Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752329Ab3H0AMv (ORCPT ); Mon, 26 Aug 2013 20:12:51 -0400 Received: from mx1.redhat.com ([209.132.183.28]:22941 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751625Ab3H0AMu (ORCPT ); Mon, 26 Aug 2013 20:12:50 -0400 Date: Mon, 26 Aug 2013 20:12:29 -0400 From: Naoya Horiguchi To: Wanpeng Li Cc: Andrew Morton , Andi Kleen , Fengguang Wu , Tony Luck , gong.chen@linux.intel.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org Message-ID: <1377562349-97tgdeoj-mutt-n-horiguchi@ah.jp.nec.com> In-Reply-To: <20130826232604.GA12498@hacker.(null)> References: <1377506774-5377-1-git-send-email-liwanp@linux.vnet.ibm.com> <1377506774-5377-8-git-send-email-liwanp@linux.vnet.ibm.com> <1377531937-15nx3q8e-mutt-n-horiguchi@ah.jp.nec.com> <20130826232604.GA12498@hacker.(null)> Subject: Re: [PATCH v4 8/10] mm/hwpoison: fix memory failure still hold reference count after unpoison empty zero page Mime-Version: 1.0 Content-Type: text/plain; charset=iso-2022-jp Content-Transfer-Encoding: 7bit Content-Disposition: inline X-Mutt-References: <20130826232604.GA12498@hacker.(null)> X-Mutt-Fcc: ~/Maildir/sent/ User-Agent: Mutt 1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2288 Lines: 51 Hi Wanpeng, On Tue, Aug 27, 2013 at 07:26:04AM +0800, Wanpeng Li wrote: > Hi Naoya, > On Mon, Aug 26, 2013 at 11:45:37AM -0400, Naoya Horiguchi wrote: > >On Mon, Aug 26, 2013 at 04:46:12PM +0800, Wanpeng Li wrote: > >> madvise hwpoison inject will poison the read-only empty zero page if there is > >> no write access before poison. Empty zero page reference count will be increased > >> for hwpoison, subsequent poison zero page will return directly since page has > >> already been set PG_hwpoison, however, page reference count is still increased > >> by get_user_pages_fast. The unpoison process will unpoison the empty zero page > >> and decrease the reference count successfully for the fist time, however, > >> subsequent unpoison empty zero page will return directly since page has already > >> been unpoisoned and without decrease the page reference count of empty zero page. > >> This patch fix it by decrease page reference count for empty zero page which has > >> already been unpoisoned and page count > 1. > > > >I guess that fixing on the madvise side looks reasonable to me, because this > >refcount mismatch happens only when we poison with madvise(). The root cause > >is that we can get refcount multiple times on a page, even if memory_failure() > >or soft_offline_page() can do its work only once. > > > > I think this just happen in read-only before poison case against empty > zero page. OK. I agree. > Hi Andrew, > > I see you have already merged the patch, which method you prefer? > > >How about making madvise_hwpoison() put a page and return immediately > >(without calling memory_failure() or soft_offline_page()) when the page > >is already hwpoisoned? > >I hope it also helps us avoid meaningless printk flood. > > > > Btw, Naoya, how about patch 10/10, any input are welcome! ;-) No objection if you (and Andrew) decide to go with current approach. But I think that if we shift to fix this problem in madvise(), we don't need 10/10 any more. So it looks simpler to me. Thanks, Naoya Horiguchi -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/