From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 811D9C43334 for ; Wed, 15 Jun 2022 09:37:03 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 0A5EC6B0072; Wed, 15 Jun 2022 05:37:03 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 02E716B0073; Wed, 15 Jun 2022 05:37:02 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id DEB0F6B0074; Wed, 15 Jun 2022 05:37:02 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id CA7806B0072 for ; Wed, 15 Jun 2022 05:37:02 -0400 (EDT) Received: from smtpin04.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 989B2F36 for ; Wed, 15 Jun 2022 09:37:02 +0000 (UTC) X-FDA: 79579966284.04.6463DC7 Received: from mail-pj1-f54.google.com (mail-pj1-f54.google.com [209.85.216.54]) by imf06.hostedemail.com (Postfix) with ESMTP id AAD80180097 for ; Wed, 15 Jun 2022 09:37:01 +0000 (UTC) Received: by mail-pj1-f54.google.com with SMTP id k5-20020a17090a404500b001e8875e6242so1494394pjg.5 for ; Wed, 15 Jun 2022 02:37:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bytedance-com.20210112.gappssmtp.com; s=20210112; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=toOnIScwFyw6W7OXDthcOn14+v/kWcf4sWlmNX4vbyw=; b=wAiX39cIni2xV0gs+Aw3x+cqGcmhOg44meG1GgATN4rGOZMTRucugQttdsPTVLCPgd lzGVyUPuSgofxRCMzipQtvxYsU74K+kfcsgyw+JroN1p0LsIwpFR1+8h1eEkFAAzFgMn QtzlRavMa0womDUiHqAPMnCEpiIK5kCOcNoEvbpI9QLZt98sVZ0vzczrpcpgM7f1oDMl BNm/O3cjCiITG5mvpbSyJwF7l0kdkhwxFkbNxP1mPKDOlB/9wu/A86mH48bh/6L4USG2 AD6wMV04G7O2UKviV0REy+Q6Qh+UrDH8ohQYrbvYnwzYkX6v0zWLR2bIJkT5AbiY1WsW E9WQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=toOnIScwFyw6W7OXDthcOn14+v/kWcf4sWlmNX4vbyw=; b=043kzHRqhwXRJom8w/MSLWNcz4atvAclkVwI+vzku6YMexA0d0hzBV3lhzYZ13NI1A rMwKMsnI8XpM5qI9M2KWRN9GwywpnJbQA5Juh1P6ZGgmgqwXr7x2Pkq/hn+oIyb/AdZJ bfJbXOSoyNNT1E30KH/J9Wgez63/lkS6sy+UOk0bOBfbCRUBHL3sivhhWrrDYMWuA7RM nVHhPfZJ3BRhXXTwSIif5tH4cPCIAcP9VDlFQ7JdIT9iaDVwD4Zxu9XHsAPQ1YT3sZ3e wQEef15SihtwSGoaoOhv/jXOyEYbGXr4Wh+pjNUdZgFVys6F4Z4Fi6xfqRKBQlfwed+6 7haA== X-Gm-Message-State: AJIora9Hm/kytcPhicCJr9ME9qj+Cwhpfh/opnx7JwSqSwcspxRVV5F6 T8hxta12nY4Uiu7xtt+up/+FHg== X-Google-Smtp-Source: AGRyM1uDSjpYzuR/0hLrdYfbzcHDQTf58H3ocD0LXbnal15KuuFX07Jp9SuP/fNMasxYOqlgrk+/5A== X-Received: by 2002:a17:902:d5c3:b0:168:f037:98d7 with SMTP id g3-20020a170902d5c300b00168f03798d7mr6063522plh.117.1655285820263; Wed, 15 Jun 2022 02:37:00 -0700 (PDT) Received: from always-x1.bytedance.net ([61.120.150.70]) by smtp.gmail.com with ESMTPSA id jj1-20020a170903048100b00163247b64bfsm8859205plb.115.2022.06.15.02.36.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Jun 2022 02:36:59 -0700 (PDT) From: zhenwei pi To: pizhenwei@bytedance.com, naoya.horiguchi@nec.com, akpm@linux-foundation.org Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, david@redhat.com, linmiaohe@huawei.com, gregkh@linuxfoundation.org Subject: [PATCH v6 0/1] mm/memory-failure: don't allow to unpoison hw corrupted page Date: Wed, 15 Jun 2022 17:32:08 +0800 Message-Id: <20220615093209.259374-1-pizhenwei@bytedance.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1655285822; a=rsa-sha256; cv=none; b=a+a5JCQOyaHL6vS8mDsUAXv8q9mojfqMwdTYaXfhoY4w8pFSBj1S1W6KodihWhLDJ5JsPB nppCNC9p/VPZHXXtVJ+nXe/OlE46OCQAEMOwDwAvVLAx7GyhmqMwQr+472n3m+XHTuKdOO Qiwkv4IVjmWSweTXVegcDvGi/NW8sTM= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1655285822; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:references:dkim-signature; bh=toOnIScwFyw6W7OXDthcOn14+v/kWcf4sWlmNX4vbyw=; b=BmwAMzkdEctKmTXRTeNfW7u0B7X6bhr1BfcNrce0Na7b2TQ0cksUK0jBVjubqGTWh+qH0i 79UgXfJ47x4xOMuGeEUQ4C2M0u51IpxC8D9utxhcvyi5YQmf67i0Bue7riCnCycHREfWPO aZe6QCVhkIDcruqFNU35vTylWk0keXc= ARC-Authentication-Results: i=1; imf06.hostedemail.com; dkim=pass header.d=bytedance-com.20210112.gappssmtp.com header.s=20210112 header.b=wAiX39cI; dmarc=pass (policy=none) header.from=bytedance.com; spf=pass (imf06.hostedemail.com: domain of pizhenwei@bytedance.com designates 209.85.216.54 as permitted sender) smtp.mailfrom=pizhenwei@bytedance.com Authentication-Results: imf06.hostedemail.com; dkim=pass header.d=bytedance-com.20210112.gappssmtp.com header.s=20210112 header.b=wAiX39cI; dmarc=pass (policy=none) header.from=bytedance.com; spf=pass (imf06.hostedemail.com: domain of pizhenwei@bytedance.com designates 209.85.216.54 as permitted sender) smtp.mailfrom=pizhenwei@bytedance.com X-Rspam-User: X-Rspamd-Server: rspam09 X-Rspamd-Queue-Id: AAD80180097 X-Stat-Signature: msrdfph87shiju47iu5khzo76kppktbo X-HE-Tag: 1655285821-811758 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000923, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: v5 -> v6: - Suggested by Naoya, declare 'hw_memory_failure' with initial value explicitly, also add __read_mostly. Thanks to Naoya&David! Leave 'Cc stable' or not to Andrew to decide. v4 -> v5: - Add mf_flags 'MF_SW_SIMULATED' to distinguish SW/HW memory failure, and use a global variable to record HW memory failure, once HW memory failure happens, disable unpoison. v3 -> v4: - Add debug entry "hwpoisoned-pages" to show the number of hwpoisoned pages. - Disable unpoison when a read HW memory failure occurs. v2 -> v3: - David pointed out that virt_to_kpte() is broken(no pmd_large() test on a PMD), so drop this API in this patch, walk kmap instead. v1 -> v2: - this change gets protected by mf_mutex - use -EOPNOTSUPP instead of -EPERM v1: - check KPTE to avoid to unpoison hardware corrupted page zhenwei pi (1): mm/memory-failure: disable unpoison once hw error happens Documentation/vm/hwpoison.rst | 3 ++- drivers/base/memory.c | 2 +- include/linux/mm.h | 1 + mm/hwpoison-inject.c | 2 +- mm/madvise.c | 2 +- mm/memory-failure.c | 12 ++++++++++++ 6 files changed, 18 insertions(+), 4 deletions(-) -- 2.20.1