Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4636433pxj; Wed, 12 May 2021 09:45:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJydHEu2Ozz9uDPAXtqlBtnGi0EPoTU4cUHo2lrUORw/bf+YrcNjFlizY6kQ6U2QspvrVnab X-Received: by 2002:aca:47ca:: with SMTP id u193mr8156785oia.69.1620837923296; Wed, 12 May 2021 09:45:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620837923; cv=none; d=google.com; s=arc-20160816; b=uc3Kl1xdlSgVBzkQ1eJKBWtW5KmMnrFkjyfGLbI5/2VGe928VEXWMMisbO8I/O8xgT 4Eg/1/AAWLZAbuuVrfqQoO3P3UnjtC5yRsRz9cDs+Y4b2iOItQ1FV1UDsGbdyGtLDJcy NdvX2Db6icpT97UK9HpVIvt3z9dssKakGD68w/wYk7Gu8yyizykYjxfXBpkOrNIUNcQ6 EJU9LnBwu+1GdJDO2smXVYyQv4Cx5R+HqXNSeh2AsCzrcXY3dOJrF2sNY+GuUL5HWIJT GFUUTUbq0JlebLZokMMZlQdGzAMCXbq4KV2SqjP/Ef5sjOunABZDQaL+AJHp86VO9bON yxnQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=B2WX5FVaBsEML5Weeu7gPra6NQhAk29HdSRYcPEb4Jc=; b=Es93wvj8CNEvRxq+eQSHW7JZfJcS7Qpjv70Z4H9gR16Xk8TdwfmC+EHvEH15IzeyA3 crOewcJRr3pOMWCWr64ijyD4EuvMsyqL3TOO8enMNiKU8YDjluKvTyUcqw/Il6xp1tEG I0SKadsbRh/LF08mJCFTVbTuSOsEeyQid9a86dkUc3iVu4asfOsufr7faGDwYgY1VPSh 80TjXfiZPZ9vRp+RKaXVy6kNUPxIMMZNUrxdc1SFeG1r6dyGyKiQrTtvVGQEIkUyb4HO +0sITc2OWdRwk+7yRil68S+SNpg1JLMV+oyU8EsfS2Gs9ELyOSStaUkxTyQKMZ1aaQJI rCuw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ildvIU1d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n62si457801oib.60.2021.05.12.09.45.00; Wed, 12 May 2021 09:45:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ildvIU1d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237636AbhELQnn (ORCPT + 99 others); Wed, 12 May 2021 12:43:43 -0400 Received: from mail.kernel.org ([198.145.29.99]:50344 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237025AbhELPrw (ORCPT ); Wed, 12 May 2021 11:47:52 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 19AD361CA6; Wed, 12 May 2021 15:24:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1620833057; bh=tZQr/GwfBP6axqWUU9zUZt67cvnRw4dDXeqUfzvPgj4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ildvIU1dEn8/kv3vK6Dv4m01MsA6DY8/r92DxNvREX1bDLd8pl3xtDH3VVl6Hj6jp KkeU0SHwVkpt+G91WMdwfoUneG1hHy/jzp9e3nmjtpHnMBO6CnLWF+Dodv4oMyD7cM zc95sUrxGSMXcHXqpVSVJ2JVRnKe7cgjFqTnsxms= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vlastimil Babka , Oliver Glitta , David Rientjes , Christoph Lameter , Pekka Enberg , Joonsoo Kim , "Paul E. McKenney" , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 5.10 518/530] mm, slub: enable slub_debug static key when creating cache with explicit debug flags Date: Wed, 12 May 2021 16:50:28 +0200 Message-Id: <20210512144836.780038842@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210512144819.664462530@linuxfoundation.org> References: <20210512144819.664462530@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vlastimil Babka [ Upstream commit 1f0723a4c0df36cbdffc6fac82cd3c5d57e06d66 ] Commit ca0cab65ea2b ("mm, slub: introduce static key for slub_debug()") introduced a static key to optimize the case where no debugging is enabled for any cache. The static key is enabled when slub_debug boot parameter is passed, or CONFIG_SLUB_DEBUG_ON enabled. However, some caches might be created with one or more debugging flags explicitly passed to kmem_cache_create(), and the commit missed this. Thus the debugging functionality would not be actually performed for these caches unless the static key gets enabled by boot param or config. This patch fixes it by checking for debugging flags passed to kmem_cache_create() and enabling the static key accordingly. Note such explicit debugging flags should not be used outside of debugging and testing as they will now enable the static key globally. btrfs_init_cachep() creates a cache with SLAB_RED_ZONE but that's a mistake that's being corrected [1]. rcu_torture_stats() creates a cache with SLAB_STORE_USER, but that is a testing module so it's OK and will start working as intended after this patch. Also note that in case of backports to kernels before v5.12 that don't have 59450bbc12be ("mm, slab, slub: stop taking cpu hotplug lock"), static_branch_enable_cpuslocked() should be used. [1] https://lore.kernel.org/linux-btrfs/20210315141824.26099-1-dsterba@suse.com/ Link: https://lkml.kernel.org/r/20210315153415.24404-1-vbabka@suse.cz Fixes: ca0cab65ea2b ("mm, slub: introduce static key for slub_debug()") Signed-off-by: Vlastimil Babka Reported-by: Oliver Glitta Acked-by: David Rientjes Cc: Christoph Lameter Cc: Pekka Enberg Cc: Joonsoo Kim Cc: "Paul E. McKenney" Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- mm/slub.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/mm/slub.c b/mm/slub.c index 05a501b67cd5..e4f7978d43c2 100644 --- a/mm/slub.c +++ b/mm/slub.c @@ -3779,6 +3779,15 @@ static int calculate_sizes(struct kmem_cache *s, int forced_order) static int kmem_cache_open(struct kmem_cache *s, slab_flags_t flags) { +#ifdef CONFIG_SLUB_DEBUG + /* + * If no slub_debug was enabled globally, the static key is not yet + * enabled by setup_slub_debug(). Enable it if the cache is being + * created with any of the debugging flags passed explicitly. + */ + if (flags & SLAB_DEBUG_FLAGS) + static_branch_enable(&slub_debug_enabled); +#endif s->flags = kmem_cache_flags(s->size, flags, s->name); #ifdef CONFIG_SLAB_FREELIST_HARDENED s->random = get_random_long(); -- 2.30.2