Received: by 2002:ab2:6c55:0:b0:1fd:c486:4f03 with SMTP id v21csp85160lqp; Tue, 11 Jun 2024 15:53:05 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCU0XF5dk9ASw0MhysySZSYYGq1OCyQ0iljJlxa8vdw0GelxeOcI87Am91dZj07atGhfCiNjLfeQsTKXG/djDhkOYBYczimeJCrZQnmVtA== X-Google-Smtp-Source: AGHT+IEuQURFSCcQXBR+x9Uhwz3dBNhRPaw5oqG/V12E/N5b+9iqr8dOx3bAKsbfazlq13YgJ7mI X-Received: by 2002:a17:902:e74c:b0:1f6:91a1:88cb with SMTP id d9443c01a7336-1f83b637bb6mr3197225ad.31.1718146385438; Tue, 11 Jun 2024 15:53:05 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1718146385; cv=pass; d=google.com; s=arc-20160816; b=L05dVxq1BXnMe7B+0MRAkRyl+4T8AgkjpdvZGJ0CGoYVtqVY8WSc5I0Efyp76jl7U+ UrHoiYfaoQU9WQUCsYuBucwsTqpU1829keTw4p7tveT8pt9wczWA5EC9EBo3Ig//Aqkc 1ppGKS9sUz0aZTSv4LMDQ0SOJxBeXfyjf8KM+uILjMZqlmVPubE3BDV6oS9Pz74zK1VK 6FrhxZtdTW+gxiJxE8ug+bmPJfBTpw2nX9e7uf9O6BCJlMHd4RCn2xkF2LA0IlLfiVDR h//W1NVwgkaEmu8Y/gQOFpSlq3URwfbXtErNqLrxvKs8pBMW6FQlpFWt6aI9KxAfnn7A dppQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:message-id:in-reply-to:subject:cc:to:from:date; bh=9CScgyQvPGvi4Um0g0aYMe8Q8pBLDSBEcAsj3PAkGS8=; fh=KRfzXnp21GkysK1o4MheqtaBTi73hun9SULyFtowA14=; b=QGxPOO08sqtknuKzpZmaCs5S8tNiHb+xdf52jL+SS/N+HsNTxw9NP7kzdP5mXxhdDp EBetd2Y5jKvuBtWyZHOOLZy1YEGyjkAUQEweOr4HzDO8MBb2F+ac2xe8r6vsc9luhyEh axyRGUpgJUNRlBZWEW6/E86z75r52PzEWemGYgA3yLoyRx1vrgRItBsTNuISkP/kEKNC UlCE2bQlWkPoKYnKcV/cjHOGw0OmBriSjLUcp9yxzHsE0eO7z2vvJ2bNnyAvnB7pdMVV yWzK6XvmRokXT1rqZC0SaMupyhIrWgICJdQZA4EytHRRKHQF/TH77T9+AmpUoVPHdtU3 jZ6A==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-210678-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-210678-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linux.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id d9443c01a7336-1f71ae338c7si36347445ad.248.2024.06.11.15.53.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 11 Jun 2024 15:53:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-210678-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-210678-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-210678-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linux.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 1163A284D3E for ; Tue, 11 Jun 2024 22:53:05 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 76E2315572F; Tue, 11 Jun 2024 22:52:58 +0000 (UTC) Received: from gentwo.org (gentwo.org [62.72.0.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B665E15532C for ; Tue, 11 Jun 2024 22:52:55 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=62.72.0.81 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718146378; cv=none; b=HpN73S1jW0GCxdC2Bvu9mRdwc84l06MJjZ77JvTI9sGkQh+9HCOhU8/+LNzH9QhMleOOk2VSPw02+YTjqXn3rXd4wPUjXgpnSyAiAajVLmwiosdHXQNTMPtFbNX5ru/o8E4fea/1oHRyt+NgKD22pLf+Cp1QyiPAAQY6gcD/H1g= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718146378; c=relaxed/simple; bh=SIT2jXM8IDEMsc9d2jfo+rlecAxKwI0P7aHxOSr5QnA=; h=Date:From:To:cc:Subject:In-Reply-To:Message-ID:References: MIME-Version:Content-Type; b=ofrFg/Ms4DZLUpJ3QrxMmslSHAAiuvVkCXP94tbKOq9jgTOhla2QghNfCX9gvgxOt2Dhygt1AJZNBUMxivmnJd98nLFXrs0wrUDlLJUTdHepvoQw+JJbJDAUbi4QaFNYMTGGhf2oXhnuLa4zjpgan/LCk30uj0HfMDfVywlPhJY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.com; spf=fail smtp.mailfrom=linux.com; arc=none smtp.client-ip=62.72.0.81 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=linux.com Received: by gentwo.org (Postfix, from userid 1003) id 41D2640B10; Tue, 11 Jun 2024 15:52:49 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by gentwo.org (Postfix) with ESMTP id 40D6A4093E; Tue, 11 Jun 2024 15:52:49 -0700 (PDT) Date: Tue, 11 Jun 2024 15:52:49 -0700 (PDT) From: "Christoph Lameter (Ampere)" To: Vlastimil Babka cc: Chengming Zhou , Pekka Enberg , David Rientjes , Joonsoo Kim , Andrew Morton , Roman Gushchin , Hyeonggon Yoo <42.hyeyoo@gmail.com>, Feng Tang , linux-mm@kvack.org, linux-kernel@vger.kernel.org, zhouchengming@bytedance.com, Kees Cook Subject: Re: [PATCH v3 1/3] slab: make check_object() more consistent In-Reply-To: <8b844d71-01f1-472b-a63a-4c9cdb26e9ef@suse.cz> Message-ID: References: <20240607-b4-slab-debug-v3-0-bb2a326c4ceb@linux.dev> <20240607-b4-slab-debug-v3-1-bb2a326c4ceb@linux.dev> <63da08b7-7aa3-3fad-55e6-9fc3928a49de@gentwo.org> <8b844d71-01f1-472b-a63a-4c9cdb26e9ef@suse.cz> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed On Mon, 10 Jun 2024, Vlastimil Babka wrote: > Even if some security people enable parts of slub debugging for security > people it is my impression they would rather panic/reboot or have memory > leaked than trying to salvage the slab page? (CC Kees) In the past these resilience features have been used to allow the continued operation of a broken kernel. So first the Kernel crashed with some obscure oops in the allocator due to metadata corruption. One can then put a slub_debug option on the kernel command line which will result in detailed error reports on what caused the corruption. It will also activate resilience measures that will often allow the continued operation until a fix becomes available.