Skip to content
Snippets Groups Projects
Forked from MediaTek / aiot / linux
Source project has a limited visibility.
  • Naoya Horiguchi's avatar
    ceaf8fbe
    mm, hwpoison: skip raw hwpoison page in freeing 1GB hugepage · ceaf8fbe
    Naoya Horiguchi authored
    Currently if memory_failure() (modified to remove blocking code with
    subsequent patch) is called on a page in some 1GB hugepage, memory error
    handling fails and the raw error page gets into leaked state.  The impact
    is small in production systems (just leaked single 4kB page), but this
    limits the testability because unpoison doesn't work for it.  We can no
    longer create 1GB hugepage on the 1GB physical address range with such
    leaked pages, that's not useful when testing on small systems.
    
    When a hwpoison page in a 1GB hugepage is handled, it's caught by the
    PageHWPoison check in free_pages_prepare() because the 1GB hugepage is
    broken down into raw error pages before coming to this point:
    
            if (unlikely(PageHWPoison(page)) && !order) {
                    ...
                    return false;
            }
    
    Then, the page is not sent to buddy and the page refcount is left 0.
    
    Originally this check is supposed to work when the error page is freed
    from page_handle_poison() (that is called from soft-offline), but now we
    are opening another path to call it, so the callers of
    __page_handle_poison() need to handle the case by considering the return
    value 0 as success.  Then page refcount for hwpoison is properly
    incremented so unpoison works.
    
    Link: https://lkml.kernel.org/r/20220714042420.1847125-8-naoya.horiguchi@linux.dev
    
    
    Signed-off-by: default avatarNaoya Horiguchi <naoya.horiguchi@nec.com>
    Reviewed-by: default avatarMiaohe Lin <linmiaohe@huawei.com>
    Cc: David Hildenbrand <david@redhat.com>
    Cc: kernel test robot <lkp@intel.com>
    Cc: Liu Shixin <liushixin2@huawei.com>
    Cc: Mike Kravetz <mike.kravetz@oracle.com>
    Cc: Muchun Song <songmuchun@bytedance.com>
    Cc: Oscar Salvador <osalvador@suse.de>
    Cc: Yang Shi <shy828301@gmail.com>
    Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
    ceaf8fbe
    History
    mm, hwpoison: skip raw hwpoison page in freeing 1GB hugepage
    Naoya Horiguchi authored
    Currently if memory_failure() (modified to remove blocking code with
    subsequent patch) is called on a page in some 1GB hugepage, memory error
    handling fails and the raw error page gets into leaked state.  The impact
    is small in production systems (just leaked single 4kB page), but this
    limits the testability because unpoison doesn't work for it.  We can no
    longer create 1GB hugepage on the 1GB physical address range with such
    leaked pages, that's not useful when testing on small systems.
    
    When a hwpoison page in a 1GB hugepage is handled, it's caught by the
    PageHWPoison check in free_pages_prepare() because the 1GB hugepage is
    broken down into raw error pages before coming to this point:
    
            if (unlikely(PageHWPoison(page)) && !order) {
                    ...
                    return false;
            }
    
    Then, the page is not sent to buddy and the page refcount is left 0.
    
    Originally this check is supposed to work when the error page is freed
    from page_handle_poison() (that is called from soft-offline), but now we
    are opening another path to call it, so the callers of
    __page_handle_poison() need to handle the case by considering the return
    value 0 as success.  Then page refcount for hwpoison is properly
    incremented so unpoison works.
    
    Link: https://lkml.kernel.org/r/20220714042420.1847125-8-naoya.horiguchi@linux.dev
    
    
    Signed-off-by: default avatarNaoya Horiguchi <naoya.horiguchi@nec.com>
    Reviewed-by: default avatarMiaohe Lin <linmiaohe@huawei.com>
    Cc: David Hildenbrand <david@redhat.com>
    Cc: kernel test robot <lkp@intel.com>
    Cc: Liu Shixin <liushixin2@huawei.com>
    Cc: Mike Kravetz <mike.kravetz@oracle.com>
    Cc: Muchun Song <songmuchun@bytedance.com>
    Cc: Oscar Salvador <osalvador@suse.de>
    Cc: Yang Shi <shy828301@gmail.com>
    Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>