Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1667812ybt; Sat, 27 Jun 2020 16:12:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyn9WPTANYt0Uhm4Z8pv2nxH1CLcPjdAGhzJAoIX/Tzd3FXoqh8s3hfG7V2RPFVD/ZkryJ0 X-Received: by 2002:a50:fa0c:: with SMTP id b12mr10715819edq.226.1593299533433; Sat, 27 Jun 2020 16:12:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593299533; cv=none; d=google.com; s=arc-20160816; b=wGnCQidJINpdwgnNN8LLPjOhjQIoNQOb7i/uGK7aAQ2GpXlbkoCsoLkfF2qHOFOSG+ 8NNw6QTRwYtkGWRSSBkPhPNK9WuH3ntBGa12HJ4LfW2HqB/4BUP4piut3Bq0l8ji7s8s LEI8j4qfvxoFwZwF9nRD1B88XIPzGixT2JFB7jtJmkiQui/5+dldQrwqkvGu/Z3kSC95 LTf3hQJPzunS+bm9+XqCjmwORQVUHW/DAHqDR0wXp00n7Q1Mu4dOhT7wHkpOO3Z7rYbo X19vNSOAwVwVNtvLrmbxx53GGDJdO826qqyHjlcDGHtVeHoddH9TK67EPP5kWt68843B HROA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=sLy9jouhDlupAz5QLm332ToW6WtzUAfEFPPB5Lg59kg=; b=miyXOnd+UPtLBPSZLOLujX5KaRxD1pg+7jLlYRLUX71zNlSQCxE15hRrLRMpNlrpSC NT7cJY5gnM+TJ6Z3IINdsQsclUjGKOHNVOthzwqs0sDUMPNReN5SKk1MOtujuWW9jbnj 9WYCBzcsbStEHZuiSYXwvW99K7AzwHbQbTp5FhDZzD/r15a4buivYuD6Jv/jiTIuOQ1z 3Jr5ZCaByilycS8e6ymnvXTmH/YHdorVO1AOGtxn7Dkxdxml5eigynXbpZM3SR7dmLTI XjcnDDea27Qi2QPlvtwXSfzKK7Imv27nemhhRMlYXvbQdaPE/V8oPcPdoQgT2VsChpxA PzIg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=WoDOyld9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j7si4487033edy.448.2020.06.27.16.11.20; Sat, 27 Jun 2020 16:12:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=WoDOyld9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726712AbgF0XKQ (ORCPT + 99 others); Sat, 27 Jun 2020 19:10:16 -0400 Received: from mail.kernel.org ([198.145.29.99]:48272 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726057AbgF0XKQ (ORCPT ); Sat, 27 Jun 2020 19:10:16 -0400 Received: from sol.localdomain (c-107-3-166-239.hsd1.ca.comcast.net [107.3.166.239]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3917820707; Sat, 27 Jun 2020 23:10:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593299415; bh=/ft0gEdXgdrpBXeR5hwd2mEJMfyWjzRx7hEcjdZ+TNk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=WoDOyld9MuOVGH4iJuZ+iBHgjZH9PZxkzlfM86zFy/I0J99jZTg6FG73e9bRd11gT aPDyr/lstgl6eteNtDc09aOcMozcGW1T0F8qhIbOVL7ACUiUKzJehNz0thD1rA4uKw bVaTg0Wa/hclcMQ9rr5hV9X5IAyHZsYK9VjeO/ds= Date: Sat, 27 Jun 2020 16:10:13 -0700 From: Eric Biggers To: Qian Cai Cc: Dmitry Vyukov , syzbot , LKML , Linux-Next Mailing List , Stephen Rothwell , syzkaller-bugs , linux-mm@kvack.org Subject: Re: linux-next boot error: WARNING in kmem_cache_free Message-ID: <20200627231013.GM7065@sol.localdomain> References: <121C0D57-C9E6-406B-A280-A67E773EA9D0@lca.pw> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <121C0D57-C9E6-406B-A280-A67E773EA9D0@lca.pw> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [+Cc linux-mm; +Bcc linux-fsdevel] On Mon, Jun 22, 2020 at 03:28:09AM -0400, Qian Cai wrote: > > > > On Jun 22, 2020, at 2:42 AM, Dmitry Vyukov wrote: > > > > There is a reason, it's still important for us. > > But also it's not our strategy to deal with bugs by not testing > > configurations and closing eyes on bugs, right? If it's an official > > config in the kernel, it needs to be tested. If SLAB is in the state > > that we don't care about any bugs in it, then we need to drop it. It > > will automatically remove it from all testing systems out there. Or at > > least make it "depends on BROKEN" to slowly phase it out during > > several releases. > > Do you mind sharing what’s your use cases with CONFIG_SLAB? The only thing prevents it from being purged early is that it might perform better with a certain type of networking workloads where syzbot should have nothing to gain from it. > > I am more of thinking about the testing coverage that we could use for syzbot to test SLUB instead of SLAB. Also, I have no objection for syzbot to test SLAB, but then from my experience, you are probably on your own to debug further with those testing failures. Until you are able to figure out the buggy patch or patchset introduced the regression, I am afraid not many people would be able to spend much time on SLAB. The developers are pretty much already half-hearted on it by only fixing SLAB here and there without runtime testing it. > This bug also got reported 2 days later by the kernel test robot (https://lore.kernel.org/lkml/20200623090213.GW5535@shao2-debian/). Then it was fixed by commit 437edcaafbe3, so telling syzbot: #syz fix: mm, slab/slub: improve error reporting and overhead of cache_from_obj()-fix If CONFIG_SLAB is no longer useful and supported then it needs to be removed from the kernel. Otherwise, it needs to be tested just like all other options. - Eric