From: Vlastimil Babka <vbabka@suse.cz>
To: Mateusz Guzik <mjguzik@gmail.com>
Cc: Jens Axboe <axboe@kernel.dk>, LKML <linux-kernel@vger.kernel.org>,
Linux Memory Management List <linux-mm@kvack.org>,
Andrew Morton <akpm@linux-foundation.org>,
Alexei Starovoitov <ast@kernel.org>,
Daniel Borkmann <daniel@iogearbox.net>,
Andrii Nakryiko <andrii@kernel.org>,
Martin KaFai Lau <kafai@fb.com>, Song Liu <songliubraving@fb.com>,
Jesper Dangaard Brouer <hawk@kernel.org>,
Christoph Lameter <cl@linux.com>,
David Rientjes <rientjes@google.com>,
Pekka Enberg <penberg@kernel.org>,
Joonsoo Kim <iamjoonsoo.kim@lge.com>, Yonghong Song <yhs@fb.com>,
John Fastabend <john.fastabend@gmail.com>,
KP Singh <kpsingh@kernel.org>,
Howard McLauchlan <hmclauchlan@fb.com>,
bpf@vger.kernel.org, torvalds@linux-foundation.org
Subject: Re: [PATCH] mm: don't call should_failslab() for !CONFIG_FAILSLAB
Date: Fri, 31 May 2024 11:36:22 +0200 [thread overview]
Message-ID: <12c1dbf0-d458-49a3-b4b3-b0e8a8bd2cd8@suse.cz> (raw)
In-Reply-To: <3j5d3p22ssv7xoaghzraa7crcfih3h2qqjlhmjppbp6f42pg2t@kg7qoicog5ye>
On 5/27/24 11:34 AM, Mateusz Guzik wrote:
> +cc Linus
>
> On Thu, Oct 07, 2021 at 05:32:52PM +0200, Vlastimil Babka wrote:
>> On 10/5/21 17:31, Jens Axboe wrote:
>> > Allocations can be a very hot path, and this out-of-line function
>> > call is noticeable.
>> >
>> > Signed-off-by: Jens Axboe <axboe@kernel.dk>
>>
>> It used to be inline b4 (hi, Konstantin!) and then was converted to be like
>> this intentionally :/
>>
>> See 4f6923fbb352 ("mm: make should_failslab always available for fault
>> injection")
>>
>> And now also kernel/bpf/verifier.c contains:
>> BTF_ID(func, should_failslab)
>>
>> I think either your or Andrew's version will break this BTF_ID thing, at the
>> very least.
>>
>> But I do strongly agree that putting unconditionally a non-inline call into
>> slab allocator fastpath sucks. Can we make it so that bpf can only do these
>> overrides when CONFIG_FAILSLAB is enabled?
>> I don't know, perhaps putting this BTF_ID() in #ifdef as well, or providing
>> a dummy that is always available (so that nothing breaks), but doesn't
>> actually affect slab_pre_alloc_hook() unless CONFIG_FAILSLAB has been enabled?
>>
>
> I just ran into it while looking at kmalloc + kfree pair.
>
> A toy test which calls this in a loop like so:
> static long noinline custom_bench(void)
> {
> void *buf;
>
> while (!signal_pending(current)) {
> buf = kmalloc(16, GFP_KERNEL);
> kfree(buf);
> cond_resched();
> }
>
> return -EINTR;
> }
>
> ... shows this with perf top:
> 57.88% [kernel] [k] kfree
> 31.38% [kernel] [k] kmalloc_trace_noprof
> 3.20% [kernel] [k] should_failslab.constprop.0
>
> A side note is that I verified majority of the time in kfree and
> kmalloc_trace_noprof is cmpxchg16b, which is both good and bad news.
>
> As for should_failslab, it compiles to an empty func on production
> kernels and is present even when there are no supported means of
> instrumenting it. As in everyone pays for its existence, even if there
> is no way to use it.
>
> Also note there are 3 unrelated mechanisms to alter the return code,
> which imo is 2 too many. But more importantly they are not even
> coordinated.
>
> A hard requirement for a long term solution is to not alter the fast
> path beyond nops for hot patching.
>
> So far I think implementing this in a clean manner would require
> agreeing on some namespace for bpf ("failprobes"?) and coordinating
> hotpatching between different mechanisms. Maybe there is a better, I
> don't know.
I've attempted something (not complete yet) here:
https://lore.kernel.org/all/20240531-fault-injection-statickeys-v1-0-a513fd0a9614@suse.cz/
> Here is the crux of my e-mail though:
> 1. turning should_failslab into a mandatory func call is an ok local
> hack for the test farm, not a viable approach for production
> 2. as such it is up to the original submitter (or whoever else
> who wants to pick up the slack) to implement something which
> hotpatches the callsite as opposed to inducing a function call for
> everyone
>
> In the meantime the routine should disappear unless explicitly included
> in kernel config. The patch submitted here would be one way to do it.
prev parent reply other threads:[~2024-05-31 9:36 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-10-05 15:31 Jens Axboe
2021-10-05 21:18 ` Andrew Morton
2021-10-05 21:20 ` Jens Axboe
2021-10-07 15:32 ` Vlastimil Babka
2021-10-07 15:50 ` Jens Axboe
2021-10-07 16:36 ` Konstantin Ryabitsev
[not found] ` <3j5d3p22ssv7xoaghzraa7crcfih3h2qqjlhmjppbp6f42pg2t@kg7qoicog5ye>
2024-05-31 9:36 ` Vlastimil Babka [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=12c1dbf0-d458-49a3-b4b3-b0e8a8bd2cd8@suse.cz \
--to=vbabka@suse.cz \
--cc=akpm@linux-foundation.org \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=axboe@kernel.dk \
--cc=bpf@vger.kernel.org \
--cc=cl@linux.com \
--cc=daniel@iogearbox.net \
--cc=hawk@kernel.org \
--cc=hmclauchlan@fb.com \
--cc=iamjoonsoo.kim@lge.com \
--cc=john.fastabend@gmail.com \
--cc=kafai@fb.com \
--cc=kpsingh@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=mjguzik@gmail.com \
--cc=penberg@kernel.org \
--cc=rientjes@google.com \
--cc=songliubraving@fb.com \
--cc=torvalds@linux-foundation.org \
--cc=yhs@fb.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox