From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3A3A6C433ED for ; Wed, 14 Apr 2021 10:33:03 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id BACDB6121E for ; Wed, 14 Apr 2021 10:33:02 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org BACDB6121E Authentication-Results: mail.kernel.org; dmarc=fail (p=quarantine dis=none) header.from=suse.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 308D86B0074; Wed, 14 Apr 2021 06:33:02 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 2B8C96B0078; Wed, 14 Apr 2021 06:33:02 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 15A238D0003; Wed, 14 Apr 2021 06:33:02 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0151.hostedemail.com [216.40.44.151]) by kanga.kvack.org (Postfix) with ESMTP id E9A9E6B0074 for ; Wed, 14 Apr 2021 06:33:01 -0400 (EDT) Received: from smtpin29.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id A1A765770FB9 for ; Wed, 14 Apr 2021 10:33:01 +0000 (UTC) X-FDA: 78030609762.29.5A6F873 Received: from mx2.suse.de (mx2.suse.de [195.135.220.15]) by imf06.hostedemail.com (Postfix) with ESMTP id 09B5FC0007DD for ; Wed, 14 Apr 2021 10:33:02 +0000 (UTC) X-Virus-Scanned: by amavisd-new at test-mx.suse.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1618396379; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=4f9XVi08AUnEb2K13TH7oU76g65kV0XAZJ7MmHU+byU=; b=XJoXRkrBRwgetqxmgVhqJJnDosEI+hw98nimjUD/azguCxCfnAsanFB0n1WnfBjldlCycy 8LL0mCJn39fjzqkr5pgIkTIFdSR3j0magWQP+mu76o6BvXE0ucE7oI73WU2fWznLqbv2N3 4HqLfTjic1B2W+lEIlipjfUaMtz4Gus= Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id CDF50AF31; Wed, 14 Apr 2021 10:32:59 +0000 (UTC) Date: Wed, 14 Apr 2021 12:32:58 +0200 From: Michal Hocko To: Oscar Salvador Cc: Mike Kravetz , Andrew Morton , Vlastimil Babka , David Hildenbrand , Muchun Song , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v7 3/7] mm,hugetlb: Clear HPageFreed outside of the lock Message-ID: References: <20210413104747.12177-1-osalvador@suse.de> <20210413104747.12177-4-osalvador@suse.de> <20210414074132.GB20401@linux> <20210414100147.GD20886@linux> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210414100147.GD20886@linux> X-Rspamd-Queue-Id: 09B5FC0007DD X-Stat-Signature: 7cba5idbjp1pp1rtzz9iajmtfi6u6zrj X-Rspamd-Server: rspam02 Received-SPF: none (suse.com>: No applicable sender policy available) receiver=imf06; identity=mailfrom; envelope-from=""; helo=mx2.suse.de; client-ip=195.135.220.15 X-HE-DKIM-Result: pass/pass X-HE-Tag: 1618396382-20991 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Wed 14-04-21 12:01:47, Oscar Salvador wrote: > On Wed, Apr 14, 2021 at 10:28:33AM +0200, Michal Hocko wrote: > > You are right it doesn't do it there. But all struct pages, even those > > that are allocated by the bootmem allocator should initialize its struct > > pages. They would be poisoned otherwise, right? I would have to look at > > the exact code path but IIRC this should be around the time bootmem > > allocator state transitions to the page allocator. > > Ok, you are right. > struct pages are initialized a bit earlier through: > > start_kernel > setup_arch > paging_init > zone_sizes_init > free_area_init > free_area_init_node > free_area_init_core > memmap_init_zone > memmap_init_range > __init_single_page > > While the allocation of bootmem hugetlb happens > > start_kernel > parse_args > ... > hugepages_setup > ... > hugetlb_hstate_alloc_pages > __alloc_bootmem_huge_page > > which is after the setup_arch() call. Thanks for pulling those paths. It is always painful to crawl that code. > So by the time we get the page from __alloc_bootmem_huge_page(), fields are > zeroed. > I thought we might get in trouble because memblock_alloc_try_nid_raw() calls > page_init_poison() which poisons the chunk with 0xff,e.g: > > [ 1.955471] boot: ffffffffffffffff ffffffffffffffff ffffffffffffffff ffffffffffffffff > [ 1.955476] boot: ffffffffffffffff ffffffffffffffff ffffffffffffffff ffffffffffffffff > > but it seems that does not the memmap struct page. Well, to be precise it does the very same thing with memamp struct pages but that is before the initialization code you have pointed out above. In this context it just poisons the allocated content which is the GB page storage. > I checked, and when we get there in __alloc_bootmem_huge_page, page->private is > still zeroed, so I guess it should be safe to assume that we do not really need > to clear the flag in __prep_new_huge_page() routine? It would be quite nasty if the struct pages content would be undefined. Maybe that is possible but then I would rather stick the initialization into __alloc_bootmem_huge_page. Thanks! -- Michal Hocko SUSE Labs