Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp2554549pxp; Tue, 22 Mar 2022 00:30:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxaLRDoRNwJCGChsrKGCgxC93QXz9ajEyilTRMm5Bgb82QD2XJ970l0NC110yKz/nDBOyve X-Received: by 2002:a65:4c4e:0:b0:375:5fb1:6a54 with SMTP id l14-20020a654c4e000000b003755fb16a54mr21034842pgr.231.1647934205178; Tue, 22 Mar 2022 00:30:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647934205; cv=none; d=google.com; s=arc-20160816; b=eLbkGUwcy3UpgdsVqqh0cUcROgal92aV7dgLop3/AbsouJ4HdP1xzjfeD4BhkMbf+o KLtCdkt7Y0sc5YlytbY/KKSu+xci7KpqXhQj4YzQE3+1YiroCgcOFIz+tQohbuCGMCy0 dG0xP0JqWfX1mIyM9f+usCpatiBY3N/5cOrTgWtSXV7v+5OpclxGN2xEiNAsKRLNSv8T Gyes4IAcWNlrlrS/HDHrsHWRpW7uv5knIzgoEd2w3WUZ/VunkWqxixgdc4WcEcCm7750 0f2ooQ30fIpzLvNMcTCUXSZx6eP0Uye+7pw9MA/66ihAEJx+4uwlnzC2I0r1MWH3Pw4j 5UBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=74AEUdctc3ZeeBqiC+ypczzjJ82s4XY5TZ4m0+nyhR8=; b=TrCmHyU6bScqmrJUpPIdsGiqt0MnIMsghhp0gN+87k+3w88EmqPWalTRmYJ5pAeGbh Fh+jtzMVd/hVJQQMUHXXNBL+Yv6cf4TVWBZajUAmDey4vOnW3AEJeVAf5d8Hv6wmezBt OejxvCPSauvLyepOzv9gDPdn5dg8KiYzDRq7Bh1H8ZkDOqsvfzcSLov5todj1Z9ly7dK eKAXYsjrYo4P8funYoGp+5gTTJgf0hdgWIPW15yish74nwHnGpkHP4TXotyyHiPbjmgX vIn5K6KY4Yrs+Taj9KY/0Ziur9flrBIOAeZyrdbMOwjTqnBl7mS4/OOnwHE/pCvYnTNF yDYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=MaSdtgUt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id gg14-20020a17090b0a0e00b001bf085cf895si1459800pjb.39.2022.03.22.00.30.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 22 Mar 2022 00:30:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=MaSdtgUt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id E93E458E7C; Tue, 22 Mar 2022 00:07:08 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237243AbiCVHI1 (ORCPT + 99 others); Tue, 22 Mar 2022 03:08:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49330 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237285AbiCVHIW (ORCPT ); Tue, 22 Mar 2022 03:08:22 -0400 Received: from mail-ed1-x536.google.com (mail-ed1-x536.google.com [IPv6:2a00:1450:4864:20::536]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DF54C5716F for ; Tue, 22 Mar 2022 00:06:54 -0700 (PDT) Received: by mail-ed1-x536.google.com with SMTP id w25so20474912edi.11 for ; Tue, 22 Mar 2022 00:06:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=74AEUdctc3ZeeBqiC+ypczzjJ82s4XY5TZ4m0+nyhR8=; b=MaSdtgUtMm1stk7+jnTEYcU+1TIquX0e5Ii9hArhNZVJ/Z7qmSa91QZED0TySgz4Ge TH0+EPa9gDmojjJ+ucSsmED9linlopH3/bR7R2yBTdeJHAe1SBuPYXl48y2myXEjCUHD 7R70NhaSsp/Rk2j4/1H7Q3GaK3lWnmgSZaVZ6ZUha71D0UeSFuZ+kiimRxMVIf6oAbUb 8gCE1D2du7YMeDz93VpxaXOMp2QvBZalmxddHSUiUw8kG+YZ5bsUiUn5+YoJcCcHS8Nu hw/Idoxi9LpaH+HtoPaOIa5TtqI8LPVCtDu2Q4dgdK+mroBDOtnu78Malcqf7AidyvC0 4SCw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=74AEUdctc3ZeeBqiC+ypczzjJ82s4XY5TZ4m0+nyhR8=; b=S919EdG87bE6LiXSU4VmHRgxOZs+EL9mUlAyKjH9713THgvRGLOTB+xq/IRfQQDxDJ 71iFJPKfYeXoTDNOKI/9EXiSuzaE3j6hyEhAqiLp4GOvoX5YmHGPz50Q/D+NgYMkWyMO LRe34uka0m39KiEdVNqelqX/Fprr/ys+LvKbbrxaI+3qc+JVYQ5eIdlr5pFvtv2cXGoI TuLWV6YM4HNazG+Ls7sF6w4eiGVzxIVNMg0gKJlLJgC08LD/0r4nxNhVR7gNjFf9WmKO Au/f8i9eNxZgoXl7/JNq7sTAN7fjsGf5ulmt3Ms2K17ZUB4whIj7M1FglnRZP+tjvHVZ 4hDA== X-Gm-Message-State: AOAM531QW0C5MzjSWgiRdteE9thdg5WaFB2xdjkdHK5oUFcbLveiOa4k TavDTIvB2lw2yyPcxiMkrigoCJ6wQ81D935jnEfe9g== X-Received: by 2002:aa7:d947:0:b0:419:3e8d:3e37 with SMTP id l7-20020aa7d947000000b004193e8d3e37mr8909466eds.247.1647932812900; Tue, 22 Mar 2022 00:06:52 -0700 (PDT) MIME-Version: 1.0 References: <20220319055600.3471875-1-davidgow@google.com> In-Reply-To: From: Daniel Latypov Date: Tue, 22 Mar 2022 02:06:41 -0500 Message-ID: Subject: Re: [PATCH] kunit: Rework kunit_resource allocation policy To: David Gow Cc: Brendan Higgins , Shuah Khan , KUnit Development , "open list:KERNEL SELFTEST FRAMEWORK" , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.5 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE, USER_IN_DEF_DKIM_WL autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 21, 2022 at 11:10 PM David Gow wrote: > > On Tue, Mar 22, 2022 at 9:57 AM 'Daniel Latypov' via KUnit Development > wrote: > > > > On Sat, Mar 19, 2022 at 12:56 AM David Gow wrote: > > > > > > KUnit's test-managed resources can be created in two ways: > > > - Using the kunit_add_resource() family of functions, which accept a > > > struct kunit_resource pointer, typically allocated statically or on > > > the stack during the test. > > > - Using the kunit_alloc_resource() family of functions, which allocate a > > > struct kunit_resource using kzalloc() behind the scenes. > > > > > > Both of these families of functions accept a 'free' function to be > > > called when the resource is finally disposed of. > > > > > > At present, KUnit will kfree() the resource if this 'free' function is > > > specified, and will not if it is NULL. However, this can lead > > > kunit_alloc_resource() to leak memory (if no 'free' function is passed > > > in), or kunit_add_resource() to incorrectly kfree() memory which was > > > allocated by some other means (on the stack, as part of a larger > > > allocation, etc), if a 'free' function is provided. > > > > Trying it with this: > > > > static void noop_free_resource(struct kunit_resource *) {} > > > > struct kunit_resource global_res; > > > > static void example_simple_test(struct kunit *test) > > { > > kunit_add_resource(test, NULL, noop_free_resource, &global_res, test); > > } > > > > Running then with > > $ run_kunit --kunitconfig=lib/kunit --arch=x86_64 > > --build_dir=kunit_x86/ --kconfig_add=CONFIG_KASAN=y > > > > Before: > > BUG: KASAN: double-free or invalid-free in kunit_cleanup+0x51/0xb0 > > > > After: > > Passes > > > > Phew! :-) > I'm glad it works. > > > > > > > Instead, always kfree() if the resource was allocated with > > > kunit_alloc_resource(), and never kfree() if it was passed into > > > kunit_add_resource() by the user. (If the user of kunit_add_resource() > > > wishes the resource be kfree()ed, they can call kfree() on the resource > > > from within the 'free' function. > > > > > > This is implemented by adding a 'should_free' member to > > > > nit: would `should_kfree` be a bit better? > > `should_free` almost sounds like "should we invoke res->free" (as > > nonsensical as that might be) > > > > I think I had it as should_kfree at some point. I agree it's a little > clearer. I'll rename it back. > > The other option I considered was to have a "flags" member, of which > SHOULD_KFREE could be one. Though I eventually decided to leave that > until we needed another flag. > > > > struct kunit_resource and setting it appropriately. To facilitate this, > > > the various resource add/alloc functions have been refactored somewhat, > > > making them all call a __kunit_add_resource() helper after setting the > > > 'should_free' member appropriately. In the process, all other functions > > > have been made static inline functions. > > > > > > Signed-off-by: David Gow > > > > Tested-by: Daniel Latypov > > > > > > > --- > > > include/kunit/test.h | 135 +++++++++++++++++++++++++++++++++++-------- > > > lib/kunit/test.c | 65 +++------------------ > > > 2 files changed, 120 insertions(+), 80 deletions(-) > > > > > > diff --git a/include/kunit/test.h b/include/kunit/test.h > > > index 00b9ff7783ab..5a3aacbadda2 100644 > > > --- a/include/kunit/test.h > > > +++ b/include/kunit/test.h > > > @@ -36,11 +36,14 @@ typedef void (*kunit_resource_free_t)(struct kunit_resource *); > > > * struct kunit_resource - represents a *test managed resource* > > > * @data: for the user to store arbitrary data. > > > * @name: optional name > > > - * @free: a user supplied function to free the resource. Populated by > > > - * kunit_resource_alloc(). > > > + * @free: a user supplied function to free the resource. > > > * > > > * Represents a *test managed resource*, a resource which will automatically be > > > - * cleaned up at the end of a test case. > > > + * cleaned up at the end of a test case. This cleanup is performed by the 'free' > > > + * function. The resource itself is allocated with kmalloc() and freed with > > > + * kfree() if created with kunit_alloc_{,and_get_}resource(), otherwise it must > > > + * be freed by the user, typically with the 'free' function, or automatically if > > > + * it's allocated on the stack. > > > > I'm not a fan of this complexity, but I'm not sure if we have a way > > around it, esp. w/ stack-allocated data. > > > The other option is to make all resources allocated with > kunit_alloc_resource() require a non-NULL 'free' function which calls > kfree() itself. This is much simpler on the KUnit side, but does put > some of that burden on the user (and may prevent a free() function > from being shared between allocated and non-allocated resources). Overall, I'm ambivalent. To be honest, I'm not sure how real the user burden would be (it's basically 0 right now). This would only add about 6 more lines to add a kfree version: static void free_stack_resource(struct kunit_resource *res) { ... } static void free_heap_resource(struct kunit_resource *res) { free_stack_resource(res); kfree(res); } So far, this function is only ever used w/ non-NULL free functions (even in the under-review stubbing patches). So now would be the time to make such a change. But I'm slightly against such a change. It slightly complicates the "resources as storage" usecase in favor of simplifying the "resources as memory wranglers". Maybe it'd be fine if we added a helper they could use, e.g. void kunit_resource_default_free(struct kunit_resource *res) { kfree(res); } but it > > > Perhaps this would be a bit easier to read if we tweaked it a bit like: > > "freed with kfree() if allocated by KUnit (via kunit_alloc..." > > > > Maybe we can drop the "or automatically, if it's allocated on the > > stack" as well. > > Yeah: I'm not 100% happy with that wording. I wanted to make it clear > that there are cases where no automatic freeing is needed, but I agree > it's really just making things more confusing. > > > > A bigger way to simplify: perhaps we should get rid of > > kunit_alloc_and_get_resource() first? > > It's only used in KUnit's tests for itself. > > They could instead use kunit_alloc_resource() + > > kunit_find_resource(test, kunit_resource_instance_match, data). > > We could even define the helper with the same name in