From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.4 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,NICE_REPLY_A,SIGNED_OFF_BY,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 219D2C56201 for ; Wed, 11 Nov 2020 15:43:01 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 8032E20709 for ; Wed, 11 Nov 2020 15:42:58 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="VKustqog" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 8032E20709 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=redhat.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id BD64C6B0075; Wed, 11 Nov 2020 10:42:57 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id B859D6B007B; Wed, 11 Nov 2020 10:42:57 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A75936B007D; Wed, 11 Nov 2020 10:42:57 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0106.hostedemail.com [216.40.44.106]) by kanga.kvack.org (Postfix) with ESMTP id 77F206B0075 for ; Wed, 11 Nov 2020 10:42:57 -0500 (EST) Received: from smtpin23.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay05.hostedemail.com (Postfix) with ESMTP id 25A01181AEF09 for ; Wed, 11 Nov 2020 15:42:57 +0000 (UTC) X-FDA: 77472555594.23.arm86_04029c2272fe Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin23.hostedemail.com (Postfix) with ESMTP id F124E37608 for ; Wed, 11 Nov 2020 15:42:56 +0000 (UTC) X-HE-Tag: arm86_04029c2272fe X-Filterd-Recvd-Size: 6930 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [63.128.21.124]) by imf17.hostedemail.com (Postfix) with ESMTP for ; Wed, 11 Nov 2020 15:42:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1605109375; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=xai5l2s8KRD9oSY9ZlqyCjNLFJtte63gsaAgqFvqKwM=; b=VKustqogNdxDiLPg5CDa11MlLoZE40PSXyfdnKnnFztK+hiA9esBrSQt6mMvmH04/sex1l vTMX+yHT70fI7vxQCa3Kjysb+2ewVjlgH7LIZ+8eQ11yupzbEKTZCJfNFyUY6xMRU242jk fM5hOlQCC8Cc46Shhy/nIM4j4TePweo= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-492-nLNEnvcyONeYHoLevu9nvQ-1; Wed, 11 Nov 2020 10:42:51 -0500 X-MC-Unique: nLNEnvcyONeYHoLevu9nvQ-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id BD7B41099F63; Wed, 11 Nov 2020 15:42:49 +0000 (UTC) Received: from [10.36.114.151] (ovpn-114-151.ams2.redhat.com [10.36.114.151]) by smtp.corp.redhat.com (Postfix) with ESMTP id C08FC27BBD; Wed, 11 Nov 2020 15:42:46 +0000 (UTC) Subject: Re: [PATCH v2 3/5] kernel/power: allow hibernation with page_poison sanity checking To: Vlastimil Babka , Andrew Morton Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, Alexander Potapenko , Kees Cook , Michal Hocko , Mateusz Nosek , Laura Abbott , "Rafael J. Wysocki" , Len Brown , Pavel Machek , linux-pm@vger.kernel.org References: <20201103152237.9853-1-vbabka@suse.cz> <20201103152237.9853-4-vbabka@suse.cz> From: David Hildenbrand Organization: Red Hat GmbH Message-ID: Date: Wed, 11 Nov 2020 16:42:45 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: <20201103152237.9853-4-vbabka@suse.cz> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 03.11.20 16:22, Vlastimil Babka wrote: > Page poisoning used to be incompatible with hibernation, as the state of > poisoned pages was lost after resume, thus enabling CONFIG_HIBERNATION forces > CONFIG_PAGE_POISONING_NO_SANITY. For the same reason, the poisoning with zeroes > variant CONFIG_PAGE_POISONING_ZERO used to disable hibernation. The latter > restriction was removed by commit 1ad1410f632d ("PM / Hibernate: allow > hibernation with PAGE_POISONING_ZERO") and similarly for init_on_free by commit > 18451f9f9e58 ("PM: hibernate: fix crashes with init_on_free=1") by making sure > free pages are cleared after resume. > > We can use the same mechanism to instead poison free pages with PAGE_POISON > after resume. This covers both zero and 0xAA patterns. Thus we can remove the > Kconfig restriction that disables page poison sanity checking when hibernation > is enabled. > > Signed-off-by: Vlastimil Babka > Cc: "Rafael J. Wysocki" > Cc: Len Brown > Cc: Pavel Machek > Cc: > --- > kernel/power/hibernate.c | 2 +- > kernel/power/power.h | 2 +- > kernel/power/snapshot.c | 14 ++++++++++---- > mm/Kconfig.debug | 1 - > 4 files changed, 12 insertions(+), 7 deletions(-) > > diff --git a/kernel/power/hibernate.c b/kernel/power/hibernate.c > index 2fc7d509a34f..da0b41914177 100644 > --- a/kernel/power/hibernate.c > +++ b/kernel/power/hibernate.c > @@ -326,7 +326,7 @@ static int create_image(int platform_mode) > > if (!in_suspend) { > events_check_enabled = false; > - clear_free_pages(); > + clear_or_poison_free_pages(); > } > > platform_leave(platform_mode); > diff --git a/kernel/power/power.h b/kernel/power/power.h > index 24f12d534515..778bf431ec02 100644 > --- a/kernel/power/power.h > +++ b/kernel/power/power.h > @@ -106,7 +106,7 @@ extern int create_basic_memory_bitmaps(void); > extern void free_basic_memory_bitmaps(void); > extern int hibernate_preallocate_memory(void); > > -extern void clear_free_pages(void); > +extern void clear_or_poison_free_pages(void); > > /** > * Auxiliary structure used for reading the snapshot image data and > diff --git a/kernel/power/snapshot.c b/kernel/power/snapshot.c > index 46b1804c1ddf..6b1c84afa891 100644 > --- a/kernel/power/snapshot.c > +++ b/kernel/power/snapshot.c > @@ -1144,7 +1144,7 @@ void free_basic_memory_bitmaps(void) > pr_debug("Basic memory bitmaps freed\n"); > } > > -void clear_free_pages(void) > +void clear_or_poison_free_pages(void) > { > struct memory_bitmap *bm = free_pages_map; > unsigned long pfn; > @@ -1152,12 +1152,18 @@ void clear_free_pages(void) > if (WARN_ON(!(free_pages_map))) > return; > > - if (IS_ENABLED(CONFIG_PAGE_POISONING_ZERO) || want_init_on_free()) { > + if (page_poisoning_enabled() || want_init_on_free()) { > memory_bm_position_reset(bm); > pfn = memory_bm_next_pfn(bm); > while (pfn != BM_END_OF_MAP) { > - if (pfn_valid(pfn)) > - clear_highpage(pfn_to_page(pfn)); > + if (pfn_valid(pfn)) { > + struct page *page = pfn_to_page(pfn); ^ empty line missing. And at least I prefer to declare all variables in the function header. I'd even suggest to move this into a separate function like clear_or_poison_free_page(struct page *page) > + if (page_poisoning_enabled_static()) > + kernel_poison_pages(page, 1); > + else if (want_init_on_free()) > + clear_highpage(page); > + > + } > > pfn = memory_bm_next_pfn(bm); > } > diff --git a/mm/Kconfig.debug b/mm/Kconfig.debug > index 864f129f1937..c57786ad5be9 100644 > --- a/mm/Kconfig.debug > +++ b/mm/Kconfig.debug > @@ -64,7 +64,6 @@ config PAGE_OWNER > > config PAGE_POISONING > bool "Poison pages after freeing" > - select PAGE_POISONING_NO_SANITY if HIBERNATION > help > Fill the pages with poison patterns after free_pages() and verify > the patterns before alloc_pages. The filling of the memory helps > Unless I am missing something important, this should work! Thanks! -- Thanks, David / dhildenb