[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <292d1141-4edf-ee60-a145-4ca06600076a@huawei.com>
Date: Fri, 23 Aug 2024 15:40:29 +0800
From: Miaohe Lin <linmiaohe@...wei.com>
To: Hao Ge <hao.ge@...ux.dev>, Suren Baghdasaryan <surenb@...gle.com>
CC: <kent.overstreet@...ux.dev>, <linux-mm@...ck.org>,
<linux-kernel@...r.kernel.org>, Hao Ge <gehao@...inos.cn>,
<stable@...r.kernel.org>, <nao.horiguchi@...il.com>,
<akpm@...ux-foundation.org>, <pasha.tatashin@...een.com>, <david@...hat.com>
Subject: Re: [PATCH] codetag: debug: mark codetags for pages which
transitioned from being poison to unpoison as empty
On 2024/8/23 11:37, Hao Ge wrote:
> Hi Suren and Miaohe
>
>
> On 8/23/24 09:47, Hao Ge wrote:
>> Hi Suren and Miaohe
>>
>>
>> Thank you all for taking the time to discuss this issue.
>>
>>
>> On 8/23/24 06:50, Suren Baghdasaryan wrote:
>>> On Thu, Aug 22, 2024 at 2:46 AM Hao Ge <hao.ge@...ux.dev> wrote:
>>>> Hi Miaohe
>>>>
>>>>
>>>> Thank you for taking the time to review this patch.
>>>>
>>>>
>>>> On 8/22/24 16:04, Miaohe Lin wrote:
>>>>> On 2024/8/22 10:58, Hao Ge wrote:
>>>>>> From: Hao Ge <gehao@...inos.cn>
>>>>>>
>>>>> Thanks for your patch.
>>>>>
>>>>>> The PG_hwpoison page will be caught and isolated on the entrance to
>>>>>> the free buddy page pool. so,when we clear this flag and return it
>>>>>> to the buddy system,mark codetags for pages as empty.
>>>>>>
>>>>> Is below scene cause the problem?
>>>>>
>>>>> 1. Pages are allocated. pgalloc_tag_add() will be called when prep_new_page().
>>>>>
>>>>> 2. Pages are hwpoisoned. memory_failure() will set PG_hwpoison flag and pgalloc_tag_sub()
>>>>> will be called when pages are caught and isolated on the entrance to buddy.
>>> Hi Folks,
>>> Thanks for reporting this! Could you please describe in more details
>>> how memory_failure() ends up calling pgalloc_tag_sub()? It's not
>>> obvious to me which path leads to pgalloc_tag_sub(), so I must be
>>> missing something.
>>
>>
>> OK,Let me describe the scenario I encountered.
>>
>> In the Link [1] I mentioned,here is the logic behind it:
>>
>> It performed the following operations:
>>
>> madvise(ptrs[num_alloc], pagesize, MADV_SOFT_OFFLINE)
>>
>> and then the kernel's call stack looks like this:
>>
>> do_madvise
>>
>> soft_offline_page
>>
>> page_handle_poison
>>
>> __folio_put
>>
>> free_unref_page
>>
>
> I just reviewed it and I think I missed a stack.
>
> Actually, it's like this
>
> do_madvise
>
> soft_offline_page
>
> soft_offline_in_use_page
>
> page_handle_poison
>
> __folio_put
>
> free_unref_page
>
>
> And I've come up with a minimal solution. If everyone agrees, I'll send the patch.look this
>
> https://elixir.bootlin.com/linux/v6.11-rc4/source/mm/page_alloc.c#L1056
>
> Let's directly call clear_page_tag_ref after pgalloc_tag_sub.
I tend to agree with you. It should be a good practice to call clear_page_tag_ref()
whenever page_tag finished its work. Do you think below code is also needed?
diff --git a/mm/page_alloc.c b/mm/page_alloc.c
index de54c3567539..707710f03cf5 100644
--- a/mm/page_alloc.c
+++ b/mm/page_alloc.c
@@ -1104,6 +1104,7 @@ __always_inline bool free_pages_prepare(struct page *page,
reset_page_owner(page, order);
page_table_check_free(page, order);
pgalloc_tag_sub(page, 1 << order);
+ clear_page_tag_ref(page);
if (!PageHighMem(page)) {
debug_check_no_locks_freed(page_address(page),
Thanks.
.
Powered by blists - more mailing lists