Michal Hocko wrote: > On Sat 07-10-17 13:05:24, Tetsuo Handa wrote: > > Johannes Weiner wrote: > > > On Sat, Oct 07, 2017 at 11:21:26AM +0900, Tetsuo Handa wrote: > > > > On 2017/10/05 19:36, Tetsuo Handa wrote: > > > > > I don't want this patch backported. If you want to backport, > > > > > "s/fatal_signal_pending/tsk_is_oom_victim/" is the safer way. > > > > > > > > If you backport this patch, you will see "complete depletion of memory reserves" > > > > and "extra OOM kills due to depletion of memory reserves" using below reproducer. > > > > > > > > ---------- > > > > #include <linux/module.h> > > > > #include <linux/slab.h> > > > > #include <linux/oom.h> > > > > > > > > static char *buffer; > > > > > > > > static int __init test_init(void) > > > > { > > > > set_current_oom_origin(); > > > > buffer = vmalloc((1UL << 32) - 480 * 1048576); > > > > > > That's not a reproducer, that's a kernel module. It's not hard to > > > crash the kernel from within the kernel. > > > > > > > When did we agree that "reproducer" is "userspace program" ? > > A "reproducer" is a program that triggers something intended. > > This way of argumentation is just ridiculous. I can construct whatever > code to put kernel on knees and there is no way around it. But you don't distinguish between kernel module and userspace program. What you distinguish is "real" and "theoretical". And, more you reject with "ridiculous"/"theoretical", more I resist stronger. > > The patch in question was supposed to mitigate a theoretical problem > while it caused a real issue seen out there. That is a reason to > revert the patch. Especially when a better mitigation has been put > in place. You are right that replacing fatal_signal_pending by > tsk_is_oom_victim would keep the original mitigation in pre-cd04ae1e2dc8 > kernels but I would only agree to do that if the mitigated problem was > real. And this doesn't seem to be the case. If any of the stable kernels > regresses due to the revert I am willing to put a mitigation in place. The real issue here is that caller of vmalloc() was not ready to handle allocation failure. We addressed kmem_zalloc_greedy() case ( https://marc.info/?l=linux-mm&m=148844910724880 ) by 08b005f1333154ae rather than reverting fatal_signal_pending(). Removing fatal_signal_pending() in order to hide real issues is a random hack. > > > Year by year, people are spending efforts for kernel hardening. > > It is silly to say that "It's not hard to crash the kernel from > > within the kernel." when we can easily mitigate. > > This is true but we do not spread random hacks around for problems that > are not real and there are better ways to address them. In this > particular case cd04ae1e2dc8 was a better way to address the problem in > general without spreading tsk_is_oom_victim all over the place. Using tsk_is_oom_victim() is reasonable for vmalloc() because it is a memory allocation function which belongs to memory management subsystem. > > > Even with cd04ae1e2dc8, there is no point with triggering extra > > OOM kills by needlessly consuming memory reserves. > > Yet again you are making unfounded claims and I am really fed up > arguing discussing that any further. Kernel hardening changes are mostly addressing "theoretical" issues but we don't call them "ridiculous". -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>