From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0CC8FC61DB3 for ; Fri, 6 Jan 2023 22:22:49 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id A44728E0003; Fri, 6 Jan 2023 17:22:48 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 9F5598E0001; Fri, 6 Jan 2023 17:22:48 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 8BD228E0003; Fri, 6 Jan 2023 17:22:48 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 7EA528E0001 for ; Fri, 6 Jan 2023 17:22:48 -0500 (EST) Received: from smtpin23.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id 4BFB4160402 for ; Fri, 6 Jan 2023 22:22:48 +0000 (UTC) X-FDA: 80325800016.23.3948C93 Received: from a27-189.smtp-out.us-west-2.amazonses.com (a27-189.smtp-out.us-west-2.amazonses.com [54.240.27.189]) by imf14.hostedemail.com (Postfix) with ESMTP id A963210000B for ; Fri, 6 Jan 2023 22:22:46 +0000 (UTC) Authentication-Results: imf14.hostedemail.com; dkim=pass header.d=aaront.org header.s=ude52klaz7ukvnrchdbsicqdl2lnui6h header.b=OYQCLSIc; dkim=pass header.d=amazonses.com header.s=gdwg2y3kokkkj5a55z2ilkup5wp5hhxx header.b=ASqI4DHB; spf=pass (imf14.hostedemail.com: domain of 01010185892de53e-e379acfb-7044-4b24-b30a-e2657c1ba989-000000@ses-us-west-2.bounces.aaront.org designates 54.240.27.189 as permitted sender) smtp.mailfrom=01010185892de53e-e379acfb-7044-4b24-b30a-e2657c1ba989-000000@ses-us-west-2.bounces.aaront.org; dmarc=pass (policy=quarantine) header.from=aaront.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1673043766; a=rsa-sha256; cv=none; b=UfCP7ep4czkRU6xof/bkDyxN0UsWeq8F8b0ZT91dqtrbgf1sDATJxc6I0ze+h7oHA3TgQh /Pr+fHvaIiYZ2+CVwqfASpRt9++S9TKiFY5RF6tj+Kl3AEeJxBgPkUKhyxqnX2v9+EnNNn 0ex+L4h/EiXM5gZPpLNcABi6YYAFiZI= ARC-Authentication-Results: i=1; imf14.hostedemail.com; dkim=pass header.d=aaront.org header.s=ude52klaz7ukvnrchdbsicqdl2lnui6h header.b=OYQCLSIc; dkim=pass header.d=amazonses.com header.s=gdwg2y3kokkkj5a55z2ilkup5wp5hhxx header.b=ASqI4DHB; spf=pass (imf14.hostedemail.com: domain of 01010185892de53e-e379acfb-7044-4b24-b30a-e2657c1ba989-000000@ses-us-west-2.bounces.aaront.org designates 54.240.27.189 as permitted sender) smtp.mailfrom=01010185892de53e-e379acfb-7044-4b24-b30a-e2657c1ba989-000000@ses-us-west-2.bounces.aaront.org; dmarc=pass (policy=quarantine) header.from=aaront.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1673043766; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=Uhia4t3YP+RwBA+Ks0Blx3+ryYIr65e+4gAG6zciDF8=; b=A/P02dDJ4V7fKu3LtJBTZD1g6nFqNRJlf1KGInOj/ALRx3yany0jXJlDZ89gutr/vTbJvj CCVESXl/eWDgD7EobHMage6qCAhDE0Ea7tp5psHBUSZW7YO9VXsX7DCuPVIJ+EMoxSyu0p 2B1tnaLPYNvkpc9Hu+VA+gwoMTpD2As= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=ude52klaz7ukvnrchdbsicqdl2lnui6h; d=aaront.org; t=1673043764; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References:MIME-Version:Content-Transfer-Encoding; bh=IAkFUGfi9w2afJOCyL3pooFYYZISSP9VHYGQ+Y9eV2o=; b=OYQCLSIch6DOwmPX2K8Ll7OHaE8uo0iDC49rm1Yz5s67bjhmmLXll+DnrBIPUbQF yF6MFuIP7nRN58Hj4oHw2yg8uGnKs2pETEnoRfv9mrfj7+tO9mQTTvu0nt4Uv3ENJOc wVohCO1FxB/IYTPURz8yt+ObzVM9XF2ofJ+437uA= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=gdwg2y3kokkkj5a55z2ilkup5wp5hhxx; d=amazonses.com; t=1673043764; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References:MIME-Version:Content-Transfer-Encoding:Feedback-ID; bh=IAkFUGfi9w2afJOCyL3pooFYYZISSP9VHYGQ+Y9eV2o=; b=ASqI4DHBxjBX+v7OS/nDhaunCTOVvrcIal3o7kqmS2TofWDDH2qGUpW5nv4C6rmv XjjbRxOlJG5rMtAAehcz5SVXpQeV4X9qHHQiBEyLVq89Pq4fI2z0JP1ofB92pgrN1w0 lK7AbBwXoQb+X/FlaDBhg0HRZq7FYYRyff50IwN4= From: Aaron Thompson To: Mike Rapoport , linux-mm@kvack.org Cc: "H. Peter Anvin" , Alexander Potapenko , Andrew Morton , Andy Shevchenko , Ard Biesheuvel , Borislav Petkov , Darren Hart , Dave Hansen , David Rientjes , Dmitry Vyukov , Ingo Molnar , Marco Elver , Thomas Gleixner , kasan-dev@googlegroups.com, linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org, platform-driver-x86@vger.kernel.org, x86@kernel.org, Aaron Thompson Subject: [PATCH v3 1/1] mm: Always release pages to the buddy allocator in memblock_free_late(). Date: Fri, 6 Jan 2023 22:22:44 +0000 Message-ID: <01010185892de53e-e379acfb-7044-4b24-b30a-e2657c1ba989-000000@us-west-2.amazonses.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20230106222222.1024-1-dev@aaront.org> References: <20230106222222.1024-1-dev@aaront.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Feedback-ID: 1.us-west-2.OwdjDcIoZWY+bZWuVZYzryiuW455iyNkDEZFeL97Dng=:AmazonSES X-SES-Outgoing: 2023.01.06-54.240.27.189 X-Rspam-User: X-Rspamd-Server: rspam03 X-Rspamd-Queue-Id: A963210000B X-Stat-Signature: 7q7a5q3wbkydnfo5rhrmqsnnagitjbt1 X-HE-Tag: 1673043766-637033 X-HE-Meta: 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 5sGEmSQv LT7s4RsSo7qOTpQJY1Okk5qXaNhBz3suAL99VDqSFTJMEDKrN0mpvrvdeRhjYzREOH0Ne1p3o16NZpJJZGcJgBZAsYrevb0jyVtaLwJ+hRmvmyGGeL+BKR86fnvqEaPYk82Y8Jm0Wqm4ykOfTXEbsbvM8bqmZvOCZKi+gogFwr07UF2Yf5HMgl65jauJl0B8Wc3Li/ERUBlA22qIOPf1e8UJdt2YFeC7uUsHIRFU0Bxm/pj2AJTqPYSivcbldp9Fg6fWfSgNTUhgyS4yM02HVgcz/rtDnrmTfUQunpE1FNjaNHyaVnCk4y0OaoTrRLvGGTPQO9zL2ZECXNWrmHGvQRpHx7QKDrib4sX99 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: If CONFIG_DEFERRED_STRUCT_PAGE_INIT is enabled, memblock_free_pages() only releases pages to the buddy allocator if they are not in the deferred range. This is correct for free pages (as defined by for_each_free_mem_pfn_range_in_zone()) because free pages in the deferred range will be initialized and released as part of the deferred init process. memblock_free_pages() is called by memblock_free_late(), which is used to free reserved ranges after memblock_free_all() has run. All pages in reserved ranges have been initialized at that point, and accordingly, those pages are not touched by the deferred init process. This means that currently, if the pages that memblock_free_late() intends to release are in the deferred range, they will never be released to the buddy allocator. They will forever be reserved. In addition, memblock_free_pages() calls kmsan_memblock_free_pages(), which is also correct for free pages but is not correct for reserved pages. KMSAN metadata for reserved pages is initialized by kmsan_init_shadow(), which runs shortly before memblock_free_all(). For both of these reasons, memblock_free_pages() should only be called for free pages, and memblock_free_late() should call __free_pages_core() directly instead. One case where this issue can occur in the wild is EFI boot on x86_64. The x86 EFI code reserves all EFI boot services memory ranges via memblock_reserve() and frees them later via memblock_free_late() (efi_reserve_boot_services() and efi_free_boot_services(), respectively). If any of those ranges happens to fall within the deferred init range, the pages will not be released and that memory will be unavailable. For example, on an Amazon EC2 t3.micro VM (1 GB) booting via EFI: v6.2-rc2: # grep -E 'Node|spanned|present|managed' /proc/zoneinfo Node 0, zone DMA spanned 4095 present 3999 managed 3840 Node 0, zone DMA32 spanned 246652 present 245868 managed 178867 v6.2-rc2 + patch: # grep -E 'Node|spanned|present|managed' /proc/zoneinfo Node 0, zone DMA spanned 4095 present 3999 managed 3840 Node 0, zone DMA32 spanned 246652 present 245868 managed 222816 # +43,949 pages Fixes: 3a80a7fa7989 ("mm: meminit: initialise a subset of struct pages if CONFIG_DEFERRED_STRUCT_PAGE_INIT is set") Signed-off-by: Aaron Thompson --- mm/memblock.c | 8 +++++++- tools/testing/memblock/internal.h | 4 ++++ 2 files changed, 11 insertions(+), 1 deletion(-) diff --git a/mm/memblock.c b/mm/memblock.c index 511d4783dcf1..fc3d8fbd2060 100644 --- a/mm/memblock.c +++ b/mm/memblock.c @@ -1640,7 +1640,13 @@ void __init memblock_free_late(phys_addr_t base, phys_addr_t size) end = PFN_DOWN(base + size); for (; cursor < end; cursor++) { - memblock_free_pages(pfn_to_page(cursor), cursor, 0); + /* + * Reserved pages are always initialized by the end of + * memblock_free_all() (by memmap_init() and, if deferred + * initialization is enabled, memmap_init_reserved_pages()), so + * these pages can be released directly to the buddy allocator. + */ + __free_pages_core(pfn_to_page(cursor), 0); totalram_pages_inc(); } } diff --git a/tools/testing/memblock/internal.h b/tools/testing/memblock/internal.h index fdb7f5db7308..85973e55489e 100644 --- a/tools/testing/memblock/internal.h +++ b/tools/testing/memblock/internal.h @@ -15,6 +15,10 @@ bool mirrored_kernelcore = false; struct page {}; +void __free_pages_core(struct page *page, unsigned int order) +{ +} + void memblock_free_pages(struct page *page, unsigned long pfn, unsigned int order) { -- 2.30.2