From: "裘稀石(稀石)" <xishi.qiuxishi@alibaba-inc.com>
To: "裘稀石(稀石)" <xishi.qiuxishi@alibaba-inc.com>,
"Naoya Horiguchi" <n-horiguchi@ah.jp.nec.com>
Cc: linux-mm <linux-mm@kvack.org>,
linux-kernel <linux-kernel@vger.kernel.org>,
陈义全 <zy.zhengyi@alibaba-inc.com>
Subject: 回复:[RFC] a question about reuse hwpoison page in soft_offline_page()
Date: Sat, 07 Jul 2018 13:04:57 +0800 [thread overview]
Message-ID: <f1c22065-2cb0-4f83-93a9-a442e6f5594a.xishi.qiuxishi@alibaba-inc.com> (raw)
In-Reply-To: <ac6e703d-b0df-40d2-8918-63a63f3c5d68.xishi.qiuxishi@alibaba-inc.com>
[-- Attachment #1: Type: text/plain, Size: 3500 bytes --]
Hi Naoya,
1) If someone mmap the hugetlb but not alloc memory yet, so h->resv_huge_pages
increased.
2) Then soft_offline_page - soft_offline_free_page - dissolve_free_huge_page
will failed.
3) Later someone access the hugetlb file, so trigger page fault, but return no mem,
so someone has been killed.
In this case, the hwpoisoned hugetlb still in the huge free list, but it can not be alloced.
And soft offline trigger kill something later, does it handle properly?
Thanks,
Xishi Qiu> This patch add05cec
> (mm: soft-offline: don't free target page in successful page migration) removes
> set_migratetype_isolate() and unset_migratetype_isolate() in soft_offline_page
> ().
>
> And this patch 243abd5b
> (mm: hugetlb: prevent reuse of hwpoisoned free hugepages) changes
> if (!is_migrate_isolate_page(page)) to if (!PageHWPoison(page)), so it could
> prevent someone
> reuse the free hugetlb again after set the hwpoison flag
> in soft_offline_free_page()
>
> My question is that if someone reuse the free hugetlb again before
> soft_offline_free_page() and
> after get_any_page(), then it uses the hopoison page, and this may trigger mce
> kill later, right?
Hi Xishi,
Thank you for pointing out the issue. That's nice catch.
I think that the race condition itself could happen, but it doesn't lead
to MCE kill because PageHWPoison is not visible to HW which triggers MCE.
PageHWPoison flag is just a flag in struct page to report the memory error
from kernel to userspace. So even if a CPU is accessing to the page whose
struct page has PageHWPoison set, that doesn't cause a MCE unless the page
is physically broken.
The type of memory error that soft offline tries to handle is corrected
one which is not a failure yet although it's starting to wear.
So such PageHWPoison page can be reused, but that's not critical because
the page is freed at some point afterword and error containment completes.
However, I noticed that there's a small pain in free hugetlb case.
We call dissolve_free_huge_page() in soft_offline_free_page() which moves
the PageHWPoison flag from the head page to the raw error page.
If the reported race happens, dissolve_free_huge_page() just return without
doing any dissolve work because "if (PageHuge(page) && !page_count(page))"
block is skipped.
The hugepage is allocated and used as usual, but the contaiment doesn't
complete as expected in the normal page, because free_huge_pages() doesn't
call dissolve_free_huge_page() for hwpoison hugepage. This is not critical
because such error hugepage just reside in free hugepage list. But this
might looks like a kind of memory leak. And even worse when hugepage pool
is shrinked and the hwpoison hugepage is freed, the PageHWPoison flag is
still on the head page which is unlikely to be an actual error page.
So I think we need improvement here, how about the fix like below?
(not tested yet, sorry)
diff --git a/mm/memory-failure.c b/mm/memory-failure.c
--- a/mm/memory-failure.c
+++ b/mm/memory-failure.c
@@ -1883,6 +1883,11 @@ static void soft_offline_free_page(struct page *page)
struct page *head = compound_head(page);
if (!TestSetPageHWPoison(head)) {
+ if (page_count(head)) {
+ ClearPageHWPoison(head);
+ return;
+ }
+
num_poisoned_pages_inc();
if (PageHuge(head))
dissolve_free_huge_page(page);
Thanks,
Naoya Horiguchi
[-- Attachment #2: Type: text/html, Size: 7391 bytes --]
next prev parent reply other threads:[~2018-07-07 5:05 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-07-06 9:59 Re:[RFC] " 裘稀石(稀石)
2018-07-07 5:04 ` 裘稀石(稀石) [this message]
2018-07-09 0:38 ` Naoya Horiguchi
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=f1c22065-2cb0-4f83-93a9-a442e6f5594a.xishi.qiuxishi@alibaba-inc.com \
--to=xishi.qiuxishi@alibaba-inc.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=n-horiguchi@ah.jp.nec.com \
--cc=zy.zhengyi@alibaba-inc.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox