From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7C387C433EF for ; Wed, 15 Jun 2022 02:05:03 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 4930E6B0071; Tue, 14 Jun 2022 22:05:02 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 443166B0072; Tue, 14 Jun 2022 22:05:02 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2E24D6B0073; Tue, 14 Jun 2022 22:05:02 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 1C5BF6B0071 for ; Tue, 14 Jun 2022 22:05:02 -0400 (EDT) Received: from smtpin15.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id E263B1121 for ; Wed, 15 Jun 2022 02:05:01 +0000 (UTC) X-FDA: 79578827202.15.4D7F755 Received: from mail-pl1-f180.google.com (mail-pl1-f180.google.com [209.85.214.180]) by imf09.hostedemail.com (Postfix) with ESMTP id 8EAC71400AB for ; Wed, 15 Jun 2022 02:04:59 +0000 (UTC) Received: by mail-pl1-f180.google.com with SMTP id g8so4005612plt.8 for ; Tue, 14 Jun 2022 19:04:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bytedance-com.20210112.gappssmtp.com; s=20210112; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=ZTEMzb2kbxmOG0IPL3JzkaKv5Etit65wHTgVH613vdo=; b=fEMFad+WsFNW5s4GCMXNnrGnm51i8mcLj5tEebvYOSSV2mSrZwh71Z+6oKwQ6pP9S0 X7blX5ZHMrUUA3V+dpqXCntWfyddlG312G0BGBrl3f4zi4rrYILu3Td8cGEhPe+PeIHz SIy0pgZzazC4YpYJHyH+hjVOJjjDW2gY2vT1c5Aw34yUclx7QoIdavhWV1XF+pInqmTt vX8D057nm1gCKYBXo8xjPhjdvGJJmwD6mrtmgmqXDUp0yxx04dVKuig5ZhvYVSX2+Kub D3YNpIqgIdaNzvEqZCmfrKTfj5U7HpmRK/O2f/gR5aPRXgXuXK7b/lk0Izu2Jnl+hrw/ 9OHQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=ZTEMzb2kbxmOG0IPL3JzkaKv5Etit65wHTgVH613vdo=; b=MjdVLZrIjCz/dkHiJjUFa1SathcCSxzS8DUpXjBQGcaEeTNhSBXkemcuy1Anw/sAt/ DsI63R7Z0xSLKfOO79MbCBkiNTUf4NmHjGZ3zT25R14xTuBdlsxB+VPhdj3Tc+Dma0QP Cj2IqLMlYhP8tgnTQAQSCiRVLc8tM3nRISAIZbU/TUgzY733j438XARXxTbHTtgAZlRh VTESb3wCRCQzQ1FvSw5qAHSZ67Y6aD0Hht7+KEO2EKcNL7yF+C5QfhpkfFLwEPHMXChk 50vWeYverYd0gY0aW/0H/sroaEEj6aROxry3tKi+wRLOcySkvjGN0rdbNblZv9ECWQNR rJGw== X-Gm-Message-State: AJIora+rzhl5tRKyZvef67bkS5bMZm/xu+4D4Y7FZ+how+chO8MBdW3/ Ge2EI1/GBYEbVS3tKSSnWmrSjg== X-Google-Smtp-Source: AGRyM1uJyUuCwXbIFrRgLXDqQaPfg7gcua0Z8rHf5H2q6M1easfzctdebPrsI2SuOMxgkyUcoVbo7w== X-Received: by 2002:a17:902:7806:b0:168:d336:dda9 with SMTP id p6-20020a170902780600b00168d336dda9mr7054423pll.83.1655258698239; Tue, 14 Jun 2022 19:04:58 -0700 (PDT) Received: from always-x1.bytedance.net ([61.120.150.70]) by smtp.gmail.com with ESMTPSA id f17-20020aa79691000000b00518d06efbc8sm8538290pfk.98.2022.06.14.19.04.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 14 Jun 2022 19:04:57 -0700 (PDT) From: zhenwei pi To: pizhenwei@bytedance.com, naoya.horiguchi@nec.com, akpm@linux-foundation.org Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, david@redhat.com, linmiaohe@huawei.com, gregkh@linuxfoundation.org Subject: [PATCH v5 0/1] mm/memory-failure: don't allow to unpoison hw corrupted page Date: Wed, 15 Jun 2022 10:00:04 +0800 Message-Id: <20220615020005.246295-1-pizhenwei@bytedance.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1655258701; a=rsa-sha256; cv=none; b=fT9brWkvkmtGauxpu0w2XGGoOH08GCCRqDjNXKg84D6ghUXyPGctUWqKr3kvRLDrvDbxLh MLiCuYsLyKRdvx47xLY6RnenaAZThUNMPqOoGymfDnZvW00kUExvMGZ+cnUUzbL9FIInoP Dk94daDYmV/0loPK4Qsy9N9tVue1Ha4= ARC-Authentication-Results: i=1; imf09.hostedemail.com; dkim=pass header.d=bytedance-com.20210112.gappssmtp.com header.s=20210112 header.b=fEMFad+W; spf=pass (imf09.hostedemail.com: domain of pizhenwei@bytedance.com designates 209.85.214.180 as permitted sender) smtp.mailfrom=pizhenwei@bytedance.com; dmarc=pass (policy=none) header.from=bytedance.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1655258701; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:references:dkim-signature; bh=ZTEMzb2kbxmOG0IPL3JzkaKv5Etit65wHTgVH613vdo=; b=v+dFB5ZGvADS63JJvAhtn9x1UgykViGo6Fb90nHazSjX6ACx/0b8FILY2OPID7EIEDAX/q E81+4ZlBEnVlX/1SAkBFpwWSCHxJL6QiJwIR3vZgNe5k77X9dhkhG1iBCRulkDpmP0fNus a7CirIRAkMabTXfH+vGr4KbFmld34z4= X-Stat-Signature: e3c5r6dekmmm6zj3iaew99uiyxay75i6 X-Rspamd-Queue-Id: 8EAC71400AB Authentication-Results: imf09.hostedemail.com; dkim=pass header.d=bytedance-com.20210112.gappssmtp.com header.s=20210112 header.b=fEMFad+W; spf=pass (imf09.hostedemail.com: domain of pizhenwei@bytedance.com designates 209.85.214.180 as permitted sender) smtp.mailfrom=pizhenwei@bytedance.com; dmarc=pass (policy=none) header.from=bytedance.com X-Rspamd-Server: rspam07 X-Rspam-User: X-HE-Tag: 1655258699-691125 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: v4 -> v5: - Add mf_flags 'MF_SW_SIMULATED' to distinguish SW/HW memory failure, and use a global variable to record HW memory failure, once HW memory failure happens, disable unpoison. v3 -> v4: - Add debug entry "hwpoisoned-pages" to show the number of hwpoisoned pages. - Disable unpoison when a read HW memory failure occurs. v2 -> v3: - David pointed out that virt_to_kpte() is broken(no pmd_large() test on a PMD), so drop this API in this patch, walk kmap instead. v1 -> v2: - this change gets protected by mf_mutex - use -EOPNOTSUPP instead of -EPERM v1: - check KPTE to avoid to unpoison hardware corrupted page zhenwei pi (1): mm/memory-failure: disable unpoison once hw error happens Documentation/vm/hwpoison.rst | 3 ++- drivers/base/memory.c | 2 +- include/linux/mm.h | 1 + mm/hwpoison-inject.c | 2 +- mm/madvise.c | 2 +- mm/memory-failure.c | 12 ++++++++++++ 6 files changed, 18 insertions(+), 4 deletions(-) -- 2.20.1