Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp943494iob; Fri, 13 May 2022 17:16:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJya55bxza+HqXWUHrG7OzJ7RaYZgddcfBTcgj62fLAdcxplKcSAtgWh79lA+c2uA789lJvW X-Received: by 2002:a05:600c:3041:b0:394:8835:2223 with SMTP id n1-20020a05600c304100b0039488352223mr7032621wmh.160.1652487402613; Fri, 13 May 2022 17:16:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652487402; cv=none; d=google.com; s=arc-20160816; b=09GBGcK1MDlNhrskzT2Qmpgwtci4F9sLUPd9hsrgz4nSutWT2q22KQ4Gd8PMkMZHEl dlS+MR/FyJoy8fnYSTDeAWDfjX/jBDpnD06aqcFehk3nB7Ej6juC2/MO/XwQzoXtxVHS EEZt4BZDBYuDCH7+P8DpgECXPW5X1KjtgBk9RKusS5RwwxptyQuNUnIWDgrO88t00dLV 3mSTzv2zb01nrWDfYasCq7f9bm8Da+Lim75tBVwXtFfdgoLNEULafaN+s4OLFMJmtguL O+qsA90URMERmm4kOi+YV8hEQY80f0KIYuVo9xPW4SmY5lIN32Fnvi8FvYqpdluV2qAc Wdqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:subject :organization:from:references:cc:to:content-language:user-agent :mime-version:date:message-id:dkim-signature; bh=D2JrMfoThymsDO02MSeMolHmmTLKA88WsEI5m8LvBfg=; b=LExx5qV5gzHXObMZxMcHEjfSDHF9ZEwUDcA23yFlaGC9aZa5kY5Nsf3FsIprCRyHQv 8KlIJKtCyKR4IaG5FOt/rtOcH1PBRIHLWq3H0BFD4aYiiw9JBMFkuwFpXpHtM4wWqPVR Nb0t6xPKNI9HEMFaKQxBQda45uo3hTM71WQRVXezt0fi0Z87ZV5E3+OLfKz5/4e7h4DO lnpYO8OvULHjUsCkJq4JOaJhh/gR6GVmFAVPfCejeXkqWO57gjWL1x0uCnMcZ7s7Nvda ErCLOS8tsSSlgyv2VKN2eBvoeTVmcESVmYNgj7olB36ZhteRFclCNbykRYcLmcXLjwui xvrQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=d9WKxxlW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id t6-20020a1c4606000000b0039450db8743si7066639wma.200.2022.05.13.17.16.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 13 May 2022 17:16:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=d9WKxxlW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B5ED532D35E; Fri, 13 May 2022 16:15:55 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1354042AbiELNAB (ORCPT + 99 others); Thu, 12 May 2022 09:00:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48792 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1354048AbiELM77 (ORCPT ); Thu, 12 May 2022 08:59:59 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 1359C205F05 for ; Thu, 12 May 2022 05:59:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1652360397; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=D2JrMfoThymsDO02MSeMolHmmTLKA88WsEI5m8LvBfg=; b=d9WKxxlWjzzeJlCNRq8ZhyOQbxTQ4DhHjEfFcgRwKflHKhAYvG5xyVZp377SMmlFH7UEIE bQegeuVGGbw+3cOd9O1mPRSPMeAUZDMmtlk4kVKLb52WQjDy6vYJJZYluEXlVD6G7zQ3Nx qdQEo53WhjSfNtr556yK/hHwvYstu9o= Received: from mail-wr1-f72.google.com (mail-wr1-f72.google.com [209.85.221.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-1-t8SHahk5NmuD4JaIyN39Jw-1; Thu, 12 May 2022 08:59:56 -0400 X-MC-Unique: t8SHahk5NmuD4JaIyN39Jw-1 Received: by mail-wr1-f72.google.com with SMTP id v17-20020a056000163100b0020c9b0e9039so2022590wrb.18 for ; Thu, 12 May 2022 05:59:55 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent :content-language:to:cc:references:from:organization:subject :in-reply-to:content-transfer-encoding; bh=D2JrMfoThymsDO02MSeMolHmmTLKA88WsEI5m8LvBfg=; b=Q/MuYrYp26dybIfQWPoCFx/zQezgSH2BAXDBDdai3KqGdtBx8Pa28JKwPX6kEAfan0 5PLmo7TH66cqwe2P1CMwCukr8vglGihpJyUWdDthIYyYh6c8QertAGhM15hWIVw5RcmC dRaYrahJwC6vAuf72DuJ8wce84Q+VV3c7j2Y5b5zATSd60H9qvO3Ropqun1zm24gIJHF sun1KT6h/yzQXlWqoZKYMxWGP9LGRSYLRPSzrQkIqWy+SQQ+rRlT3KcmO8bp8hbRa+Ec As+lIIIaGq2ILP6Lq3rlndOLHtIuCUV1OfRz6hAJVwGtPEgE1IVxFO2Flr40DBKEqVr/ qRNg== X-Gm-Message-State: AOAM531T8dNLep2c9hNtJVgr2DmY9bfE7nZ/sCJwXvaTlvFYvw97irzJ TTrWg0UIBIK+odVke6a9drW/Ift5GLao1xnMAwz+QcBKKgfGQNvPthh+Pglm/iSGFbwiDOijgqs yGBhK7Z332Ago6ELtBun9PzYC X-Received: by 2002:a05:6000:1f8c:b0:20c:b1cf:2a1c with SMTP id bw12-20020a0560001f8c00b0020cb1cf2a1cmr23720858wrb.368.1652360394725; Thu, 12 May 2022 05:59:54 -0700 (PDT) X-Received: by 2002:a05:6000:1f8c:b0:20c:b1cf:2a1c with SMTP id bw12-20020a0560001f8c00b0020cb1cf2a1cmr23720846wrb.368.1652360394467; Thu, 12 May 2022 05:59:54 -0700 (PDT) Received: from ?IPV6:2003:cb:c701:d200:ee5d:1275:f171:136d? (p200300cbc701d200ee5d1275f171136d.dip0.t-ipconnect.de. [2003:cb:c701:d200:ee5d:1275:f171:136d]) by smtp.gmail.com with ESMTPSA id v17-20020a05600c215100b003943558a976sm2796979wml.29.2022.05.12.05.59.53 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 12 May 2022 05:59:53 -0700 (PDT) Message-ID: <5b43d8f7-3477-a2c2-028e-e31d40ac932c@redhat.com> Date: Thu, 12 May 2022 14:59:53 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.8.0 Content-Language: en-US To: Miaohe Lin , =?UTF-8?B?SE9SSUdVQ0hJIE5BT1lBKOWggOWPoyDnm7TkuZ8p?= , Oscar Salvador Cc: Naoya Horiguchi , "linux-mm@kvack.org" , Andrew Morton , Mike Kravetz , Yang Shi , Muchun Song , "linux-kernel@vger.kernel.org" References: <54399815-10fe-9d43-7ada-7ddb55e798cb@redhat.com> <20220427122049.GA3918978@hori.linux.bs1.fc.nec.co.jp> <20220509072902.GB123646@hori.linux.bs1.fc.nec.co.jp> <6a5d31a3-c27f-f6d9-78bb-d6bf69547887@huawei.com> <465902dc-d3bf-7a93-da04-839faddcd699@huawei.com> <0389eac1-af68-56b5-696d-581bb56878b9@redhat.com> <20220511161052.GA224675@hori.linux.bs1.fc.nec.co.jp> <6986a8dd-7211-fb4d-1d66-5b203cad1aab@redhat.com> <20220512063558.GA249122@hori.linux.bs1.fc.nec.co.jp> <04781d15-9d87-1763-02fe-e353679c50d7@huawei.com> From: David Hildenbrand Organization: Red Hat Subject: Re: [RFC PATCH v1 0/4] mm, hwpoison: improve handling workload related to hugetlb and memory_hotplug In-Reply-To: <04781d15-9d87-1763-02fe-e353679c50d7@huawei.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-5.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,RDNS_NONE,SPF_HELO_NONE, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12.05.22 13:13, Miaohe Lin wrote: > On 2022/5/12 15:28, David Hildenbrand wrote: >>>>>> >>>>>> Once the problematic DIMM would actually get unplugged, the memory block devices >>>>>> would get removed as well. So when hotplugging a new DIMM in the same >>>>>> location, we could online that memory again. >>>>> >>>>> What about PG_hwpoison flags? struct pages are also freed and reallocated >>>>> in the actual DIMM replacement? >>>> >>>> Once memory is offline, the memmap is stale and is no longer >>>> trustworthy. It gets reinitialize during memory onlining -- so any >>>> previous PG_hwpoison is overridden at least there. In some setups, we >>>> even poison the whole memmap via page_init_poison() during memory offlining. >>>> >>>> Apart from that, we should be freeing the memmap in all relevant cases >>>> when removing memory. I remember there are a couple of corner cases, but >>>> we don't really have to care about that. >>> >>> OK, so there seems no need to manipulate struct pages for hwpoison in >>> all relevant cases. >> >> Right. When offlining a memory block, all we have to do is remember if >> we stumbled over a hwpoisoned page and rememebr that inside the memory >> block. Rejecting to online is then easy. > > BTW: How should we deal with the below race window: > > CPU A CPU B CPU C > accessing page while hold page refcnt > memory_failure happened on page > offline_pages > page can be offlined due to page refcnt > is ignored when PG_hwpoison is set > can still access page struct... > > Any in use page (with page refcnt incremented) might be offlined while its content, e.g. flags, private ..., can > still be accessed if the above race happened. Is this possible? Or am I miss something? Any suggestion to fix it? > I can't figure out a way yet. :( I assume you mean that test_pages_isolated() essentially only checks for PageHWPoison() and doesn't care about the refcount? That part is very dodgy and it's part of my motivation to question that whole handling in the first place. In do_migrate_range(), there is a comment: " HWPoison pages have elevated reference counts so the migration would fail on them. It also doesn't make any sense to migrate them in the first place. Still try to unmap such a page in case it is still mapped (e.g. current hwpoison implementation doesn't unmap KSM pages but keep the unmap as the catch all safety net). " My assumption would be: if there are any unexpected references on a hwpoison page, we must fail offlining. Ripping out the page might be more harmful then just leaving it in place and failing offlining for the time being. I am no export on PageHWPoison(). Which guarantees do we have regarding the page count? If we succeed in unmapping the page, there shouldn't be any references from the page tables. We might still have GUP references to such pages, and it would be fair enough to fail offlining. I remember we try removing the page from the pagecache etc. to free up these references. So which additional references do we have that the comment in offlining code talks about? A single additional one from hwpoison code? Once we figure that out, we might tweak test_pages_isolated() to also consider the page count and not rip out random pages that are still referenced in the system. -- Thanks, David / dhildenb