Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp720145rwb; Thu, 11 Aug 2022 08:49:27 -0700 (PDT) X-Google-Smtp-Source: AA6agR4YJ74r3KyTZ3QcpcP1Oe3Ea/y3uNoJ8jkJ+LvhXiwRvLmc9RWt0VX6kbQ9wjOr61Pz8A6M X-Received: by 2002:a05:6402:1a44:b0:441:58fb:8b65 with SMTP id bf4-20020a0564021a4400b0044158fb8b65mr12104579edb.257.1660232967739; Thu, 11 Aug 2022 08:49:27 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1660232967; cv=pass; d=google.com; s=arc-20160816; b=0jp8ZN5M0vmWlu49HoDS3lqm7QrMULMHzWykwONawnL0ITgU7eJEPxyUIHoMvJthZW ITnjDpSaQtXzOq7Eo0Cct7O/Y1UFMR+5crUa+KiRYiiQZBlgsQ5uAizRtiU+AXQk+oCa 2QbeBrg506eM4qWgjtuuCMCvoZO1cwbxtKvvJmbT+JCgG9w3y8m4dL3Swac2isCnURxg +DabPYzTK21XaXnNyeTfKWNJnKzsKU7I0rKwXDmw43+zGZAR/51Qhv1EwGU1/kSW5+d5 b1p2iR2vk6X52Rh1LiIhIlt4ivuDibPID3vmsNdf2deQuPJypkwai6j4l2rbjxWup3FH 1McQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :in-reply-to:from:references:cc:to:content-language:subject :user-agent:date:message-id:dkim-signature:dkim-signature; bh=yPZI13DPAP3gB4/lrzo4c8VA5C0qzZ9dMTuHeJ1EfwI=; b=o9O00zvxLFsWZIi2Z7zvepydEMrgjpuBbolyuw/kYARkIloYsuD3JWW7cFcgPq31b1 cIaP8r4VCuyEcc/7XilOQwDFZE8+yimtx4eNj2Y3Lypa8ZlmYX/hztem2JCWy3jVsL5f uAzeD+MBg2F5fDui3Eql1zJBI6OM7Nx22qiIWYXW7EtZB5tsVs1RWt3JOB2O8/XRfpae VJlOcD4152kk4Jb1RnOIeBBeUYH66DVLdiGb0dQ0SEMNE5bgqE2pSJ7iWO+X0LzOUIZc a7oMcTVtepLxy5DzVpCXdYqSIERxLFSE5bZVogQaqie7uyTfBuncvetcUkq9VE/cOfjP BfmA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2022-7-12 header.b=hzLLEcJk; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=WvDFCRRz; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ji5-20020a170907980500b0073301ce958csi2423411ejc.293.2022.08.11.08.49.01; Thu, 11 Aug 2022 08:49:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2022-7-12 header.b=hzLLEcJk; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=WvDFCRRz; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235513AbiHKPLA (ORCPT + 99 others); Thu, 11 Aug 2022 11:11:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55996 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235527AbiHKPK4 (ORCPT ); Thu, 11 Aug 2022 11:10:56 -0400 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EC23B275EC for ; Thu, 11 Aug 2022 08:10:55 -0700 (PDT) Received: from pps.filterd (m0246627.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 27BE8uGt030054; Thu, 11 Aug 2022 15:10:37 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date : subject : to : cc : references : from : in-reply-to : content-type : content-transfer-encoding : mime-version; s=corp-2022-7-12; bh=yPZI13DPAP3gB4/lrzo4c8VA5C0qzZ9dMTuHeJ1EfwI=; b=hzLLEcJkQIH9xNl2pbvvnRWp1rKqMQ+FLBCZgUmBAun/SWCqFo9oqAiw2PbuijJnJd9l L5aeXhZjFCt37ULOHxlJPMl6dHI9JDXPWEUK0b8qz1f3g+cMud+YrDdhoH8KCsTgf+2K lWHp5I38UuiC5lrrw24RulOsAl0tKq1pB87V2sEx1ie+It3bF9rll3x12VVdpy8fij4d baL+NiUgjx/L8MUJ/ogkW9Xv0RaJVkvYtk5968sFldzQ/9QBj4S8+K5p1jX+HzziW5uD 8p57F7jnOgSNAghoZRxt5iEu9TNm7xsPL43LWtZ/gESPRUdmuFBeFkbkzEWLhY4LuM3R Sw== Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3huwqj4xqf-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 11 Aug 2022 15:10:36 +0000 Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.5/8.17.1.5) with ESMTP id 27BF0L9v005096; Thu, 11 Aug 2022 15:10:35 GMT Received: from nam12-mw2-obe.outbound.protection.outlook.com (mail-mw2nam12lp2049.outbound.protection.outlook.com [104.47.66.49]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3huwqjq5f6-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 11 Aug 2022 15:10:35 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=YcWZfoZVYagTaniNWfJk8gAUU0/inhjhRjMn2MKjt3iqHORZ8FYyZhXX///lt32keBSw7FvY870RLpsBP52uPqnfdJenWBcY7GWEzml+3OkDWRAeqgLftzU7Zc4SvSQEfouKHV++849w/LaA37se+BnDjWOQEGPE1NvFJlY6M93A6B1fIVcN7YJzQNOopo2GojPAab3THlPZrBXq4NDNMOhDqOVKMwkM8LRvUGgzxu56h/D0sfUETuHZeFPQu+rLjD3WOG35lPKuxDWLK5X7kPi+P0EOLm7QmIYIw2+06sc+NOXeP4ft4I5drg4NmfatBggzIpj0B/nulns54tGNGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=yPZI13DPAP3gB4/lrzo4c8VA5C0qzZ9dMTuHeJ1EfwI=; b=KTkHwwY77v5NzL8IpEnb9EgT/5TZqnexaUn9GdEJ1Z8K28FI6ny/QRAyW2XcuTjz80M3g8/yvsh3zthvw2ijZe3yV6NkPM8Uinn1DLmuoIkKQzpPhfLhe3yWP84iHrj9CCf/9Ujj6VxZxPthzqC6fdJ44xiVr0BnfquF36z1dFjfxQYVHjQpNcjqRuPxDjQEdGmsPBQtVu/3maUBODg7cXsOtKlJtyc9/5G1tKRZTfmst380xDSMcMIOolmP7ZplclEONP6fWyfpJWCWLx9AmnLpNOpLKXjL3DeRBptARfJnO2/cQIFUvYERKvezqE8WTAmq36ug0yup//u2hkDXWg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=yPZI13DPAP3gB4/lrzo4c8VA5C0qzZ9dMTuHeJ1EfwI=; b=WvDFCRRzwZF5K6W2y2NZ6RTyNiwpT0T2TLbN97tufui1SKTzkLmLyg1r+ri8vXLUFDdlBRBrRTpb9ftZpHe0FD1a71pjjsTX3YyvfltGQT9iFpLY2+Utkrr+s5UJnh50F2QhJmQRZxwGCThrjT0mhctblU8IE8yU2Qx3QAx4XLE= Received: from CO1PR10MB4468.namprd10.prod.outlook.com (2603:10b6:303:6c::24) by BN6PR1001MB2322.namprd10.prod.outlook.com (2603:10b6:405:30::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5525.11; Thu, 11 Aug 2022 15:10:30 +0000 Received: from CO1PR10MB4468.namprd10.prod.outlook.com ([fe80::c504:bfd6:7940:544f]) by CO1PR10MB4468.namprd10.prod.outlook.com ([fe80::c504:bfd6:7940:544f%5]) with mapi id 15.20.5525.011; Thu, 11 Aug 2022 15:10:30 +0000 Message-ID: <26acafb0-9528-9b29-0b5d-738890853fca@oracle.com> Date: Fri, 12 Aug 2022 01:10:15 +1000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.12.0 Subject: Re: [PATCH v2] Introduce sysfs interface to disable kfence for selected slabs. Content-Language: en-US To: Marco Elver , vbabka@suse.cz Cc: glider@google.com, dvyukov@google.com, cl@linux.com, penberg@kernel.org, rientjes@google.com, iamjoonsoo.kim@lge.com, akpm@linux-foundation.org, roman.gushchin@linux.dev, 42.hyeyoo@gmail.com, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org References: <20220811085938.2506536-1-imran.f.khan@oracle.com> <6b41bb2c-6305-2bf4-1949-84ba08fdbd72@suse.cz> From: Imran Khan In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-ClientProxiedBy: TYCPR01CA0020.jpnprd01.prod.outlook.com (2603:1096:405::32) To CO1PR10MB4468.namprd10.prod.outlook.com (2603:10b6:303:6c::24) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: a7027164-195e-4823-538c-08da7baba12d X-MS-TrafficTypeDiagnostic: BN6PR1001MB2322:EE_ X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR10MB4468.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230016)(396003)(136003)(376002)(39860400002)(346002)(366004)(478600001)(2906002)(966005)(6486002)(53546011)(8936002)(7416002)(5660300002)(41300700001)(26005)(6512007)(31696002)(6506007)(86362001)(6666004)(38100700002)(83380400001)(2616005)(186003)(8676002)(4326008)(66476007)(66556008)(36756003)(31686004)(66946007)(316002)(45980500001)(43740500002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?VnlNa1RLVkNtR2JRbk04RTNTU1EzbGQ3SWhRTFFDOTY1Wm9qYzc2N2lQWUpQ?= =?utf-8?B?ejVibmN6eVFTeGRCQTk3MU1pc1FlV2EycXNWdlNiKzd1OGVXZ1R2d1R6b09x?= =?utf-8?B?bEtJSHFKYXkzSW9RM3JoelpjUWZQRXFEK0dlNnhuV2txdU5ENzRmbkFuTWJ4?= =?utf-8?B?Z2oyZTFwaEJWQmZ0Vko1QmJBeG84a21XZ0p1SXhRN0NjVjJWa3VGbUV1MUVi?= =?utf-8?B?WjBBd0FCQ1RWL1kzUDVtanljSEM1S0tsa0c5Q1B2MHNrZnY1RUMxQmM5dWxV?= =?utf-8?B?clh1dWdKZG8vcmQ4UmgyTXQ2dXFoaVVuUjdNNDdrc1AybTZ1UmlhdlZLRlBr?= =?utf-8?B?STdjbnNUL2x0YnU1cDR3WE5VamF3ZW5tOWoySGZmay8vUmdzSEtDY3dCcDZk?= =?utf-8?B?NW5BTC9BRkEvQXdacFFOL2RYVDVWWkUzczZUVWo1ajUwY05BTDNoTXRwejJT?= =?utf-8?B?OERORGRxMXNmU3QvTkttM21WUUFZZFg0RHRFVEc2UFZDMS9XNnJWbURQOENG?= =?utf-8?B?b1ZXanpvRlVyMU9qTlRUcHJic3AxYXI2RDVtdlRZN0JiVDhuYXB6TTVMYzJB?= =?utf-8?B?T29NbkxobWxCRnoyUVlzWmh4SXFNT2F2SCs1Z0lqQ0dUNE9Qa3VHTXpVc3Ny?= =?utf-8?B?d2ovaG5IZXFZU01FNVFicWdPcFdFVWFnZXc2NUIvRDRCRW5TR3l0cUNMYm0x?= =?utf-8?B?bldVTnkrTjZSSkF5SC9RUE14a2Uzcy82dnNYL2ZRVkg4bkx6TWhOcDRiS2JH?= =?utf-8?B?cnUrRytOSTBLYmNIVS9KV0lmR2s3ak9zcDRweFdrZWFmd28za25LejFNZUhY?= =?utf-8?B?N2RrcERsVlBKU1lHbS84QXpNUm40SUloTkhjWFNlRkMrZ3ZUYXpqczYxbjdQ?= =?utf-8?B?bjkycGFDRWtma3RWQWRVaEh0czlZb1UyVFZvbWxkTmVkMnYwV2VqSXV1L1Rh?= =?utf-8?B?NTdVMGtQQ0hXWTJZMFd0cytDMWtkU1F0R1dFNGNKTktBbWUyakxFa2Q4NUVa?= =?utf-8?B?NFlnbGMvQ2I5aDRFRCsvbG1zVG53eXB3U0luQnNwU3RLbGx1aXFncmpicXBm?= =?utf-8?B?SjVkcFVteVN3dWh2L0k0S2lFOVdlcmc1SEMydWY3YVVYWFc5Q1daWVowa0hD?= =?utf-8?B?dXJxcStUai9HRUo1bXhKcXJhM1JVWmVPLzgxckM1aHlaNi9ZN1NGR0NMMi9k?= =?utf-8?B?VEZVTFVoTi84RjdaNE9neDU5Vi9GdHJucHZ5a3ZKRkFqaVlmc2F2enQveFll?= =?utf-8?B?cnArZll5bzhtZVo2dEg0Q29mVGI1WTB3WExtVnpoM1UyVWZLWDJpQkIwdmZM?= =?utf-8?B?TElMaSt5VllJOUZCRXU4d3dVQmNCNlJabjAvb05QKzU1aWhIWkdRMzdwbkQz?= =?utf-8?B?dnBUaW1vM2FXeWw1SGd3RW5CeGQvWU5XMm5kT2hVeUdPS21FOXkySXUwNk85?= =?utf-8?B?NmZFOVkyYXVSc0dKa3FoaHBQNmRmc0dSNXRtYmZHOGZicFZNd1RjVks3RCtM?= =?utf-8?B?ZnIrcTV2Sm53LzBIczRiSVAwSHZMMXlrTlowNGozeHZSdVYrSmQrMDhYOFBp?= =?utf-8?B?Tk40TjkxVTgvcTFnOGFpalR6Y3VCZGNCZTI1VERTd1hBMFlHY1Vpa1A1a2Nq?= =?utf-8?B?ZWNDbnl6Y1pFNjI5VkJlSHZzb1NzRWIxbjl1NkVMd2p5cjBKN0plZGFzSlI2?