++++++++++ > include/linux/kernel.h | 1 + > kernel/sysctl.c | 9 +++++++++ > mm/memory.c | 7 +++++++ > mm/page_alloc.c | 4 +++- > 5 files changed, 32 insertions(+), 1 deletion(-) > > diff --git a/Documentation/admin-guide/sysctl/kernel.rst b/Documentation/admin-guide/sysctl/kernel.rst > index def074807cee..2fecd6b2547e 100644 > --- a/Documentation/admin-guide/sysctl/kernel.rst > +++ b/Documentation/admin-guide/sysctl/kernel.rst > @@ -61,6 +61,7 @@ show up in /proc/sys/kernel: > - overflowgid > - overflowuid > - panic > +- panic_on_mm_error > - panic_on_oops > - panic_on_stackoverflow > - panic_on_unrecovered_nmi > @@ -611,6 +612,17 @@ an IO error. > and you can use this option to take a crash dump. > > > +panic_on_mm_error: > +============== > + > +Controls the kernel's behaviour when inconsistency is detected > +by memory management code, for example bad page state or bad PTE. > + > +0: try to continue operation. > + > +1: panic immediately. > + > + > panic_on_oops: > ============== > > diff --git a/include/linux/kernel.h b/include/linux/kernel.h > index 0d9db2a14f44..5f9d408512ff 100644 > --- a/include/linux/kernel.h > +++ b/include/linux/kernel.h > @@ -518,6 +518,7 @@ extern int oops_in_progress; /* If set, an oops, panic(), BUG() or die() is in > extern int panic_timeout; > extern unsigned long panic_print; > extern int panic_on_oops; > +extern int panic_on_mm_error; > extern int panic_on_unrecovered_nmi; > extern int panic_on_io_nmi; > extern int panic_on_warn; > diff --git a/kernel/sysctl.c b/kernel/sysctl.c > index 70665934d53e..6477e1cce28b 100644 > --- a/kernel/sysctl.c > +++ b/kernel/sysctl.c > @@ -1238,6 +1238,15 @@ static struct ctl_table kern_table[] = { > .extra1 = SYSCTL_ZERO, > .extra2 = SYSCTL_ONE, > }, > + { > + .procname = "panic_on_mm_error", > + .data = &panic_on_mm_error, > + .maxlen = sizeof(int), > + .mode = 0644, > + .proc_handler = proc_dointvec_minmax, > + .extra1 = SYSCTL_ZERO, > + .extra2 = SYSCTL_ONE, > + }, > #if defined(CONFIG_SMP) && defined(CONFIG_NO_HZ_COMMON) > { > .procname = "timer_migration", > diff --git a/mm/memory.c b/mm/memory.c > index 45442d9a4f52..cce74ff39447 100644 > --- a/mm/memory.c > +++ b/mm/memory.c > @@ -71,6 +71,7 @@ > #include > #include > #include > +#include > > #include > > @@ -88,6 +89,8 @@ > #warning Unfortunate NUMA and NUMA Balancing config, growing page-frame for last_cpupid. > #endif > > +int panic_on_mm_error __read_mostly; > + > #ifndef CONFIG_NEED_MULTIPLE_NODES > /* use the per-pgdat data instead for discontigmem - mbligh */ > unsigned long max_mapnr; > @@ -543,6 +546,10 @@ static void print_bad_pte(struct vm_area_struct *vma, unsigned long addr, > vma->vm_ops ? vma->vm_ops->fault : NULL, > vma->vm_file ? vma->vm_file->f_op->mmap : NULL, > mapping ? mapping->a_ops->readpage : NULL); > + > + print_modules(); I'm not sure that printing all modules for each bad pte is a good idea. It already prints 'readpage' which is enough to guess filesystem or driver. Maybe print modules under if (panic...) below? > + if (panic_on_mm_error) > + panic("Bad page map detected"); > dump_stack(); > add_taint(TAINT_BAD_PAGE, LOCKDEP_NOW_UNRELIABLE); > } > diff --git a/mm/page_alloc.c b/mm/page_alloc.c > index d047bf7d8fd4..2ea6a65ba011 100644 > --- a/mm/page_alloc.c > +++ b/mm/page_alloc.c > @@ -643,9 +643,11 @@ static void bad_page(struct page *page, const char *reason, > if (bad_flags) > pr_alert("bad because of flags: %#lx(%pGp)\n", > bad_flags, &bad_flags); > - dump_page_owner(page); > > + dump_page_owner(page); > print_modules(); > + if (panic_on_mm_error) > + panic("Bad page state detected"); > dump_stack(); > out: > /* Leave bad fields for debug, except PageBuddy could make trouble */ >