Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp2658228iob; Fri, 6 May 2022 07:44:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxfDERfBKk79hqu9u4kQ5FCFJbg9BJzsCnXRAKEZUJj2JitxOQyASrcr7BFVSr9mqiTgWPD X-Received: by 2002:a17:902:d585:b0:15e:be8c:aabb with SMTP id k5-20020a170902d58500b0015ebe8caabbmr3997539plh.72.1651848244090; Fri, 06 May 2022 07:44:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651848244; cv=none; d=google.com; s=arc-20160816; b=Lc563Roc5XPpuXj9v3wE7gUFesv+prY8N1b6uGixOq250wrDWpwhItoIA3G14F9Kam eCkfzdWq+Z112qqtUHSnLOnptdagLQ1YiTbgqG7cuiRUYhsKLGKz8tc7U/swoD8tiEwh EYYIF2CQJEtFeQBAte82yICW5gFIwAxdB4iqIBnscFfIru48zV3SjuuSRBBZ+eMxcHKE 9qdSxfg+spb570a4l+KEYDqwkD5+1PihBjJGypDZIGTZIyicAwrKtzmtk8IjTFWobbjZ DIZ+Co1YuVsIOEIdHRj6kTYWjA9JTcKxlLZDMMo6Ykc6mb3y2W04Rm0XI/vP74X3g6NK Ufkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=BKvsgWQUg0gMqeUR3q7cJz8EBr7iOI0sJ8d081w4vJA=; b=Bd4k8I0bYSMRccqurPtIodbjjw6lUUPOVhdLyEDK1+sUIIj3ZiZhAOAzo8AT0J4dMf 56/Jtma9mt6l7MolcvCOnpAYq5MrixzJoQa33oMlpj63XcvX+YV5wpzPR4ay0VflsF2A N2+GrWyWKvcBZ8k6dAZhs4dvIQDUZEknY/kL1C2CflcQzoOyIlwj2xjQAwU+b97GKoDP FXTyqIJX1SZBwMvayEQMsg/hCvuWBD/T+BXCMSu+kTfwUICX31FPr7QWA8RtvSIz/Z8y I7NWYgimMCpu/HMwv2Uy6OE0fEZIGCxeE6Z/fL0gZhifQP2AdQUVs/i3UlqYHNCDdBXV ZdCQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=kGfS3bGe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a128-20020a636686000000b003827f1fef8csi5163096pgc.400.2022.05.06.07.43.47; Fri, 06 May 2022 07:44:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=kGfS3bGe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231131AbiEEIaA (ORCPT + 99 others); Thu, 5 May 2022 04:30:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39968 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1349011AbiEEI3f (ORCPT ); Thu, 5 May 2022 04:29:35 -0400 Received: from mail-yb1-xb2e.google.com (mail-yb1-xb2e.google.com [IPv6:2607:f8b0:4864:20::b2e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 475F02D1CE for ; Thu, 5 May 2022 01:25:56 -0700 (PDT) Received: by mail-yb1-xb2e.google.com with SMTP id i38so6356695ybj.13 for ; Thu, 05 May 2022 01:25:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=BKvsgWQUg0gMqeUR3q7cJz8EBr7iOI0sJ8d081w4vJA=; b=kGfS3bGeiu6lveuQ4kdgVfruOGv7LsufFzgu9lf9V0T2ClNwGvDnrvaQkeK2PA23E0 KC3TG3PugQIuIhH2FBbL+CwiX86nuxjvCbp2+P+wCG4BJKqIfdUiTkHwKn/cEbPh+5e3 9BPMW39rsRGeQ4Wp1Uxad6wfVYCYa+zFEdPOQSfS6IcrGt1fq/UQLdqTBXqyPQ/RirrW E14o7WY4KgkgPIPb8o+xighdKDYzbwQsabrDkFahK5prFANSmmuOO8oqXcn+nT/e5yHC VNVkuCWImM+/0ZfzczOUxVYm1ynprxg8TtFGrUpQ8X/mBc4zM8Em4doz3Q+JKXglsxHJ TnBQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=BKvsgWQUg0gMqeUR3q7cJz8EBr7iOI0sJ8d081w4vJA=; b=p5ZlrX53mCG0E2BjI0ACqLTOneoJ1eICljqSK0P3zFCbOE4Rl3Vv+a4IkZOi+Hhdjj S6F10/3nzDdDZTGZJQ98n3QsgocMCrWNZz4s1L1+XpRPmVTSwt8BvNznSuGTo+AuZrxC CT+qQcMNe7Rxbkh1okYlGbGqb7mmKQGBgioGC+RTSpGMezI7pPzQnG6f+Ulvy5Fr5qrL lZFr46xAZINaoeEJQEBLc28640xNkKN1YaBWHy0uoPxdXyf5ntCt/Ekf9A7VfX9dQ3kU lUUGN86Nd52xELTWh4m8N/vUOGXyq0ZaUDs1qO6HBFCZj4HXmjaXuMthmLtU1ZJNze+y KIWg== X-Gm-Message-State: AOAM5328T8IRYG6u8jk9ANojjrAfWtVhjuv6j7BxVi4hNHdsGIBsBRXh CA0GLAQakyQrr5UHa5odXuJhCIydT2nJ5KufaeSnFs02DpxzJg== X-Received: by 2002:a05:6902:1342:b0:648:a4d2:ff43 with SMTP id g2-20020a056902134200b00648a4d2ff43mr19964190ybu.425.1651739155360; Thu, 05 May 2022 01:25:55 -0700 (PDT) MIME-Version: 1.0 References: <20220505070105.1835745-1-42.hyeyoo@gmail.com> <20220505073920.1880661-1-42.hyeyoo@gmail.com> In-Reply-To: <20220505073920.1880661-1-42.hyeyoo@gmail.com> From: Marco Elver Date: Thu, 5 May 2022 10:25:18 +0200 Message-ID: Subject: Re: [PATCH v2] mm/kfence: reset PG_slab and memcg_data before freeing __kfence_pool To: Hyeonggon Yoo <42.hyeyoo@gmail.com> Cc: Alexander Potapenko , Dmitry Vyukov , Andrew Morton , linux-mm@kvack.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 5 May 2022 at 09:40, Hyeonggon Yoo <42.hyeyoo@gmail.com> wrote: > > When kfence fails to initialize kfence pool, it frees the pool. > But it does not reset PG_slab flag and memcg_data of struct page. > > Below is a BUG because of this. Let's fix it by resetting PG_slab > and memcg_data before free. > > [ 0.089149] BUG: Bad page state in process swapper/0 pfn:3d8e06 > [ 0.089149] page:ffffea46cf638180 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3d8e06 > [ 0.089150] memcg:ffffffff94a475d1 > [ 0.089150] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) > [ 0.089151] raw: 0017ffffc0000200 ffffea46cf638188 ffffea46cf638188 0000000000000000 > [ 0.089152] raw: 0000000000000000 0000000000000000 00000000ffffffff ffffffff94a475d1 > [ 0.089152] page dumped because: page still charged to cgroup > [ 0.089153] Modules linked in: > [ 0.089153] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G B W 5.18.0-rc1+ #965 > [ 0.089154] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014 > [ 0.089154] Call Trace: > [ 0.089155] > [ 0.089155] dump_stack_lvl+0x49/0x5f > [ 0.089157] dump_stack+0x10/0x12 > [ 0.089158] bad_page.cold+0x63/0x94 > [ 0.089159] check_free_page_bad+0x66/0x70 > [ 0.089160] __free_pages_ok+0x423/0x530 > [ 0.089161] __free_pages_core+0x8e/0xa0 > [ 0.089162] memblock_free_pages+0x10/0x12 > [ 0.089164] memblock_free_late+0x8f/0xb9 > [ 0.089165] kfence_init+0x68/0x92 > [ 0.089166] start_kernel+0x789/0x992 > [ 0.089167] x86_64_start_reservations+0x24/0x26 > [ 0.089168] x86_64_start_kernel+0xa9/0xaf > [ 0.089170] secondary_startup_64_no_verify+0xd5/0xdb > [ 0.089171] > > Fixes: 0ce20dd84089 ("mm: add Kernel Electric-Fence infrastructure") > Fixes: 8f0b36497303 ("mm: kfence: fix objcgs vector allocation") > Signed-off-by: Hyeonggon Yoo <42.hyeyoo@gmail.com> Reviewed-by: Marco Elver , with small comment below. > --- > > v1 -> v2: > - Use folio instead of page > - Add Fixes: tags > - Wrap #ifdef ~ #endif around folio->memcg_data = 0; > > mm/kfence/core.c | 9 +++++++++ > 1 file changed, 9 insertions(+) > > diff --git a/mm/kfence/core.c b/mm/kfence/core.c > index a203747ad2c0..bb1c6c489d0a 100644 > --- a/mm/kfence/core.c > +++ b/mm/kfence/core.c > @@ -642,6 +642,15 @@ static bool __init kfence_init_pool_early(void) > * fails for the first page, and therefore expect addr==__kfence_pool in > * most failure cases. > */ > + for (char *p = (char *)addr; p < __kfence_pool + KFENCE_POOL_SIZE; p += PAGE_SIZE) { > + struct folio *folio; > + > + folio = virt_to_folio(p); Assign folio where it is defined above. Better to always initialize and guard against accidental uninit use in future. Thanks, -- Marco