= =?utf-8?B?VHFJbGhyR0M5OTBpZzFVK3BjTUlWRCtVNVZydWxVWFh5cno2WGFlTDQxUk5x?= =?utf-8?B?OW42RDF4RDZDMUxSdEdHV2lNTFR2TG52WjdoMFRRVHp5OGJzVTM2b3hkN056?= =?utf-8?B?dThVd1FWTytnOFVGbnNIZGlKNlIwNzJHeXdxUkxIUHFVNEJUaFk3c1JGcmpx?= =?utf-8?B?ZjB2VFVramJ3dWRGTWoyOFdFU242ZXZJSW9DWm9jVmlPNzc1MEpCSVNrazRr?= =?utf-8?B?RXpqb0lCZVU3MzdVTWZ1RW9FRk9qWkFNVFE3alFkOWxIZVB1TEk2czlZc0dp?= =?utf-8?B?VjZjS3dBNDZJd0hROEZZM0hsVVFnZGFqdDZiV0J6RjV6K2lMZjh2aFFVaWtB?= =?utf-8?B?eHpCUk9TQTgwQTNCeUdhZ29zSjV5YU9rZ2MxWHY3SGJ4R0Fhc0pJUFZoZnJh?= =?utf-8?Q?daFKRA41a45EZi05W4Ec7f51w?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: =?utf-8?B?U1JCSU9hZ0g4aUV5bndWYU9hZmlXaEJmRjhNc25pZGFyQlluN2VNemZmUUNK?= =?utf-8?B?TzhwSE9wa1dacmtHT1BCU2lVMkhJUzhkTkFvVzNOUzczS08zN3hFVjdURHVH?= =?utf-8?B?WnpuelB0STJtdEtRL1pJYUJPdGZzZ2U3YStLcWlla3N5czU2TXpRaERmRHp1?= =?utf-8?B?M0RHMlo2WW9LVFlvMXhXUWgzWmdUQTdCdHd2QkVQTzgzR1JRTjVHeXJVelEr?= =?utf-8?B?eTRXeTBySE92cXhEYnJTWmdWc2xUcjhyVlVRTzEwMXZFSjVKQjVHVUdKNlM3?= =?utf-8?B?Y0h3ZE5EOVdpZTIycUNiK2FQS0JOTGZuc3RaZkJYaDZUa001NzJqVUxDUit6?= =?utf-8?B?UzZXTm1ocm5STDdEeHVHTW5mRmVwbWtCTEFsSlEraHd1aC8wRWZMWVYxYkRa?= =?utf-8?B?eWpZUUp4bXM2Z3dpN1ZJbzV1aTljM2hiNW1GRHdXYTJDUmxXUzEzYkZ0L1Ja?= =?utf-8?B?bkYvcXVEcTBibTdEUGx6ajBvWjU0dVJmcnQybkVZcnJQazkrQVhSTm4zRGVq?= =?utf-8?B?QW1NdVliWFRMSnEvd2RldkhzaDFOc0MzN01DQy9lc0Q5Y2plTjJXK1gyTi9w?= =?utf-8?B?dzJNcHVsbGF5TjVXTjB4Z0RBbzJTZmdnelJnckxzaG1pdjYrcWMxeTRKS2Vj?= =?utf-8?B?RGt5S1AyT25jS3FJeGNuZkZZRXNlM0JDZm5YSFErV3lwL1JMZ0dnQ2prNEtR?= =?utf-8?B?andwVzNEQ3J6TmFyMHh1MG5iRFo3Q1d2TllhV3JpeFJFblloTlRGanFyTWtD?= =?utf-8?B?emo3VW5jNFNSSGVsUGpYSXoyS2hNYTRTTyt1MkUwaXRJWm4rWEZkeFRIc2pv?= =?utf-8?B?K3RoRHBCNlh5V2RqS2NJWFM4L0phOHd2UitZdVRyeWFSZFFUR2NGend0RXVD?= =?utf-8?B?WGJZb0xvc0JYSmlSZE1NSDVRdUplRDkwb3pwRGhZQ1pqbWZhWkplREhzbTA4?= =?utf-8?B?U28yNDNyWTkzOUttTGRmNzNGYVpYR2V6WWxrQ2xZZUxqeWtVcDdlNzB3VytH?= =?utf-8?B?U28zS2dqa3NKNktaelVHY1FkYmsrcVE3QVZWQ25WallIVXRySUxWWklaQTE0?= =?utf-8?B?QnFISkdwNndIVlFBK3owQnprd1E1eDJjZFRDN1lTNFVKQWd6Sk9NVVFRbkRL?= =?utf-8?B?TlVna3FaeWdzUDZscHRFYjduRC9DL09TQit1Q2RKam1xNUQyU01COWZZZkgx?= =?utf-8?B?L09NZCtsM3dvNi91bkpNNTB6c0NWUmdHaDA5TWpKLzBsTm9aY05TY3pabCtt?= =?utf-8?B?RDdXakhORlFnVGpGdldKNFc1ZVNrb2ZwakFLeGFybzB0L25GSkIwaVVNcDll?= =?utf-8?B?SnpQQU5MMWRIQTBVTCt5anU2cnBuRVllQzFUQmRFT0J3UGFNeURod3VPQUhY?= =?utf-8?B?cWpkdmF3VGJERDRtZnRKeWdxOFB5RXpycFpxL1NQSHJoRlFxRENYYUhLV3Fl?= =?utf-8?B?MzJoYy83Z0dLVHg0Tm45Tjl1L1J2QUtuNHlER2hKU0RZeVBsV2V4d3lEUmIy?= =?utf-8?B?ZjFTaGdpV3pOWlVsL3hVTXJUQm92Zll5OExNMkxjS2Y5azlSN3NEVUdLaEd0?= =?utf-8?B?Q0ZFazIvUkg1UzB1UTRNYXU5eFVtR29nU2ZqQ2wwREFQUTZuNkk4dmZRbnVB?= =?utf-8?B?djJVcCsvSVo2czh5MW5UbmxOZ2FTVm1XdEczN3MzcFpCd1Y3WVIySFhnTTlD?= =?utf-8?B?R1FTWkVldHhCVlpaVzUvRG9mN1hWR0VjUVlvNUo3Vk4zSVVwTWU5a25HTUNP?= =?utf-8?B?VS9GT21YN2ZKWGpiaHNlZG9kL1k0TlZIVGhGOGxkV0VCcm45dy8zdVIxeDhn?= =?utf-8?B?bjUrcTIxWVVqTVNVb0pEODRHeHIrN0lrTjZSaCt3MlBlcVhkeXlxd0dxS2Rw?= =?utf-8?B?NXFKYS9wYVRMOGtpRmZFdlZEQnZGb25pa1dpZHh1ejk2emV1Z256OTZXY1JJ?= =?utf-8?Q?KNDAMD8X3gs=3D?= X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: a7027164-195e-4823-538c-08da7baba12d X-MS-Exchange-CrossTenant-AuthSource: CO1PR10MB4468.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Aug 2022 15:10:30.2728 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: wgOnqYasYz0wPHcvTHr6IUok940cLZr4sQM0A9x3N869EcDQ8xeS/o/Gm2+JsL46qn8w3L/Nwbd0llbC6JBR2Q== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR1001MB2322 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.883,Hydra:6.0.517,FMLib:17.11.122.1 definitions=2022-08-11_11,2022-08-11_01,2022-06-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 phishscore=0 spamscore=0 bulkscore=0 adultscore=0 malwarescore=0 mlxscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2207270000 definitions=main-2208110051 X-Proofpoint-ORIG-GUID: cRHO22u6pzprGzjtwenQfz3Em_4qzlDQ X-Proofpoint-GUID: cRHO22u6pzprGzjtwenQfz3Em_4qzlDQ X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello Marco, On 11/8/22 11:21 pm, Marco Elver wrote: > On Thu, 11 Aug 2022 at 12:07, wrote: > [...] >>> new flag SLAB_SKIP_KFENCE, it also can serve a dual purpose, where >>> someone might want to explicitly opt out by default and pass it to >>> kmem_cache_create() (for whatever reason; not that we'd encourage >>> that). >> >> Right, not be able to do that would be a downside (although it should be >> possible even with opt-in to add an opt-out cache flag that would just make >> sure the opt-in flag is not set even if eligible by global defaults). > > True, but I'd avoid all this unnecessary complexity if possible. > >>> I feel that the real use cases for selectively enabling caches for >>> KFENCE are very narrow, and a design that introduces lots of >>> complexity elsewhere, just to support this feature cannot be justified >>> (which is why I suggested the simpler design here back in >>> https://urldefense.com/v3/__https://lore.kernel.org/lkml/CANpmjNNmD9z7oRqSaP72m90kWL7jYH*cxNAZEGpJP8oLrDV-vw@mail.gmail.com/__;Kw!!ACWV5N9M2RV99hQ!Oh4PBJ1NoN9mEgqGqdaNcWuKtJiC6TS_rIbALuqZadQoo93jpVJaFFmXUpOTuzRUdCwcRJWE6uJ4pe0$ >>> ) >> >> I don't mind strongly either way, just a suggestion to consider. > > While switching the semantics of the flag from opt-out to opt-in is > just as valid, I'm more comfortable with the opt-out flag: the rest of > the logic can stay the same, and we're aware of the fact that changing > cache coverage by KFENCE shouldn't be something that needs to be done > manually. > > My main point is that opting out or in to only a few select caches > should be a rarely used feature, and accordingly it should be as > simple as possible. Honestly, I still don't quite see the point of it, > and my solution would be to just increase the KFENCE pool, increase > sample rate, or decrease the "skip covered threshold%". But in the > case described by Imran, perhaps a running machine is having trouble > and limiting the caches to be analyzed by KFENCE might be worthwhile > if a more aggressive configuration doesn't yield anything (and then > there's of course KASAN, but I recognize it's not always possible to > switch kernel and run the same workload with it). > > The use case for the proposed change is definitely when an admin or > kernel dev is starting to debug a problem. KFENCE wasn't designed for > that (vs. deployment at scale, discovery of bugs). As such I'm having > a hard time admitting how useful this feature will really be, but > given the current implementation is simple, having it might actually > help a few people. > > Imran, just to make sure my assumptions here are right, have you had > success debugging an issue in this way? Can you elaborate on what > "certain debugging scenarios" you mean (admin debugging something, or > a kernel dev, production fleet, or test machine)? > I have not used kfence in this way because as of now we don't have such newer kernels in production fleet but I can cite a couple of instances where using slub_debug for few selected slabs helped me in locating the issue on a production system where KASAN or even full slub_debug were not feasible. Apologies in advance if I am elaborating more than you asked for :). In one case a freed struct mutex was being used later on and by that time same address had been given to a kmalloc-32 object. The issue was appearing more frequently if one would enforce some cgroup memory limitation resulting in fork of a task exiting prematurely. From the vmcore we could see that mutex or more specifically task_struct.futex_exit_mutex was in bad shape and eventually using slub_debug for kmalloc-32 pointed to issue. Another case involved a mem_cgroup corruption which was causing system crash but was giving list corruption warnings beforehand. Since list corruption warnings were coming from cgroup subsystem, corresponding objects were in doubt. Enabling slub_debug for kmalloc-4k helped in locating the actual corruption. Admittedly both of the above issues were result of backporting mistakes but nonetheless they happened in production systems where very few debugging options were available. By "certain debugging scenarios" I meant such cases where some initial data (from production fleet) like vmcore or kernel debug messages can give some pointer towards which slab objects could be wrong and then we would use this feature (along with further tuning like increasing sampling frequency, pool size if needed/possible) to pinpoint the actual issue. The idea is that limiting KFENCE to few slabs will increase the probablity of catching the issue even if we are not able to tweak pool size. Please let me know if it sounds reasonable or if I missed something from your query. Thanks, -- Imran