Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1185092ybh; Thu, 16 Jul 2020 05:42:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzJlVt81315JlkxcQ4stEpDyMAw2kWYamEyJD3GcUUlX7IS5etIJYvUdLPPS3GmvxWCCH9/ X-Received: by 2002:a05:6402:1d0b:: with SMTP id dg11mr4195705edb.212.1594903332619; Thu, 16 Jul 2020 05:42:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594903332; cv=none; d=google.com; s=arc-20160816; b=iAOlCKLzPZXB6uSnxvgd2AeaV0JIUQH5CjNjlpDu4kBkblu/hEp+lvpUBeibBOwJXQ Gy5Abt+qRlkUDUI8WRIGB0wMMWPpCCJn0BqZd/kCGia6vdMbRTxuBgnXmwpQ9sehJOFo 7bz+t3XgC3xhCz4iQiaosYtHsiqbg7JFPii3V1gmVoj2XYCghCB7of00XczqGi189daB FKscTLgD05vCHFfo6DW8+dX+2Wxrabk7zSDw1B/c0zHyhEOhnBEGe1URVsYhbuhqBOMc T6ObQgQhvZKw+dpFHGQup1Z1S+spxiik7I8Or/4jRpER1UtLYaD0aiy3lnOmtxerbIWR m8NQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=3M5imMkOhuCmJe5N9igyI13piX7mYBny5+CZ3SmB99w=; b=JbC/K/kBXW7A9EiHXRGGk03tB/NdQtbC03cJrDioMQlAWsurm0d+kemZXgnJtpOHb/ U4O+eABo9Jlj73YcDlgfd8TdNAqfHpqY/iZ9waxc5tG74Y8BKuazQAaNnKW/jk4SPBvO YiHoCErjmFcrVHX5vAuiKaifYEW6xzN107wheHU7mglF8ZulEM9lg0s0D4FPgrcvwQfa Pp1biHdCqfQ65Ju4ikoIxmyizh+tgIZKmDh3G73ms9QA3GQ5t21dYBtYV2ZQ/i1MOBcX Do8ubsg4rITpXlkDn430YC+3H9O06Ij3Fuy5b9NtqFfO+xrpF4QpDHHqJYaxC4P3wSQb VkQg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a8si3141603eds.491.2020.07.16.05.41.49; Thu, 16 Jul 2020 05:42:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728867AbgGPMi4 (ORCPT + 99 others); Thu, 16 Jul 2020 08:38:56 -0400 Received: from mx2.suse.de ([195.135.220.15]:36074 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728123AbgGPMif (ORCPT ); Thu, 16 Jul 2020 08:38:35 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 76A9CB943; Thu, 16 Jul 2020 12:38:38 +0000 (UTC) From: Oscar Salvador To: akpm@linux-foundation.org Cc: mhocko@suse.com, linux-mm@kvack.org, mike.kravetz@oracle.com, david@redhat.com, aneesh.kumar@linux.vnet.ibm.com, naoya.horiguchi@nec.com, linux-kernel@vger.kernel.org, Oscar Salvador , Oscar Salvador Subject: [PATCH v4 11/15] mm,hwpoison: Rework soft offline for free pages Date: Thu, 16 Jul 2020 14:38:05 +0200 Message-Id: <20200716123810.25292-12-osalvador@suse.de> X-Mailer: git-send-email 2.13.7 In-Reply-To: <20200716123810.25292-1-osalvador@suse.de> References: <20200716123810.25292-1-osalvador@suse.de> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When trying to soft-offline a free page, we need to first take it off the buddy allocator. Once we know is out of reach, we can safely flag it as poisoned. take_page_off_buddy will be used to take a page meant to be poisoned off the buddy allocator. take_page_off_buddy calls break_down_buddy_pages, which splits a higher-order page in case our page belongs to one. Once the page is under our control, we call page_handle_poison to set it as poisoned and grab a refcount on it. Signed-off-by: Oscar Salvador Signed-off-by: Naoya Horiguchi --- include/linux/page-flags.h | 1 + mm/memory-failure.c | 17 +++++++--- mm/page_alloc.c | 68 ++++++++++++++++++++++++++++++++++++++ 3 files changed, 81 insertions(+), 5 deletions(-) diff --git a/include/linux/page-flags.h b/include/linux/page-flags.h index 276140c94f4a..01baf6d426ff 100644 --- a/include/linux/page-flags.h +++ b/include/linux/page-flags.h @@ -425,6 +425,7 @@ PAGEFLAG_FALSE(Uncached) PAGEFLAG(HWPoison, hwpoison, PF_ANY) TESTSCFLAG(HWPoison, hwpoison, PF_ANY) #define __PG_HWPOISON (1UL << PG_hwpoison) +extern bool take_page_off_buddy(struct page *page); extern bool set_hwpoison_free_buddy_page(struct page *page); #else PAGEFLAG_FALSE(HWPoison) diff --git a/mm/memory-failure.c b/mm/memory-failure.c index 2e244d5b83e0..caf012d34607 100644 --- a/mm/memory-failure.c +++ b/mm/memory-failure.c @@ -65,6 +65,13 @@ int sysctl_memory_failure_recovery __read_mostly = 1; atomic_long_t num_poisoned_pages __read_mostly = ATOMIC_LONG_INIT(0); +static void page_handle_poison(struct page *page) +{ + SetPageHWPoison(page); + page_ref_inc(page); + num_poisoned_pages_inc(); +} + #if defined(CONFIG_HWPOISON_INJECT) || defined(CONFIG_HWPOISON_INJECT_MODULE) u32 hwpoison_filter_enable = 0; @@ -1876,14 +1883,14 @@ static int soft_offline_in_use_page(struct page *page) static int soft_offline_free_page(struct page *page) { + int rc = -EBUSY; int rc = dissolve_free_huge_page(page); - if (!rc) { - if (set_hwpoison_free_buddy_page(page)) - num_poisoned_pages_inc(); - else - rc = -EBUSY; + if (!dissolve_free_huge_page(page) && take_page_off_buddy(page)) { + page_handle_poison(page); + rc = 0; } + return rc; } diff --git a/mm/page_alloc.c b/mm/page_alloc.c index 9e07a5d2d30d..4fa0e0887c07 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -8777,6 +8777,74 @@ bool is_free_buddy_page(struct page *page) } #ifdef CONFIG_MEMORY_FAILURE +/* + * Break down a higher-order page in sub-pages, and keep our target out of + * buddy allocator. + */ +static void break_down_buddy_pages(struct zone *zone, struct page *page, + struct page *target, int low, int high, + int migratetype) +{ + unsigned long size = 1 << high; + struct page *current_buddy, *next_page; + + while (high > low) { + high--; + size >>= 1; + + if (target >= &page[size]) { + next_page = page + size; + current_buddy = page; + } else { + next_page = page; + current_buddy = page + size; + } + + if (set_page_guard(zone, current_buddy, high, migratetype)) + continue; + + if (current_buddy != target) { + add_to_free_list(current_buddy, zone, high, migratetype); + set_page_order(current_buddy, high); + page = next_page; + } + } +} + +/* + * Take a page that will be marked as poisoned off the buddy allocator. + */ +bool take_page_off_buddy(struct page *page) +{ + struct zone *zone = page_zone(page); + unsigned long pfn = page_to_pfn(page); + unsigned long flags; + unsigned int order; + bool ret = false; + + spin_lock_irqsave(&zone->lock, flags); + for (order = 0; order < MAX_ORDER; order++) { + struct page *page_head = page - (pfn & ((1 << order) - 1)); + int buddy_order = page_order(page_head); + + if (PageBuddy(page_head) && buddy_order >= order) { + unsigned long pfn_head = page_to_pfn(page_head); + int migratetype = get_pfnblock_migratetype(page_head, + pfn_head); + + del_page_from_free_list(page_head, zone, buddy_order); + break_down_buddy_pages(zone, page_head, page, 0, + buddy_order, migratetype); + ret = true; + break; + } + if (page_count(page_head) > 0) + break; + } + spin_unlock_irqrestore(&zone->lock, flags); + return ret; +} + /* * Set PG_hwpoison flag if a given page is confirmed to be a free page. This * test is performed under the zone lock to prevent a race against page -- 2.26.2