From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.5 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3B0D0C4742C for ; Thu, 5 Nov 2020 08:31:52 +0000 (UTC) Received: from lists.ozlabs.org (lists.ozlabs.org [203.11.71.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 65A0E20729 for ; Thu, 5 Nov 2020 08:31:49 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="X8RLCUcr"; dkim=fail reason="signature verification failed" (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="A2wk7lnK" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 65A0E20729 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=redhat.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=linuxppc-dev-bounces+linuxppc-dev=archiver.kernel.org@lists.ozlabs.org Received: from bilbo.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3]) by lists.ozlabs.org (Postfix) with ESMTP id 4CRcFG633hzDqsQ for ; Thu, 5 Nov 2020 19:31:46 +1100 (AEDT) Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=redhat.com (client-ip=63.128.21.124; helo=us-smtp-delivery-124.mimecast.com; envelope-from=david@redhat.com; receiver=) Authentication-Results: lists.ozlabs.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: lists.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=X8RLCUcr; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=A2wk7lnK; dkim-atps=neutral Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [63.128.21.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4CRcBr4bpkzDqT7 for ; Thu, 5 Nov 2020 19:29:39 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1604564974; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=oCDxxImzZ+LzgA8fVQGOhq1vCKWuV/eegehVAiEkD7I=; b=X8RLCUcrDIdWn8KNkG0Cv8npw0547XBuv8BB4+hZiyAMI/qkQKYYMQo254PNB6SbcF1M4m l7YyTDjysoqgYH7olIRMCft4edSyUcUT5N5u8MhP5ZSYbS5w3BDQgSqNpFFsiRZAcbilmU lmXsKgOxOztCOoChwuVlJTnEjjygtr4= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1604564975; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=oCDxxImzZ+LzgA8fVQGOhq1vCKWuV/eegehVAiEkD7I=; b=A2wk7lnKF0OqLUM6fplnN7oji4PC8R/NkWdNPHhK6LqdsSCSqU+FdiLjmmcTIwv7sEyC9d dLQsWUQi5cOHPXiIIjtapEcK/7ncoOZQskXZU/rY+iCHOBLMn7APoZzpiIZWNkxoeGtRMK jC68KMpp0iOeKAQZF5DRZ738gB75FXs= Received: from mail-wm1-f69.google.com (mail-wm1-f69.google.com [209.85.128.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-396-OJ_FBVxwPMKLyVEaD-kUsg-1; Thu, 05 Nov 2020 03:29:33 -0500 X-MC-Unique: OJ_FBVxwPMKLyVEaD-kUsg-1 Received: by mail-wm1-f69.google.com with SMTP id 3so304681wms.9 for ; Thu, 05 Nov 2020 00:29:33 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:content-transfer-encoding:mime-version:subject :from:in-reply-to:cc:date:message-id:references:to; bh=adPaZhsg9rSI30Nv3OJs5JJH153rGjOkRFJFWWaQFmA=; b=oILg3q9JaRRLnzhZYAn+zyDcdH3Yi5au9L2gDJfImFYkm7wrGCCm/YFyoYT9ryOeG+ 21jjWa2E5VCQTSa4WesGas91r/Vx31jA8EOWMON+NkIHT8rqxTYUdbOrAk3+pokZnXv+ U1qulDhcg2iW9nv5nXc48UgBOQnW7LO+9R0IDvmNeMtSBuhPzXFRqlbAwE58ru5pirz5 hCe60vodT9QaieOhhrcq87H5Ba7vjOQ0IP6o4zjj92C/4KmdFIWq0qcjCztSyeBB38/f kJOmUvkor5bbweXaKj0XXXKoeGEa2+/IFAjWDeW0XbjP3IXtwxmF7eA1GzPP/KCVfuh6 e5FQ== X-Gm-Message-State: AOAM530/0H0w4ocB8OUJXonN7rw035zafE8/Rel/ia5tusFbIH9XNoYb La2DfA3UQahGNc3q/zoQGu2UsWaMBQkjH9WhncJXsl8ThNQ0vY2dGToYOJ2bVBJwUEsP56qk2ux 5XnM4oCrL0EMi6azuXJuJk0EBPA== X-Received: by 2002:a5d:688c:: with SMTP id h12mr1528841wru.92.1604564970816; Thu, 05 Nov 2020 00:29:30 -0800 (PST) X-Google-Smtp-Source: ABdhPJwa2txjVKqbSfl58jHdphu7Qv2zDJxMqnz9YHvcTy6jiI+C7kFhAWNcUEsLj0a4rpiZiHQbAQ== X-Received: by 2002:a5d:688c:: with SMTP id h12mr1528817wru.92.1604564970537; Thu, 05 Nov 2020 00:29:30 -0800 (PST) Received: from ?IPv6:2003:d8:2f34:7900:7495:eb9e:985d:aaa0? (p200300d82f3479007495eb9e985daaa0.dip0.t-ipconnect.de. [2003:d8:2f34:7900:7495:eb9e:985d:aaa0]) by smtp.gmail.com with ESMTPSA id e25sm1381379wrc.76.2020.11.05.00.29.29 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 05 Nov 2020 00:29:30 -0800 (PST) Mime-Version: 1.0 (1.0) Subject: Re: [PATCH v1 4/4] powernv/memtrace: don't abuse memory hot(un)plug infrastructure for memory allocations From: David Hildenbrand In-Reply-To: <87o8kcttjp.fsf@mpe.ellerman.id.au> Date: Thu, 5 Nov 2020 09:29:29 +0100 Message-Id: <1D39DC0E-C07A-4B9E-B811-67684A4A0FE9@redhat.com> References: <87o8kcttjp.fsf@mpe.ellerman.id.au> To: Michael Ellerman X-Mailer: iPhone Mail (18A8395) Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=david@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-BeenThere: linuxppc-dev@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Michal Hocko , Wei Yang , David Hildenbrand , linux-kernel@vger.kernel.org, Michal Hocko , linux-mm@kvack.org, Paul Mackerras , Rashmica Gupta , linuxppc-dev@lists.ozlabs.org, Andrew Morton , Mike Rapoport , Oscar Salvador Errors-To: linuxppc-dev-bounces+linuxppc-dev=archiver.kernel.org@lists.ozlabs.org Sender: "Linuxppc-dev" > Am 05.11.2020 um 03:53 schrieb Michael Ellerman : >=20 > =EF=BB=BFDavid Hildenbrand writes: >> Let's use alloc_contig_pages() for allocating memory and remove the >> linear mapping manually via arch_remove_linear_mapping(). Mark all pages >> PG_offline, such that they will definitely not get touched - e.g., >> when hibernating. When freeing memory, try to revert what we did. >> The original idea was discussed in: >> https://lkml.kernel.org/r/48340e96-7e6b-736f-9e23-d3111b915b6e@redhat.co= m >> This is similar to CONFIG_DEBUG_PAGEALLOC handling on other >> architectures, whereby only single pages are unmapped from the linear >> mapping. Let's mimic what memory hot(un)plug would do with the linear >> mapping. >> We now need MEMORY_HOTPLUG and CONTIG_ALLOC as dependencies. >> Simple test under QEMU TCG (10GB RAM, single NUMA node): >> sh-5.0# mount -t debugfs none /sys/kernel/debug/ >> sh-5.0# cat /sys/devices/system/memory/block_size_bytes >> 40000000 >> sh-5.0# echo 0x40000000 > /sys/kernel/debug/powerpc/memtrace/enable >> [ 71.052836][ T356] memtrace: Allocated trace memory on node 0 at 0x0= 000000080000000 >> sh-5.0# echo 0x80000000 > /sys/kernel/debug/powerpc/memtrace/enable >> [ 75.424302][ T356] radix-mmu: Mapped 0x0000000080000000-0x00000000c0= 000000 with 64.0 KiB pages >> [ 75.430549][ T356] memtrace: Freed trace memory back on node 0 >> [ 75.604520][ T356] memtrace: Allocated trace memory on node 0 at 0x0= 000000080000000 >> sh-5.0# echo 0x100000000 > /sys/kernel/debug/powerpc/memtrace/enable >> [ 80.418835][ T356] radix-mmu: Mapped 0x0000000080000000-0x0000000100= 000000 with 64.0 KiB pages >> [ 80.430493][ T356] memtrace: Freed trace memory back on node 0 >> [ 80.433882][ T356] memtrace: Failed to allocate trace memory on node= 0 >> sh-5.0# echo 0x40000000 > /sys/kernel/debug/powerpc/memtrace/enable >> [ 91.920158][ T356] memtrace: Allocated trace memory on node 0 at 0x0= 000000080000000 >=20 > I gave this a quick spin on a real machine, seems to work OK. >=20 > I don't have the actual memtrace tools setup to do an actual trace, will > try and get someone to test that also. >=20 > One observation is that previously the memory was zeroed when enabling > the memtrace, whereas now it's not. >=20 > eg, before: >=20 > # hexdump -C /sys/kernel/debug/powerpc/memtrace/00000000/trace=20 > 00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |............= ....| > * > 10000000 >=20 > whereas after: >=20 > # hexdump -C /sys/kernel/debug/powerpc/memtrace/00000000/trace > 00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |............= ....| > * > 00000080 e0 fd 43 00 00 00 00 00 e0 fd 43 00 00 00 00 00 |..C.......C.= ....| > 00000090 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |............= ....| > * > 00000830 98 bf 39 00 00 00 00 00 98 bf 39 00 00 00 00 00 |..9.......9.= ....| > 00000840 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |............= ....| > * > 000008a0 b0 c8 47 00 00 00 00 00 b0 c8 47 00 00 00 00 00 |..G.......G.= ....| > 000008b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |............= ....| > ... > 0fffff70 78 53 49 7d 00 00 29 2e 88 00 92 41 01 00 49 39 |xSI}..)....A= ..I9| > 0fffff80 b4 07 4a 7d 28 f8 00 7d 00 48 08 7c 0c 00 c2 40 |..J}(..}.H.|= ...@| > 0fffff90 2d f9 40 7d f0 ff c2 40 b4 07 0a 7d 00 48 8a 7f |-.@}...@...}= .H..| > 0fffffa0 70 fe 9e 41 cc ff ff 4b 00 00 00 60 00 00 00 60 |p..A...K...`= ...`| > 0fffffb0 01 00 00 48 00 00 00 60 00 00 a3 2f 0c fd 9e 40 |...H...`.../= ...@| > 0fffffc0 00 00 a2 3c 00 00 a5 e8 00 00 62 3c 00 00 63 e8 |...<......b<= ..c.| > 0fffffd0 01 00 20 39 83 02 80 38 00 00 3c 99 01 00 00 48 |.. 9...8..<.= ...H| > 0fffffe0 00 00 00 60 e4 fc ff 4b 00 00 80 38 78 fb e3 7f |...`...K...8= x...| > 0ffffff0 01 00 00 48 00 00 00 60 2c fe ff 4b 00 00 00 60 |...H...`,..K= ...`| > 10000000 >=20 >=20 > That's a nice way for root to read kernel memory, so we should probably > add a __GFP_ZERO or memset in there somewhere. Thanks for catching that! Will have a look on Monday if alloc_contig_pages(= ) already properly handled __GFP_ZERO so we can use it, otherwise I=E2=80= =98ll fix that. I don=E2=80=98t recall that memory hotunplug does any zeroing - that=E2=80= =98s why I didn=E2=80=98t add any explicit zeroing. Could be you were just = lucky in your experiment - I assume we=E2=80=98ll leak kernel memory alread= y. Thank! > cheers