From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.2 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_ADSP_CUSTOM_MED,DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 98560C388F9 for ; Wed, 11 Nov 2020 15:14:53 +0000 (UTC) Received: from merlin.infradead.org (merlin.infradead.org [205.233.59.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 024922065E for ; Wed, 11 Nov 2020 15:14:52 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="Iq1wpuN1"; dkim=fail reason="signature verification failed" (2048-bit key) header.d=google.com header.i=@google.com header.b="gCOH6uGa" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 024922065E Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=google.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References:Message-ID: Subject:To:From:Date:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=HEXaYL2vcqRgcgDZyvqYHxHeoQk8uzvTjc5/fOzQTOo=; b=Iq1wpuN1SvDqAtdhH5g+5641j Xyieu2xzawr0DcHs9wpq492eJSaaXZjZI7njdP2MyeS/4Su3cJp9LF7DG1dh4CogLyESfysXmlgUE gbRdFTZK7o6hbB84wtRVYO58QD5mucUCOINUw/IVuH3DtYmNZtg3Eh6mvd0GKUn0oW8rkc6zAnAd4 7JFL+NggEPk5wyeHrZovqCmvZrLHa9c5VGX0vES2XhFhv/sq/n9y78v5DYa8P/vcL75rZyll2RKCQ EY2nDyo3uqYlbTUGsBMxBfRo4ddgDEz5aJGtS2rF68rM2q7jh4CTtZbzI9SJKYnIRcYCj3ylOtJd+ GwwE3p/CQ==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1kcroh-0004BB-FS; Wed, 11 Nov 2020 15:13:47 +0000 Received: from mail-wr1-x444.google.com ([2a00:1450:4864:20::444]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1kcroe-0004A9-48 for linux-arm-kernel@lists.infradead.org; Wed, 11 Nov 2020 15:13:45 +0000 Received: by mail-wr1-x444.google.com with SMTP id r17so2894653wrw.1 for ; Wed, 11 Nov 2020 07:13:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=p+INv8JEk5XPkG3ax0MxxlvUdmFmE55+jTOg5CXTsRM=; b=gCOH6uGacfEGAlGZE5LqTC3tTkpdWZ1awdWHzQ8/nU3bavxaDN+dvvIqQQCDtIn4E+ 3RccuUGS3SlpCsZL/zgllI5FQey6ukHD5asCGHApC5TICTWXprEaVlcXu2mVzAOmVa7V yqOtn83ZQdRPRd+UiACgcmhKaDL7eaaGlxYTZR5MyymcXS1t4tK7TA7FJKeeq1UidxBT ybeMeXhNb63l2HWe8omDpdT3bOXVwQR3Lv/8z5U7wSeqbCrsknV92vkmuZSayjkuTYyk 2N7rCakFWaEz6IlkpMF+r2qYsZUYOydIB4wG/GN4dNOblyjF/AUDbQEXxiCanhKBuXXi Upjg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=p+INv8JEk5XPkG3ax0MxxlvUdmFmE55+jTOg5CXTsRM=; b=Z6Ue4rRQ0AGmsmKGArV1c0E2AcvKDVf70OaReXTkQiLSXlF/k+Y7Iif7Ergz2s2V4m +O7QQDvLuC3fAaW71q0m7oiXIeuj6FazkoxSQpAhzJCo1d8nUlfkP3STi06+8qz5Xk+z OyylU9808+tHIxpRce7xS9s1BZ9G59pKJ2hWAGEQj1mIKnhpj8hGJcxg/fKurVhkK7nK tbJdW+iINGZNltiH61h1XkN/DJdfS952zpj0y6E94AvSl55yBiG+WYO7TTQxEgsKGNZk WwJse9ZXu+geWQZTTdPUaCv32bfwerxGRoIbU8UWY8kwoQoh1IKzy6iC3NqVH4niAG/t UukA== X-Gm-Message-State: AOAM530P7jFtXkBWvP+Qn68qD8tK00/5+s6FAz63dq6TbR4LkbzBQBeg GaabK0xrvAKDcGwAuC1pMcl6lw== X-Google-Smtp-Source: ABdhPJyT0sGWjPC6z/N8eDyDtVf0jkrEfp0riVXnnt/LmxwMaGfpcHd9dqUAYqGcWbLufSEkVWMBFg== X-Received: by 2002:adf:db4a:: with SMTP id f10mr15496651wrj.420.1605107622540; Wed, 11 Nov 2020 07:13:42 -0800 (PST) Received: from elver.google.com ([2a00:79e0:15:13:f693:9fff:fef4:2449]) by smtp.gmail.com with ESMTPSA id p13sm2763952wrt.73.2020.11.11.07.13.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Nov 2020 07:13:41 -0800 (PST) Date: Wed, 11 Nov 2020 16:13:36 +0100 From: Marco Elver To: Andrey Konovalov Subject: Re: [PATCH v2 19/20] kasan, mm: allow cache merging with no metadata Message-ID: <20201111151336.GA517454@elver.google.com> References: <936c0c198145b663e031527c49a6895bd21ac3a0.1605046662.git.andreyknvl@google.com> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <936c0c198145b663e031527c49a6895bd21ac3a0.1605046662.git.andreyknvl@google.com> User-Agent: Mutt/1.14.6 (2020-07-11) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20201111_101344_229428_0075E8E0 X-CRM114-Status: GOOD ( 29.28 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: linux-arm-kernel@lists.infradead.org, Branislav Rankov , Catalin Marinas , Kevin Brodsky , Will Deacon , linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, Alexander Potapenko , Dmitry Vyukov , Andrey Ryabinin , Andrew Morton , Vincenzo Frascino , Evgenii Stepanov Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Tue, Nov 10, 2020 at 11:20PM +0100, Andrey Konovalov wrote: > The reason cache merging is disabled with KASAN is because KASAN puts its > metadata right after the allocated object. When the merged caches have > slightly different sizes, the metadata ends up in different places, which > KASAN doesn't support. > > It might be possible to adjust the metadata allocation algorithm and make > it friendly to the cache merging code. Instead this change takes a simpler > approach and allows merging caches when no metadata is present. Which is > the case for hardware tag-based KASAN with kasan.mode=prod. > > Signed-off-by: Andrey Konovalov > Link: https://linux-review.googlesource.com/id/Ia114847dfb2244f297d2cb82d592bf6a07455dba > --- > include/linux/kasan.h | 26 ++++++++++++++++++++++++-- > mm/kasan/common.c | 11 +++++++++++ > mm/slab_common.c | 11 ++++++++--- > 3 files changed, 43 insertions(+), 5 deletions(-) > > diff --git a/include/linux/kasan.h b/include/linux/kasan.h > index 534ab3e2935a..c754eca356f7 100644 > --- a/include/linux/kasan.h > +++ b/include/linux/kasan.h > @@ -81,17 +81,35 @@ struct kasan_cache { > }; > > #ifdef CONFIG_KASAN_HW_TAGS > + > DECLARE_STATIC_KEY_FALSE(kasan_flag_enabled); > + > static inline kasan_enabled(void) > { > return static_branch_likely(&kasan_flag_enabled); > } > -#else > + > +slab_flags_t __kasan_never_merge(slab_flags_t flags); > +static inline slab_flags_t kasan_never_merge(slab_flags_t flags) > +{ > + if (kasan_enabled()) > + return __kasan_never_merge(flags); > + return flags; > +} > + > +#else /* CONFIG_KASAN_HW_TAGS */ > + > static inline kasan_enabled(void) > { > return true; > } > -#endif > + > +static inline slab_flags_t kasan_never_merge(slab_flags_t flags) > +{ > + return flags; > +} > + > +#endif /* CONFIG_KASAN_HW_TAGS */ > > void __kasan_alloc_pages(struct page *page, unsigned int order); > static inline void kasan_alloc_pages(struct page *page, unsigned int order) > @@ -240,6 +258,10 @@ static inline kasan_enabled(void) > { > return false; > } > +static inline slab_flags_t kasan_never_merge(slab_flags_t flags) > +{ > + return flags; > +} > static inline void kasan_alloc_pages(struct page *page, unsigned int order) {} > static inline void kasan_free_pages(struct page *page, unsigned int order) {} > static inline void kasan_cache_create(struct kmem_cache *cache, > diff --git a/mm/kasan/common.c b/mm/kasan/common.c > index 940b42231069..25b18c145b06 100644 > --- a/mm/kasan/common.c > +++ b/mm/kasan/common.c > @@ -81,6 +81,17 @@ asmlinkage void kasan_unpoison_task_stack_below(const void *watermark) > } > #endif /* CONFIG_KASAN_STACK */ > > +/* > + * Only allow cache merging when stack collection is disabled and no metadata > + * is present. > + */ > +slab_flags_t __kasan_never_merge(slab_flags_t flags) > +{ > + if (kasan_stack_collection_enabled()) > + return flags; > + return flags & ~SLAB_KASAN; > +} > + > void __kasan_alloc_pages(struct page *page, unsigned int order) > { > u8 tag; > diff --git a/mm/slab_common.c b/mm/slab_common.c > index f1b0c4a22f08..3042ee8ea9ce 100644 > --- a/mm/slab_common.c > +++ b/mm/slab_common.c > @@ -18,6 +18,7 @@ > #include > #include > #include > +#include > #include > #include > #include > @@ -49,12 +50,16 @@ static DECLARE_WORK(slab_caches_to_rcu_destroy_work, > slab_caches_to_rcu_destroy_workfn); > > /* > - * Set of flags that will prevent slab merging > + * Set of flags that will prevent slab merging. > + * Use slab_never_merge() instead. > */ > #define SLAB_NEVER_MERGE (SLAB_RED_ZONE | SLAB_POISON | SLAB_STORE_USER | \ > SLAB_TRACE | SLAB_TYPESAFE_BY_RCU | SLAB_NOLEAKTRACE | \ > SLAB_FAILSLAB | SLAB_KASAN) Rather than changing this to require using slab_never_merge() which removes SLAB_KASAN, could we not just have a function kasan_never_merge() that returns KASAN-specific flags that should never result in merging -- because as-is now, making kasan_never_merge() remove the SLAB_KASAN flag seems the wrong way around. Could we not just do this: #define SLAB_NEVER_MERGE (SLAB_RED_ZONE | SLAB_POISON | SLAB_STORE_USER | \ SLAB_TRACE | SLAB_TYPESAFE_BY_RCU | SLAB_NOLEAKTRACE | \ SLAB_FAILSLAB | kasan_never_merge()) ?? Of course that might be problematic if this always needs to be a compile-time constant, but currently that's not a requirement. > +/* KASAN allows merging in some configurations and will remove SLAB_KASAN. */ > +#define slab_never_merge() (kasan_never_merge(SLAB_NEVER_MERGE)) Braces unnecessary. > #define SLAB_MERGE_SAME (SLAB_RECLAIM_ACCOUNT | SLAB_CACHE_DMA | \ > SLAB_CACHE_DMA32 | SLAB_ACCOUNT) > > @@ -164,7 +169,7 @@ static unsigned int calculate_alignment(slab_flags_t flags, > */ > int slab_unmergeable(struct kmem_cache *s) > { > - if (slab_nomerge || (s->flags & SLAB_NEVER_MERGE)) > + if (slab_nomerge || (s->flags & slab_never_merge())) > return 1; > > if (s->ctor) > @@ -198,7 +203,7 @@ struct kmem_cache *find_mergeable(unsigned int size, unsigned int align, > size = ALIGN(size, align); > flags = kmem_cache_flags(size, flags, name, NULL); > > - if (flags & SLAB_NEVER_MERGE) > + if (flags & slab_never_merge()) > return NULL; > > list_for_each_entry_reverse(s, &slab_caches, list) { > -- > 2.29.2.222.g5d2a92d10f8-goog > _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel