From: Alexander Atanasov <alexander.atanasov@virtuozzo.com>
To: Vlastimil Babka <vbabka@suse.cz>,
Jonathan Corbet <corbet@lwn.net>,
Christoph Lameter <cl@linux.com>,
Pekka Enberg <penberg@kernel.org>,
David Rientjes <rientjes@google.com>,
Joonsoo Kim <iamjoonsoo.kim@lge.com>,
Andrew Morton <akpm@linux-foundation.org>,
Roman Gushchin <roman.gushchin@linux.dev>,
Hyeonggon Yoo <42.hyeyoo@gmail.com>
Cc: kernel@openvz.org, Kees Cook <keescook@chromium.org>,
Roman Gushchin <guro@fb.com>, Jann Horn <jannh@google.com>,
Vijayanand Jitta <vjitta@codeaurora.org>,
linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org,
linux-mm@kvack.org
Subject: Re: [PATCH] mm: Make failslab writable again
Date: Tue, 20 Sep 2022 12:17:23 +0300 [thread overview]
Message-ID: <6f5a8f71-3d82-97bf-90e1-0f33546bb59b@virtuozzo.com> (raw)
In-Reply-To: <21646f5c-39ee-a51c-f30c-272de85ee350@suse.cz>
Hello,
On 20.09.22 11:42, Vlastimil Babka wrote:
> On 9/20/22 10:20, Alexander Atanasov wrote:
>> In (060807f841ac mm, slub: make remaining slub_debug related attributes
>> read-only failslab) it was made RO.
>
> "read-only) failslab was made RO" ?
Yep.
>> I think it became a collateral victim to the other two options
>> (sanity_checks and trace) for which the reasons are perfectly valid.
>
> The commit also mentioned that modifying the flags is not protected in any
> way, see below.
Yes, indeed.
>> +static ssize_t failslab_store(struct kmem_cache *s, const char *buf,
>> + size_t length)
>> +{
>> + if (s->refcount > 1)
>> + return -EINVAL;
>> +
>> + s->flags &= ~SLAB_FAILSLAB;
>> + if (buf[0] == '1')
>> + s->flags |= SLAB_FAILSLAB;
>
> Could we at least use a temporary variable to set up the final value and
> then do a WRITE_ONCE() to s->flags, so the compiler is not allowed to do
> some funky stuff? Assuming this is really the only place where we modify
> s->flags during runtime, so we can't miss other updates due to RMW.
Since it is set or clear - instead of temporary variable and potentially
two writes and RMW issues i would suggest this:
+ if (buf[0] == '1')
+ s->flags |= SLAB_FAILSLAB;
+ else
+ s->flags &= ~SLAB_FAILSLAB;
If at some point more places need to modify the flags at runtime they
can switch to atomic bit ops.
--
Regards,
Alexander Atanasov
next prev parent reply other threads:[~2022-09-20 9:17 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-09-20 8:20 Alexander Atanasov
2022-09-20 8:42 ` Vlastimil Babka
2022-09-20 9:17 ` Alexander Atanasov [this message]
2022-09-20 9:29 ` Vlastimil Babka
2022-09-20 10:21 ` Alexander Atanasov
2022-09-20 10:31 ` Vlastimil Babka
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=6f5a8f71-3d82-97bf-90e1-0f33546bb59b@virtuozzo.com \
--to=alexander.atanasov@virtuozzo.com \
--cc=42.hyeyoo@gmail.com \
--cc=akpm@linux-foundation.org \
--cc=cl@linux.com \
--cc=corbet@lwn.net \
--cc=guro@fb.com \
--cc=iamjoonsoo.kim@lge.com \
--cc=jannh@google.com \
--cc=keescook@chromium.org \
--cc=kernel@openvz.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=penberg@kernel.org \
--cc=rientjes@google.com \
--cc=roman.gushchin@linux.dev \
--cc=vbabka@suse.cz \
--cc=vjitta@codeaurora.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox