Message ID | 20231008023317.3015699-4-liushixin2@huawei.com (mailing list archive) |
---|---|
State | New |
Headers | show |
Series | Some bugfix about kmemleak | expand |
On Sun, Oct 08, 2023 at 10:33:16AM +0800, Liu Shixin wrote: > delete_object_part() can be called by multiple callers in the same time. > If an object is found and removed by a caller, and then another caller > try to find it too, it failed and return directly. The secound part still > be recorded by kmemleak even if it has alreadly been freed to buddy. > With DEBUG on, kmemleak will report the following warning: > > kmemleak: Partially freeing unknown object at 0xa1af86000 (size 4096) > CPU: 0 PID: 742 Comm: test_huge Not tainted 6.6.0-rc3kmemleak+ #54 > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 > Call Trace: > <TASK> > dump_stack_lvl+0x37/0x50 > kmemleak_free_part_phys+0x50/0x60 > hugetlb_vmemmap_optimize+0x172/0x290 > ? __pfx_vmemmap_remap_pte+0x10/0x10 > __prep_new_hugetlb_folio+0xe/0x30 > prep_new_hugetlb_folio.isra.0+0xe/0x40 > alloc_fresh_hugetlb_folio+0xc3/0xd0 > alloc_surplus_hugetlb_folio.constprop.0+0x6e/0xd0 > hugetlb_acct_memory.part.0+0xe6/0x2a0 > hugetlb_reserve_pages+0x110/0x2c0 > hugetlbfs_file_mmap+0x11d/0x1b0 > mmap_region+0x248/0x9a0 > ? hugetlb_get_unmapped_area+0x15c/0x2d0 > do_mmap+0x38b/0x580 > vm_mmap_pgoff+0xe6/0x190 > ksys_mmap_pgoff+0x18a/0x1f0 > do_syscall_64+0x3f/0x90 > entry_SYSCALL_64_after_hwframe+0x6e/0xd8 > > Fix the problem by adding a new mutex lock to make sure all objects are > deleted sequentially in delete_object_part(). The kmemleak_lock is not > suitable here because there is a memory allocation with flag GFP_KERNEL. > > Fixes: 53238a60dd4a ("kmemleak: Allow partial freeing of memory blocks") > Signed-off-by: Liu Shixin <liushixin2@huawei.com> > --- > mm/kmemleak.c | 9 ++++++++- > 1 file changed, 8 insertions(+), 1 deletion(-) > > diff --git a/mm/kmemleak.c b/mm/kmemleak.c > index 54c2c90d3abc..ed497866361a 100644 > --- a/mm/kmemleak.c > +++ b/mm/kmemleak.c > @@ -208,6 +208,8 @@ static struct rb_root object_tree_root = RB_ROOT; > static struct rb_root object_phys_tree_root = RB_ROOT; > /* protecting the access to object_list, object_tree_root (or object_phys_tree_root) */ > static DEFINE_RAW_SPINLOCK(kmemleak_lock); > +/* Serial delete_object_part() to ensure all objects are deleted correctly */ > +static DEFINE_MUTEX(delete_object_part_mutex); I mentioned in my reply on v1, do we actually need a lock at all? https://lore.kernel.org/r/ZRRhDgR/SIxbOCDk@arm.com I think we can rework the core a bit to only use kmemleak_lock. We could use GFP_ATOMIC when invoking __create_object(), it won't matter much as partial freeing is used rarely and only during boot. Alternatively, we could allocate two objects outside the lock and just pass them to a new, modified __create_object() function which would avoid re-allocation. The mutex looks simpler but then we need to be careful we only calls these functions in a sleepable context.
diff --git a/mm/kmemleak.c b/mm/kmemleak.c index 54c2c90d3abc..ed497866361a 100644 --- a/mm/kmemleak.c +++ b/mm/kmemleak.c @@ -208,6 +208,8 @@ static struct rb_root object_tree_root = RB_ROOT; static struct rb_root object_phys_tree_root = RB_ROOT; /* protecting the access to object_list, object_tree_root (or object_phys_tree_root) */ static DEFINE_RAW_SPINLOCK(kmemleak_lock); +/* Serial delete_object_part() to ensure all objects are deleted correctly */ +static DEFINE_MUTEX(delete_object_part_mutex); /* allocation caches for kmemleak internal data */ static struct kmem_cache *object_cache; @@ -785,13 +787,15 @@ static void delete_object_part(unsigned long ptr, size_t size, bool is_phys) struct kmemleak_object *object; unsigned long start, end; + mutex_lock(&delete_object_part_mutex); + object = find_and_remove_object(ptr, 1, is_phys); if (!object) { #ifdef DEBUG kmemleak_warn("Partially freeing unknown object at 0x%08lx (size %zu)\n", ptr, size); #endif - return; + goto unlock; } /* @@ -809,6 +813,9 @@ static void delete_object_part(unsigned long ptr, size_t size, bool is_phys) GFP_KERNEL, is_phys); __delete_object(object); + +unlock: + mutex_unlock(&delete_object_part_mutex); } static void __paint_it(struct kmemleak_object *object, int color)
delete_object_part() can be called by multiple callers in the same time. If an object is found and removed by a caller, and then another caller try to find it too, it failed and return directly. The secound part still be recorded by kmemleak even if it has alreadly been freed to buddy. With DEBUG on, kmemleak will report the following warning: kmemleak: Partially freeing unknown object at 0xa1af86000 (size 4096) CPU: 0 PID: 742 Comm: test_huge Not tainted 6.6.0-rc3kmemleak+ #54 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0x37/0x50 kmemleak_free_part_phys+0x50/0x60 hugetlb_vmemmap_optimize+0x172/0x290 ? __pfx_vmemmap_remap_pte+0x10/0x10 __prep_new_hugetlb_folio+0xe/0x30 prep_new_hugetlb_folio.isra.0+0xe/0x40 alloc_fresh_hugetlb_folio+0xc3/0xd0 alloc_surplus_hugetlb_folio.constprop.0+0x6e/0xd0 hugetlb_acct_memory.part.0+0xe6/0x2a0 hugetlb_reserve_pages+0x110/0x2c0 hugetlbfs_file_mmap+0x11d/0x1b0 mmap_region+0x248/0x9a0 ? hugetlb_get_unmapped_area+0x15c/0x2d0 do_mmap+0x38b/0x580 vm_mmap_pgoff+0xe6/0x190 ksys_mmap_pgoff+0x18a/0x1f0 do_syscall_64+0x3f/0x90 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 Fix the problem by adding a new mutex lock to make sure all objects are deleted sequentially in delete_object_part(). The kmemleak_lock is not suitable here because there is a memory allocation with flag GFP_KERNEL. Fixes: 53238a60dd4a ("kmemleak: Allow partial freeing of memory blocks") Signed-off-by: Liu Shixin <liushixin2@huawei.com> --- mm/kmemleak.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-)