Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp2139298pxb; Sat, 21 Nov 2020 10:08:41 -0800 (PST) X-Google-Smtp-Source: ABdhPJz9jN3r2a4/8ruKJcjM72kACdpiygSYLUHIvzjGkMHLAvksvspCZkk4EoucO0Sbu7xUNeYl X-Received: by 2002:a17:906:3294:: with SMTP id 20mr37461318ejw.239.1605982121513; Sat, 21 Nov 2020 10:08:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605982121; cv=none; d=google.com; s=arc-20160816; b=uGaJ/Gs0L1K5fJepRWY7Amni4Z0z2Rx65E3KtMBQHV+WqSPcqJ8Md9eTiSTiTdHxbD 9aVwW7wt2MF8JMleO/mkTj6KhXuLg/Jb4ExK/ZJFU9hLj6giiD6ss15eXVmPNre+vF+t lrTPF2/y7AQPGuyNa1oc0vRLz5RIgQ4d44SojyrkXLCT0j6eDdqT/38x4VRjBzr6qVCR bgjCwlhvhgl4MgOEy9j2p3ipga5/tCbwaDz5Eo0EnnOWmiK4p26n7hfYDxDQWUyFaw6E tnrz+3J0F/l6AcDzGPmNmASZjHSgNx4xH6Nxk2g7R3kSqoOmPKm1GlKS8QeVenRb7RpF Vpag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=ri/HvnKTuN5IJVl9wAnme38lg4nmhUDVrp0UPnY+kmA=; b=T38pwI4yNcs50E8s4v9AeKkSMKcQ+9ATWRqHftbqT+IpYXt0Ik91Qst+kQolfbmT3y o4aGoohfpcZtIwbzETLqpoQBGB0d8QeMHiCAN2wT4rNKtuQhFdY7zwT2U+4slmj4jBlj ck6IkdZmFduXDq1OifDgEtRsIvenIHqS1x77w35821+HpcXHKkjF7TEKJWTikZ3MACJU AEYnSvKHVhYzx97zL6ntMcoTW96+Y51Cfpl/VBaVDSdMXk0ES5fZbftbQwg6CKp6e/FY vmTYwm7wdx5+NK/H1hpkHNIT6ag5VNX9/AoM+d+QZsDbM+8IkH7zlmBU8G9jjbPnc5Y+ wFww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NZ0ejuk5; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j9si494555edl.351.2020.11.21.10.08.18; Sat, 21 Nov 2020 10:08:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NZ0ejuk5; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728010AbgKUSGj (ORCPT + 99 others); Sat, 21 Nov 2020 13:06:39 -0500 Received: from mail.kernel.org ([198.145.29.99]:47562 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726305AbgKUSGi (ORCPT ); Sat, 21 Nov 2020 13:06:38 -0500 Received: from kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com (unknown [163.114.132.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3BA0422201; Sat, 21 Nov 2020 18:06:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1605981997; bh=pRRiUjCIvCXAWQNcMYZqHMIWEh2yfgzcy8eELup0gSo=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=NZ0ejuk5Xv9pZVpBhbuGW9tzWoNsMypJ7ObGrE/j6g6en8v9NtxU0fUeBrD2JDTuv m+Kyi/QLoCfCxrqK+hpCE/Uqk+oj4whfKcAsjMluBdYOmQJB3Lt0CPJlfM140yyJcg gfC36WtEGRWL2BXa6CBVyx9z3bxNzvMKPoiQCKa8= Date: Sat, 21 Nov 2020 10:06:36 -0800 From: Jakub Kicinski To: Florian Westphal Cc: Ido Schimmel , Aleksandr Nogikh , davem@davemloft.net, johannes@sipsolutions.net, edumazet@google.com, andreyknvl@google.com, dvyukov@google.com, elver@google.com, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, linux-wireless@vger.kernel.org, willemdebruijn.kernel@gmail.com, Aleksandr Nogikh , Willem de Bruijn Subject: Re: [PATCH v5 2/3] net: add kcov handle to skb extensions Message-ID: <20201121100636.26aaaf8a@kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com> In-Reply-To: <20201121165227.GT15137@breakpoint.cc> References: <20201029173620.2121359-1-aleksandrnogikh@gmail.com> <20201029173620.2121359-3-aleksandrnogikh@gmail.com> <20201121160941.GA485907@shredder.lan> <20201121165227.GT15137@breakpoint.cc> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Sat, 21 Nov 2020 17:52:27 +0100 Florian Westphal wrote: > Ido Schimmel wrote: > > Other suggestions? > > Aleksandr, why was this made into an skb extension in the first place? > > AFAIU this feature is usually always disabled at build time. > For debug builds (test farm /debug kernel etc) its always needed. > > If thats the case this u64 should be an sk_buff member, not an > extension. Yeah, in hindsight I should have looked at how it's used. Not a great fit for extensions. We can go back, but... In general I'm not very happy at how this is going. First of all just setting the handle in a couple of allocs seems to not be enough, skbs get cloned, reused etc. There were also build problems caused by this patch and Aleksandr & co where nowhere to be found. Now we find out this causes leaks, how was that not caught by the syzbot it's supposed to serve?! So I'm leaning towards reverting the whole thing. You can attach kretprobes and record the information you need in BPF maps.