From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 624A6C433FE for ; Fri, 28 Jan 2022 19:29:36 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 5A8316B00FC; Fri, 28 Jan 2022 14:29:35 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 5572B6B00FE; Fri, 28 Jan 2022 14:29:35 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 4463A6B0100; Fri, 28 Jan 2022 14:29:35 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0165.hostedemail.com [216.40.44.165]) by kanga.kvack.org (Postfix) with ESMTP id 34DBC6B00FC for ; Fri, 28 Jan 2022 14:29:35 -0500 (EST) Received: from smtpin18.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id D965D97316 for ; Fri, 28 Jan 2022 19:29:34 +0000 (UTC) X-FDA: 79080685068.18.C05E62C Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by imf08.hostedemail.com (Postfix) with ESMTP id 5670316005D for ; Fri, 28 Jan 2022 19:29:33 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 7FED2B825E4; Fri, 28 Jan 2022 19:29:32 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E8977C340E7; Fri, 28 Jan 2022 19:29:29 +0000 (UTC) Date: Fri, 28 Jan 2022 19:29:26 +0000 From: Catalin Marinas To: Lang Yu Cc: linux-mm@kvack.org, David Hildenbrand , Oscar Salvador , linux-kernel@vger.kernel.org, Andrew Morton Subject: Re: [PATCH v2] mm/kmemleak: Avoid scanning potential huge holes Message-ID: References: <20211108140029.721144-1-lang.yu@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20211108140029.721144-1-lang.yu@amd.com> X-Rspamd-Server: rspam03 X-Rspamd-Queue-Id: 5670316005D X-Stat-Signature: a4xkh9eaxqdsie4sisdzocddfip7p44k Authentication-Results: imf08.hostedemail.com; dkim=none; spf=pass (imf08.hostedemail.com: domain of cmarinas@kernel.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=cmarinas@kernel.org; dmarc=fail reason="SPF not aligned (relaxed), No valid DKIM" header.from=arm.com (policy=none) X-Rspam-User: nil X-HE-Tag: 1643398173-577018 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000068, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Mon, Nov 08, 2021 at 10:00:29PM +0800, Lang Yu wrote: > When using devm_request_free_mem_region() and devm_memremap_pages() > to add ZONE_DEVICE memory, if requested free mem region's end pfn > were huge(e.g., 0x400000000), the node_end_pfn() will be also huge > (see move_pfn_range_to_zone()). Thus it creates a huge hole between > node_start_pfn() and node_end_pfn(). > > We found on some AMD APUs, amdkfd requested such a free mem region > and created a huge hole. In such a case, following code snippet was > just doing busy test_bit() looping on the huge hole. > > for (pfn = start_pfn; pfn < end_pfn; pfn++) { > struct page *page = pfn_to_online_page(pfn); > if (!page) > continue; > ... > } > > So we got a soft lockup: > > watchdog: BUG: soft lockup - CPU#6 stuck for 26s! [bash:1221] > CPU: 6 PID: 1221 Comm: bash Not tainted 5.15.0-custom #1 > RIP: 0010:pfn_to_online_page+0x5/0xd0 > Call Trace: > ? kmemleak_scan+0x16a/0x440 > kmemleak_write+0x306/0x3a0 > ? common_file_perm+0x72/0x170 > full_proxy_write+0x5c/0x90 > vfs_write+0xb9/0x260 > ksys_write+0x67/0xe0 > __x64_sys_write+0x1a/0x20 > do_syscall_64+0x3b/0xc0 > entry_SYSCALL_64_after_hwframe+0x44/0xae > > I did some tests with the patch. > > (1) amdgpu module unloaded > > before the patch: > > real 0m0.976s > user 0m0.000s > sys 0m0.968s > > after the patch: > > real 0m0.981s > user 0m0.000s > sys 0m0.973s > > (2) amdgpu module loaded > > before the patch: > > real 0m35.365s > user 0m0.000s > sys 0m35.354s > > after the patch: > > real 0m1.049s > user 0m0.000s > sys 0m1.042s > > v2: > - Only scan pages belonging to the zone.(David Hildenbrand) > - Use __maybe_unused to make compilers happy. > > Signed-off-by: Lang Yu Acked-by: Catalin Marinas