From: Mikulas Patocka <mpatocka@redhat.com>
To: Michal Hocko <mhocko@kernel.org>,
Alexei Starovoitov <ast@kernel.org>,
Daniel Borkmann <daniel@iogearbox.net>
Cc: Andrew Morton <akpm@linux-foundation.org>,
Stephen Rothwell <sfr@canb.auug.org.au>,
Vlastimil Babka <vbabka@suse.cz>,
Andreas Dilger <adilger@dilger.ca>,
John Hubbard <jhubbard@nvidia.com>,
David Miller <davem@davemloft.net>,
linux-kernel@vger.kernel.org, linux-mm@kvack.org,
netdev@vger.kernel.org
Subject: Re: [PATCH] mm: convert three more cases to kvmalloc
Date: Thu, 29 Jun 2017 22:13:26 -0400 (EDT) [thread overview]
Message-ID: <alpine.LRH.2.02.1706292205110.21823@file01.intranet.prod.int.rdu2.redhat.com> (raw)
In-Reply-To: <20170629071046.GA31603@dhcp22.suse.cz>
On Thu, 29 Jun 2017, Michal Hocko wrote:
> On Wed 28-06-17 23:24:10, Mikulas Patocka wrote:
> [...]
> > From: Mikulas Patocka <mpatocka@redhat.com>
> >
> > The patch a7c3e901 ("mm: introduce kv[mz]alloc helpers") converted a lot
> > of kernel code to kvmalloc. This patch converts three more forgotten
> > cases.
>
> Thanks! I have two remarks below but other than that feel free to add
>
> > Signed-off-by: Mikulas Patocka <mpatocka@redhat.com>
>
> Acked-by: Michal Hocko <mhocko@suse.com>
> [...]
> > Index: linux-2.6/kernel/bpf/syscall.c
> > ===================================================================
> > --- linux-2.6.orig/kernel/bpf/syscall.c
> > +++ linux-2.6/kernel/bpf/syscall.c
> > @@ -58,16 +58,7 @@ void *bpf_map_area_alloc(size_t size)
> > * trigger under memory pressure as we really just want to
> > * fail instead.
> > */
> > - const gfp_t flags = __GFP_NOWARN | __GFP_NORETRY | __GFP_ZERO;
> > - void *area;
> > -
> > - if (size <= (PAGE_SIZE << PAGE_ALLOC_COSTLY_ORDER)) {
> > - area = kmalloc(size, GFP_USER | flags);
> > - if (area != NULL)
> > - return area;
> > - }
> > -
> > - return __vmalloc(size, GFP_KERNEL | flags, PAGE_KERNEL);
> > + return kvmalloc(size, GFP_USER | __GFP_NOWARN | __GFP_NORETRY | __GFP_ZERO);
>
> kvzalloc without additional flags would be more appropriate.
> __GFP_NORETRY is explicitly documented as non-supported
How is __GFP_NORETRY non-supported?
> and NOWARN wouldn't be applied everywhere in the vmalloc path.
__GFP_NORETRY and __GFP_NOWARN wouldn't be applied in the page-table
allocation and they would be applied in the page allocation - that seems
acceptable.
But the problem here is that if the system is under memory stress,
__GFP_NORETRY allocations would randomly fail (they would fail for example
if there's a plenty of free swap space and the system is busy swapping)
and that would make the BFP creation code randomly fail.
BPF maintainers, please explain, how are you dealing with the random
memory allocation failures? Is there some other code in the BPF stack that
retries the failed allocations?
> > }
> >
> > void bpf_map_area_free(void *area)
> > Index: linux-2.6/kernel/cgroup/cgroup-v1.c
> > ===================================================================
> > --- linux-2.6.orig/kernel/cgroup/cgroup-v1.c
> > +++ linux-2.6/kernel/cgroup/cgroup-v1.c
> > @@ -184,15 +184,10 @@ struct cgroup_pidlist {
> > /*
> > * The following two functions "fix" the issue where there are more pids
> > * than kmalloc will give memory for; in such cases, we use vmalloc/vfree.
> > - * TODO: replace with a kernel-wide solution to this problem
> > */
> > -#define PIDLIST_TOO_LARGE(c) ((c) * sizeof(pid_t) > (PAGE_SIZE * 2))
> > static void *pidlist_allocate(int count)
> > {
> > - if (PIDLIST_TOO_LARGE(count))
> > - return vmalloc(count * sizeof(pid_t));
> > - else
> > - return kmalloc(count * sizeof(pid_t), GFP_KERNEL);
> > + return kvmalloc(count * sizeof(pid_t), GFP_KERNEL);
> > }
>
> I would rather use kvmalloc_array to have an overflow protection as
> well.
Yes.
Mikulas
> >
> > static void pidlist_free(void *p)
>
> --
> Michal Hocko
> SUSE Labs
>
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
next prev parent reply other threads:[~2017-06-30 2:13 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-06-29 3:24 Mikulas Patocka
2017-06-29 7:10 ` Michal Hocko
2017-06-30 2:13 ` Mikulas Patocka [this message]
2017-06-30 7:21 ` Michal Hocko
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=alpine.LRH.2.02.1706292205110.21823@file01.intranet.prod.int.rdu2.redhat.com \
--to=mpatocka@redhat.com \
--cc=adilger@dilger.ca \
--cc=akpm@linux-foundation.org \
--cc=ast@kernel.org \
--cc=daniel@iogearbox.net \
--cc=davem@davemloft.net \
--cc=jhubbard@nvidia.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=mhocko@kernel.org \
--cc=netdev@vger.kernel.org \
--cc=sfr@canb.auug.org.au \
--cc=vbabka@suse.cz \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox