From: kirill.shutemov@linux.intel.com
To: Jiaqi Yan <jiaqiyan@google.com>
Cc: kirill@shutemov.name, shy828301@gmail.com,
tongtiangen@huawei.com, tony.luck@intel.com,
akpm@linux-foundation.org, wangkefeng.wang@huawei.com,
naoya.horiguchi@nec.com, linmiaohe@huawei.com,
linux-mm@kvack.org, osalvador@suse.de
Subject: Re: [PATCH v9 1/2] mm/khugepaged: recover from poisoned anonymous memory
Date: Tue, 24 Jan 2023 03:33:49 +0300 [thread overview]
Message-ID: <20230124003349.m64heg7mnqw7snyh@box.shutemov.name> (raw)
In-Reply-To: <CACw3F51H08xhNyUH5ecCmyNk2+Xv0NBZWszzFFnOAUtrF48UNA@mail.gmail.com>
On Fri, Jan 20, 2023 at 07:56:15AM -0800, Jiaqi Yan wrote:
> On Thu, Jan 19, 2023 at 7:03 AM <kirill.shutemov@linux.intel.com> wrote:
> >
> > On Mon, Dec 05, 2022 at 03:40:58PM -0800, Jiaqi Yan wrote:
> > > Make __collapse_huge_page_copy return whether copying anonymous pages
> > > succeeded, and make collapse_huge_page handle the return status.
> > >
> > > Break existing PTE scan loop into two for-loops. The first loop copies
> > > source pages into target huge page, and can fail gracefully when running
> > > into memory errors in source pages. If copying all pages succeeds, the
> > > second loop releases and clears up these normal pages. Otherwise, the
> > > second loop rolls back the page table and page states by:
> > > - re-establishing the original PTEs-to-PMD connection.
> > > - releasing source pages back to their LRU list.
> > >
> > > Tested manually:
> > > 0. Enable khugepaged on system under test.
> > > 1. Start a two-thread application. Each thread allocates a chunk of
> > > non-huge anonymous memory buffer.
> > > 2. Pick 4 random buffer locations (2 in each thread) and inject
> > > uncorrectable memory errors at corresponding physical addresses.
> > > 3. Signal both threads to make their memory buffer collapsible, i.e.
> > > calling madvise(MADV_HUGEPAGE).
> > > 4. Wait and check kernel log: khugepaged is able to recover from poisoned
> > > pages and skips collapsing them.
> > > 5. Signal both threads to inspect their buffer contents and make sure no
> > > data corruption.
> > >
> > > Signed-off-by: Jiaqi Yan <jiaqiyan@google.com>
> > > ---
> > > include/trace/events/huge_memory.h | 3 +-
> > > mm/khugepaged.c | 179 ++++++++++++++++++++++-------
> > > 2 files changed, 139 insertions(+), 43 deletions(-)
> > >
> > > diff --git a/include/trace/events/huge_memory.h b/include/trace/events/huge_memory.h
> > > index 35d759d3b0104..5743ae970af31 100644
> > > --- a/include/trace/events/huge_memory.h
> > > +++ b/include/trace/events/huge_memory.h
> > > @@ -36,7 +36,8 @@
> > > EM( SCAN_ALLOC_HUGE_PAGE_FAIL, "alloc_huge_page_failed") \
> > > EM( SCAN_CGROUP_CHARGE_FAIL, "ccgroup_charge_failed") \
> > > EM( SCAN_TRUNCATED, "truncated") \
> > > - EMe(SCAN_PAGE_HAS_PRIVATE, "page_has_private") \
> > > + EM( SCAN_PAGE_HAS_PRIVATE, "page_has_private") \
> > > + EMe(SCAN_COPY_MC, "copy_poisoned_page") \
> > >
> > > #undef EM
> > > #undef EMe
> > > diff --git a/mm/khugepaged.c b/mm/khugepaged.c
> > > index 5a7d2d5093f9c..0f1b9e05e17ec 100644
> > > --- a/mm/khugepaged.c
> > > +++ b/mm/khugepaged.c
> > > @@ -19,6 +19,7 @@
> > > #include <linux/page_table_check.h>
> > > #include <linux/swapops.h>
> > > #include <linux/shmem_fs.h>
> > > +#include <linux/kmsan.h>
> > >
> > > #include <asm/tlb.h>
> > > #include <asm/pgalloc.h>
> > > @@ -55,6 +56,7 @@ enum scan_result {
> > > SCAN_CGROUP_CHARGE_FAIL,
> > > SCAN_TRUNCATED,
> > > SCAN_PAGE_HAS_PRIVATE,
> > > + SCAN_COPY_MC,
> > > };
> > >
> > > #define CREATE_TRACE_POINTS
> > > @@ -530,6 +532,27 @@ static bool is_refcount_suitable(struct page *page)
> > > return page_count(page) == expected_refcount;
> > > }
> > >
> > > +/*
> > > + * Copies memory with #MC in source page (@from) handled. Returns number
> > > + * of bytes not copied if there was an exception; otherwise 0 for success.
> > > + * Note handling #MC requires arch opt-in.
> > > + */
> > > +static int copy_mc_page(struct page *to, struct page *from)
> > > +{
> > > + char *vfrom, *vto;
> > > + unsigned long ret;
> > > +
> > > + vfrom = kmap_local_page(from);
> > > + vto = kmap_local_page(to);
> > > + ret = copy_mc_to_kernel(vto, vfrom, PAGE_SIZE);
> > > + if (ret == 0)
> > > + kmsan_copy_page_meta(to, from);
> > > + kunmap_local(vto);
> > > + kunmap_local(vfrom);
> > > +
> > > + return ret;
> > > +}
> >
> >
> > It is very similar to copy_mc_user_highpage(), but uses
> > kmsan_copy_page_meta() instead of kmsan_unpoison_memory().
> >
> > Could you explain the difference? I don't quite get it.
>
> copy_mc_page is actually the MC version of copy_highpage, which uses
> kmsan_copy_page_meta instead of kmsan_unpoison_memory.
>
> My understanding is kmsan_copy_page_meta covers kmsan_unpoison_memory.
> When there is no metadata (kmsan_shadow or kmsan_origin), both
> kmsan_copy_page_meta and kmsan_unpoison_memory just do
> kmsan_internal_unpoison_memory to mark the memory range as
> initialized; when there is metadata in src page, kmsan_copy_page_meta
> will copy whatever metadata in src to dst. So I think
> kmsan_copy_page_meta is the right thing to do.
Should we fix copy_mc_user_highpage() then?
> > Indentation levels get out of control. Maybe some code restructuring is
> > required?
>
> v10 will change to something like this to reduce 1 level of indentation:
>
> if (pte_none(pteval) || is_zero_pfn(pte_pfn(pteval)))
> continue;
> src_page = pte_page(pteval);
> if (!PageCompound(src_page))
> release_pte_page(src_page);
I hoped for deeper rework. Maybe split the function into several functions
and make overall structure more readable?
--
Kiryl Shutsemau / Kirill A. Shutemov
next prev parent reply other threads:[~2023-01-24 0:34 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-12-05 23:40 [PATCH v9 0/2] Memory poison recovery in khugepaged collapsing Jiaqi Yan
2022-12-05 23:40 ` [PATCH v9 1/2] mm/khugepaged: recover from poisoned anonymous memory Jiaqi Yan
2023-01-19 15:02 ` kirill.shutemov
2023-01-20 15:56 ` Jiaqi Yan
2023-01-24 0:33 ` kirill.shutemov [this message]
2023-02-01 5:16 ` Jiaqi Yan
2023-02-02 0:01 ` kirill.shutemov
2023-02-02 0:30 ` kirill
2023-02-07 18:19 ` Jiaqi Yan
2023-02-08 11:44 ` Alexander Potapenko
2023-02-08 23:00 ` Jiaqi Yan
2023-02-17 19:49 ` Jiaqi Yan
2023-02-28 13:40 ` kirill
2023-03-03 17:15 ` Jiaqi Yan
2022-12-05 23:40 ` [PATCH v9 2/2] mm/khugepaged: recover from poisoned file-backed memory Jiaqi Yan
2023-01-19 15:10 ` kirill.shutemov
2023-01-19 21:24 ` Jiaqi Yan
2023-01-18 23:29 ` [PATCH v9 0/2] Memory poison recovery in khugepaged collapsing Andrew Morton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230124003349.m64heg7mnqw7snyh@box.shutemov.name \
--to=kirill.shutemov@linux.intel.com \
--cc=akpm@linux-foundation.org \
--cc=jiaqiyan@google.com \
--cc=kirill@shutemov.name \
--cc=linmiaohe@huawei.com \
--cc=linux-mm@kvack.org \
--cc=naoya.horiguchi@nec.com \
--cc=osalvador@suse.de \
--cc=shy828301@gmail.com \
--cc=tongtiangen@huawei.com \
--cc=tony.luck@intel.com \
--cc=wangkefeng.wang@huawei.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox