Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2175894ybl; Sat, 25 Jan 2020 18:49:43 -0800 (PST) X-Google-Smtp-Source: APXvYqxgQnuxXvE8VDxhreFLvj41P+wbPSoKXVKUHxiWdul/QHH4kyYoIVPL/PIDRzD/BbQ826tt X-Received: by 2002:a05:6808:53:: with SMTP id v19mr3673779oic.169.1580006983600; Sat, 25 Jan 2020 18:49:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580006983; cv=none; d=google.com; s=arc-20160816; b=lq4lUXP82Tb60a1x3iaEDsEjPNbI5muNs3XD0kQArp8d7ad34zF0KRAhSx49kOcmn8 wiKHZqP4pNJTaVqx39bjaubJZ/uf8cdUpEiJ1PFRRCNQ7C+VH5VWqyiBcces2UflyYBA 7zUO/vRVz6yqApwd4u4p+VhL25blW8FUR6vHwKUZQsogYxjoOb2lOoS2UrrHaMxgzffU 7chhyykurx/OrIp4VnH861veJDY7k6E6XpDgURXQ1YO2xCAKRDA8cTBUujEJ5s7dnGkU FhrnsvTxpXOqeISc+JeC1cgj1+T8m1QVh50b3z1lOg4ct4XTD7uHab1eJAmGqZh+cksJ n6JA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date; bh=5tbjsVoTkurq5VEc/lvlD5ShQurkYdPfk0v3n+DX3A4=; b=owuMreAhIybbDmnHhjAeKMUZqkse3decUJHCzj3eZIkkPNv4EiK7g90TErQCRNLBqQ 62iBXkGDX7ZIDM404p6rfc30B7bb7aoCXMivdL4kuWyKqJUnokTi53iVObv+OrCIHMki KvxC+15sQexR6biSrGG99VIoouEisJD79NHdXXoRaX5H5OYKSepeiN45ROhf07+/Ye2d cQm0mMQiXvGgcdfBX24LNJHIf6c1TbOxnl8wwbzxQRwp8JbP0Qh0Lj5dktGzKeHGtQn/ d2KLH+kdrLsA+PIs3doT8LfZ/L5MIoEWqu1UcYgtz78RKEAxZdIme9FjO2M8dHw4Wysi Spog== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t2si4879027otq.196.2020.01.25.18.48.59; Sat, 25 Jan 2020 18:49:43 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729052AbgAZCoq (ORCPT + 99 others); Sat, 25 Jan 2020 21:44:46 -0500 Received: from mga07.intel.com ([134.134.136.100]:39089 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728842AbgAZCop (ORCPT ); Sat, 25 Jan 2020 21:44:45 -0500 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 25 Jan 2020 18:44:19 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.70,364,1574150400"; d="scan'208";a="222946679" Received: from richard.sh.intel.com (HELO localhost) ([10.239.159.54]) by fmsmga008.fm.intel.com with ESMTP; 25 Jan 2020 18:44:17 -0800 Date: Sun, 26 Jan 2020 10:44:29 +0800 From: Wei Yang To: Anshuman Khandual Cc: Wei Yang , akpm@linux-foundation.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, rientjes@google.com Subject: Re: [Patch v2 1/4] mm: enable dump several reasons for __dump_page() Message-ID: <20200126024429.GA24582@richard> Reply-To: Wei Yang References: <20200120030415.15925-1-richardw.yang@linux.intel.com> <20200120030415.15925-2-richardw.yang@linux.intel.com> <8426f31b-606e-deca-acbe-dd59b193e113@arm.com> <20200120085530.GB18028@richard> <1c2e1cd6-5b65-79d7-f332-b866d5446c71@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1c2e1cd6-5b65-79d7-f332-b866d5446c71@arm.com> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jan 21, 2020 at 10:50:41AM +0530, Anshuman Khandual wrote: > > >On 01/20/2020 02:25 PM, Wei Yang wrote: >> On Mon, Jan 20, 2020 at 11:42:30AM +0530, Anshuman Khandual wrote: >>> >>> >>> On 01/20/2020 08:34 AM, Wei Yang wrote: >>>> This is a preparation to dump all reasons during check page. >>> >>> This really makes sense rather then just picking the reason from >>> the last "if" statement. >>> >>>> >>>> Signed-off-by: Wei Yang >>>> --- >>>> include/linux/mmdebug.h | 2 +- >>>> mm/debug.c | 11 ++++++----- >>>> mm/page_alloc.c | 2 +- >>>> 3 files changed, 8 insertions(+), 7 deletions(-) >>>> >>>> diff --git a/include/linux/mmdebug.h b/include/linux/mmdebug.h >>>> index 2ad72d2c8cc5..f0a612db8bae 100644 >>>> --- a/include/linux/mmdebug.h >>>> +++ b/include/linux/mmdebug.h >>>> @@ -10,7 +10,7 @@ struct vm_area_struct; >>>> struct mm_struct; >>>> >>>> extern void dump_page(struct page *page, const char *reason); >>>> -extern void __dump_page(struct page *page, const char *reason); >>>> +extern void __dump_page(struct page *page, int num, const char **reason); >>>> void dump_vma(const struct vm_area_struct *vma); >>>> void dump_mm(const struct mm_struct *mm); >>>> >>>> diff --git a/mm/debug.c b/mm/debug.c >>>> index 0461df1207cb..a8ac6f951f9f 100644 >>>> --- a/mm/debug.c >>>> +++ b/mm/debug.c >>>> @@ -42,11 +42,11 @@ const struct trace_print_flags vmaflag_names[] = { >>>> {0, NULL} >>>> }; >>>> >>>> -void __dump_page(struct page *page, const char *reason) >>>> +void __dump_page(struct page *page, int num, const char **reason) >>>> { >>>> struct address_space *mapping; >>>> bool page_poisoned = PagePoisoned(page); >>>> - int mapcount; >>>> + int mapcount, i; >>>> >>>> /* >>>> * If struct page is poisoned don't access Page*() functions as that >>>> @@ -97,8 +97,9 @@ void __dump_page(struct page *page, const char *reason) >>>> sizeof(unsigned long), page, >>>> sizeof(struct page), false); >>>> >>>> - if (reason) >>>> - pr_warn("page dumped because: %s\n", reason); >>>> + pr_warn("page dumped because:\n"); >>>> + for (i = 0; i < num; i++) >>>> + pr_warn("\t%s\n", reason[i]); >>> >>> We should have a NR_BAD_PAGE_REASONS or something to cap this iteration >>> and also check reason[i] for non-NULL before trying to print the array. >>> There might be call sites like the following which will be problematic >>> otherwise. >>> >>> split_huge_page_to_list() -> dump_page(head, NULL) >>> >> >> You are right, I missed this case. >> >>>> >>>> #ifdef CONFIG_MEMCG >>>> if (!page_poisoned && page->mem_cgroup) >>> >>> While here, will it be better to move the above debug print block after >>> mem_cgroup block instead ? >>> >> >> Not sure, let's see whether others have some idea. >> >>>> @@ -108,7 +109,7 @@ void __dump_page(struct page *page, const char *reason) >>>> >>>> void dump_page(struct page *page, const char *reason) >>>> { >>>> - __dump_page(page, reason); >>>> + __dump_page(page, 1, &reason); >>>> dump_page_owner(page); >>>> } >>>> EXPORT_SYMBOL(dump_page); >>>> diff --git a/mm/page_alloc.c b/mm/page_alloc.c >>>> index d047bf7d8fd4..0cf6218aaba7 100644 >>>> --- a/mm/page_alloc.c >>>> +++ b/mm/page_alloc.c >>>> @@ -638,7 +638,7 @@ static void bad_page(struct page *page, const char *reason, >>>> >>>> pr_alert("BUG: Bad page state in process %s pfn:%05lx\n", >>>> current->comm, page_to_pfn(page)); >>>> - __dump_page(page, reason); >>>> + __dump_page(page, 1, &reason); >>>> bad_flags &= page->flags; >>>> if (bad_flags) >>>> pr_alert("bad because of flags: %#lx(%pGp)\n", >>>> >>> >>> Do we still need to have bad_flags ? After consolidating all reasons making >>> a page bad should not we just print page->flags unconditionally each time and >>> let the user decipher it instead. __dump_page() will print page->flags for >>> each case (atleast after the new patch from Vlastimil). AFAICS, the only >>> place currently consuming bad_flags is bad_page() which seems redundant after >>> first calling __dump_page(). >> >> Hmm... I don't catch this. The work in __dump_page() seems a little different >> from this one. Not sure we could remove it. > >Lets look at 'bad_flags' as it exists today without this series. > >It gets evaluated in free_pages_check_bad() and check_new_page_bad() before >being passed into bad_page(). All other call sites for bad_page() just pass >0 for 'bad_flags'. Now in bad_page(), we have > > __dump_page(page, reason); > bad_flags &= page->flags; > if (bad_flags) > pr_alert("bad because of flags: %#lx(%pGp)\n", > bad_flags, &bad_flags); > >Here, bad_flags &= page->flags will always be positive when 'reason' >is either > >"PAGE_FLAGS_CHECK_AT_FREE flag(s) set" > >or > >"PAGE_FLAGS_CHECK_AT_PREP flag set" > >The point here is we dont need to print bad_flags here as __dump_page() >already prints page->flags universally along with the "bad_reason" >after the following change. > >[1] https://patchwork.kernel.org/patch/11332035/ Hi, Anshuman I am preparing a patch to remove the bad_flags. While since the above change is not merged upstream yet, how can I wording the change log to point this change? Or I should wait till this one is merged? -- Wei Yang Help you, Help me