kunit-test.c > > (the only place it's used). > > > > Alternatively, we could make it an internal helper and define > > kunit_alloc_resource() as > > > > void *kunit_alloc_resource(...) > > { > > struct kunit_resource *res = _kunit_alloc_and_get_resource(...) > > if (res) return res->data; > > return NULL; > > } > > > > ? > > > > I was thinking about this a bit this morning, and I think we should do > the opposite: get rid of kunit_alloc_resource() and leave only > kunit_alloc_and_get_resource(). > Then, split the resource system basically in two: > - The system for managing "findable" resources, whose main purpose is > for cases like the KASAN integration and the stub stuff where main > goal is tying some named bit of data to a test, and reference counting > it so it can safely be retrieved and used throughout the kernel if > need be. > - The simpler "free this on test exit" system, which could be as > simple as a kunit_defer(func, context) function built on top of the > former. This wouldn't need detailed tracking of reference counts, etc, Agree that there's two distinct usecases here. One wants a replacement for global variables (which thus need "finding") and the other just wants to ensure some function like kfree() gets called. The latter ~never need to get "found" (e.g. kunit_kmalloc() users). The one exception: when people use kunit_kfree() to free things early, which requires us to "find" these resources we otherwise wouldn't care about. So I don't know how we can split the API unless we get rid of kunit_kfree(). Its presence means kunit_kmalloc() and friends need refcounting. Can we drop it? Maybe. Looking at the uses of kunit_kfree(), they're all internal to kunit except one. 111 static void ne_misc_dev_test_merge_phys_contig_memory_regions(struct kunit *test) 112 { ... 117 phys_contig_mem_regions.regions = kunit_kcalloc(test, MAX_PHYS_REGIONS, 118 sizeof(*phys_contig_mem_regions.regions), 119 GFP_KERNEL); ... 140 141 kunit_kfree(test, phys_contig_mem_regions.regions); 142 } Hmm, that looks redundant since it's right before the end of the test case. We can drop that call, I think. But I think kunit_kfree() can serve a purpose. E.g. for short-lived allocations where assertions are used. buf = kunit_kzalloc(test, sizeof(*buf), GFP_KERNEL); KUNIT_ASSERT_EQ(test, do_stuff(buf), 0); KUNIT_EXPECT_EQ(test, ); kunit_kfree(buf); // do more stuff Sure we can drop kunit_kfree() and have `buf` stick around longer than needed. Or we could rewrite it like buf = kzalloc(sizeof(*buf), GFP_KERNEL); if (do_stuff(buf)) { KUNIT_FAIL(test, "do_stuff() failed"); } else { KUNIT_EXPECT_EQ(test, ); } kfree(buf); but I think the kunit_kfree() code is cleaner. > > (tl;dr: I think that kunit_alloc_resource() is broken, refcount-wise, > if we're trying to implement the first kind of system, but useful for > the second, and this is quite confusing. So kunit_alloc_resource() > probably shouldn't be used alongside kunit_find_resource(), as there > could be a potential race condition. Now, this shouldn't happen in > practice, as most tests are single threaded and none are doing fancy > things with kunit_remove_resource(), but > kunit_alloc_and_get_resource() should be safer, as you're not playing > with a resource you don't have a reference to according to the > refcount.) > > That's a more complicated refactor and redesign of the resources > system, though, so I'd rather fix this first. > > Cheers, > -- David