From: Vlastimil Babka <vbabka@suse.cz>
To: Alexander Atanasov <alexander.atanasov@virtuozzo.com>,
Jonathan Corbet <corbet@lwn.net>,
Christoph Lameter <cl@linux.com>,
Pekka Enberg <penberg@kernel.org>,
David Rientjes <rientjes@google.com>,
Joonsoo Kim <iamjoonsoo.kim@lge.com>,
Andrew Morton <akpm@linux-foundation.org>,
Roman Gushchin <roman.gushchin@linux.dev>,
Hyeonggon Yoo <42.hyeyoo@gmail.com>
Cc: kernel@openvz.org, Kees Cook <keescook@chromium.org>,
Roman Gushchin <guro@fb.com>, Jann Horn <jannh@google.com>,
Vijayanand Jitta <vjitta@codeaurora.org>,
linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org,
linux-mm@kvack.org
Subject: Re: [PATCH] mm: Make failslab writable again
Date: Tue, 20 Sep 2022 11:29:40 +0200 [thread overview]
Message-ID: <60111450-d66a-a146-1a70-0c093400f3e5@suse.cz> (raw)
In-Reply-To: <6f5a8f71-3d82-97bf-90e1-0f33546bb59b@virtuozzo.com>
On 9/20/22 11:17, Alexander Atanasov wrote:
> Hello,
>
> On 20.09.22 11:42, Vlastimil Babka wrote:
>> On 9/20/22 10:20, Alexander Atanasov wrote:
>>> In (060807f841ac mm, slub: make remaining slub_debug related attributes
>>> read-only failslab) it was made RO.
>>
>> "read-only) failslab was made RO" ?
>
> Yep.
>
>>> I think it became a collateral victim to the other two options
>>> (sanity_checks and trace) for which the reasons are perfectly valid.
>>
>> The commit also mentioned that modifying the flags is not protected in any
>> way, see below.
>
> Yes, indeed.
>
>>> +static ssize_t failslab_store(struct kmem_cache *s, const char *buf,
>>> + size_t length)
>>> +{
>>> + if (s->refcount > 1)
>>> + return -EINVAL;
>>> +
>>> + s->flags &= ~SLAB_FAILSLAB;
>>> + if (buf[0] == '1')
>>> + s->flags |= SLAB_FAILSLAB;
>>
>> Could we at least use a temporary variable to set up the final value and
>> then do a WRITE_ONCE() to s->flags, so the compiler is not allowed to do
>> some funky stuff? Assuming this is really the only place where we modify
>> s->flags during runtime, so we can't miss other updates due to RMW.
>
> Since it is set or clear - instead of temporary variable and potentially two
> writes and RMW issues i would suggest this:
> + if (buf[0] == '1')
> + s->flags |= SLAB_FAILSLAB;
> + else
> + s->flags &= ~SLAB_FAILSLAB;
This way also has RMW issues, and also the compiler is allowed to
temporarily modify s->flags any way it likes; with WRITE_ONCE() it can't.
> If at some point more places need to modify the flags at runtime they can
> switch to atomic bit ops.
next prev parent reply other threads:[~2022-09-20 9:29 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-09-20 8:20 Alexander Atanasov
2022-09-20 8:42 ` Vlastimil Babka
2022-09-20 9:17 ` Alexander Atanasov
2022-09-20 9:29 ` Vlastimil Babka [this message]
2022-09-20 10:21 ` Alexander Atanasov
2022-09-20 10:31 ` Vlastimil Babka
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=60111450-d66a-a146-1a70-0c093400f3e5@suse.cz \
--to=vbabka@suse.cz \
--cc=42.hyeyoo@gmail.com \
--cc=akpm@linux-foundation.org \
--cc=alexander.atanasov@virtuozzo.com \
--cc=cl@linux.com \
--cc=corbet@lwn.net \
--cc=guro@fb.com \
--cc=iamjoonsoo.kim@lge.com \
--cc=jannh@google.com \
--cc=keescook@chromium.org \
--cc=kernel@openvz.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=penberg@kernel.org \
--cc=rientjes@google.com \
--cc=roman.gushchin@linux.dev \
--cc=vjitta@codeaurora.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox