public inbox for linux-mm@kvack.org
 help / color / mirror / Atom feed
From: Hao Ge <hao.ge@linux.dev>
To: Suren Baghdasaryan <surenb@google.com>
Cc: Andrew Morton <akpm@linux-foundation.org>,
	Kent Overstreet <kent.overstreet@linux.dev>,
	linux-mm@kvack.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH] mm/alloc_tag: clear codetag for pages allocated before page_ext initialization
Date: Mon, 23 Mar 2026 17:15:45 +0800	[thread overview]
Message-ID: <575e727e-cd47-41df-966a-142425aa8a8b@linux.dev> (raw)
In-Reply-To: <CAJuCfpEt1EwS4_kiTbger7sBGFKKhi+6PBjrYrTK1HEJzxOTGg@mail.gmail.com>


On 2026/3/20 10:14, Suren Baghdasaryan wrote:
> On Thu, Mar 19, 2026 at 6:58 PM Hao Ge <hao.ge@linux.dev> wrote:
>>
>> On 2026/3/20 07:48, Suren Baghdasaryan wrote:
>>> On Thu, Mar 19, 2026 at 4:44 PM Suren Baghdasaryan <surenb@google.com> wrote:
>>>> On Thu, Mar 19, 2026 at 3:28 PM Andrew Morton <akpm@linux-foundation.org> wrote:
>>>>> On Thu, 19 Mar 2026 16:31:53 +0800 Hao Ge <hao.ge@linux.dev> wrote:
>>>>>
>>>>>> Due to initialization ordering, page_ext is allocated and initialized
>>>>>> relatively late during boot. Some pages have already been allocated
>>>>>> and freed before page_ext becomes available, leaving their codetag
>>>>>> uninitialized.
>>>> Hi Hao,
>>>> Thanks for the report.
>>>> Hmm. So, we are allocating pages before page_ext is initialized...
>>>>
>>>>>> A clear example is in init_section_page_ext(): alloc_page_ext() calls
>>>>>> kmemleak_alloc().
>>> Forgot to ask. The example you are using here is for page_ext
>>> allocation itself. Do you have any other examples where page
>>> allocation happens before page_ext initialization? If that's the only
>>> place, then we might be able to fix this in a simpler way by doing
>>> something special for alloc_page_ext().
>> Hi Suren
>>
>> To help illustrate the point, here's the debug log I added:
>>
>> diff --git a/mm/page_alloc.c b/mm/page_alloc.c
>> index 2d4b6f1a554e..ebfe636f5b07 100644
>> --- a/mm/page_alloc.c
>> +++ b/mm/page_alloc.c
>> @@ -1293,6 +1293,9 @@ void __pgalloc_tag_add(struct page *page, struct
>> task_struct *task,
>>                   alloc_tag_add(&ref, task->alloc_tag, PAGE_SIZE * nr);
>>                   update_page_tag_ref(handle, &ref);
>>                   put_page_tag_ref(handle);
>> +       } else {
>> +               pr_warn("__pgalloc_tag_add: get_page_tag_ref failed!
>> page=%p pfn=%lu nr=%u\n", page, page_to_pfn(page), nr);
>> +               dump_stack();
>>           }
>>    }
>>
>>
>> And I caught the following logs:
>>
>> [    0.296399] __pgalloc_tag_add: get_page_tag_ref failed!
>> page=ffffea000400c700 pfn=1049372 nr=1
>> [    0.296400] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted
>> 7.0.0-rc4-dirty #12 PREEMPT(lazy)
>> [    0.296402] Hardware name: Red Hat KVM, BIOS
>> rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
>> [    0.296402] Call Trace:
>> [    0.296403]  <TASK>
>> [    0.296403]  dump_stack_lvl+0x53/0x70
>> [    0.296405]  __pgalloc_tag_add+0x3a3/0x6e0
>> [    0.296406]  ? __pfx___pgalloc_tag_add+0x10/0x10
>> [    0.296407]  ? kasan_unpoison+0x27/0x60
>> [    0.296409]  ? __kasan_unpoison_pages+0x2c/0x40
>> [    0.296411]  get_page_from_freelist+0xa54/0x1310
>> [    0.296413]  __alloc_frozen_pages_noprof+0x206/0x4c0
>> [    0.296415]  ? __pfx___alloc_frozen_pages_noprof+0x10/0x10
>> [    0.296417]  ? stack_depot_save_flags+0x3f/0x680
>> [    0.296418]  ? ___slab_alloc+0x518/0x530
>> [    0.296420]  alloc_pages_mpol+0x13a/0x3f0
>> [    0.296421]  ? __pfx_alloc_pages_mpol+0x10/0x10
>> [    0.296423]  ? _raw_spin_lock_irqsave+0x8a/0xf0
>> [    0.296424]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
>> [    0.296426]  alloc_slab_page+0xc2/0x130
>> [    0.296427]  allocate_slab+0x77/0x2c0
>> [    0.296429]  ? syscall_enter_define_fields+0x3bb/0x5f0
>> [    0.296430]  ___slab_alloc+0x125/0x530
>> [    0.296432]  ? __trace_define_field+0x252/0x3d0
>> [    0.296433]  __kmalloc_noprof+0x329/0x630
>> [    0.296435]  ? syscall_enter_define_fields+0x3bb/0x5f0
>> [    0.296436]  syscall_enter_define_fields+0x3bb/0x5f0
>> [    0.296438]  ? __pfx_syscall_enter_define_fields+0x10/0x10
>> [    0.296440]  event_define_fields+0x326/0x540
>> [    0.296441]  __trace_early_add_events+0xac/0x3c0
>> [    0.296443]  trace_event_init+0x24c/0x460
>> [    0.296445]  trace_init+0x9/0x20
>> [    0.296446]  start_kernel+0x199/0x3c0
>> [    0.296448]  x86_64_start_reservations+0x18/0x30
>> [    0.296449]  x86_64_start_kernel+0xe2/0xf0
>> [    0.296451]  common_startup_64+0x13e/0x141
>> [    0.296453]  </TASK>
>>
>>
>> [    0.312234] __pgalloc_tag_add: get_page_tag_ref failed!
>> page=ffffea000400f900 pfn=1049572 nr=1
>> [    0.312234] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted
>> 7.0.0-rc4-dirty #12 PREEMPT(lazy)
>> [    0.312236] Hardware name: Red Hat KVM, BIOS
>> rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
>> [    0.312236] Call Trace:
>> [    0.312237]  <TASK>
>> [    0.312237]  dump_stack_lvl+0x53/0x70
>> [    0.312239]  __pgalloc_tag_add+0x3a3/0x6e0
>> [    0.312240]  ? __pfx___pgalloc_tag_add+0x10/0x10
>> [    0.312241]  ? rmqueue.constprop.0+0x4fc/0x1ce0
>> [    0.312243]  ? kasan_unpoison+0x27/0x60
>> [    0.312244]  ? __kasan_unpoison_pages+0x2c/0x40
>> [    0.312246]  get_page_from_freelist+0xa54/0x1310
>> [    0.312248]  __alloc_frozen_pages_noprof+0x206/0x4c0
>> [    0.312250]  ? __pfx___alloc_frozen_pages_noprof+0x10/0x10
>> [    0.312253]  alloc_slab_page+0x39/0x130
>> [    0.312254]  allocate_slab+0x77/0x2c0
>> [    0.312255]  ? alloc_cpumask_var_node+0xc7/0x230
>> [    0.312257]  ___slab_alloc+0x46d/0x530
>> [    0.312259]  __kmalloc_node_noprof+0x2fa/0x680
>> [    0.312261]  ? alloc_cpumask_var_node+0xc7/0x230
>> [    0.312263]  alloc_cpumask_var_node+0xc7/0x230
>> [    0.312264]  init_desc+0x141/0x6b0
>> [    0.312266]  alloc_desc+0x108/0x1b0
>> [    0.312267]  early_irq_init+0xee/0x1c0
>> [    0.312268]  ? __pfx_early_irq_init+0x10/0x10
>> [    0.312271]  start_kernel+0x1ab/0x3c0
>> [    0.312272]  x86_64_start_reservations+0x18/0x30
>> [    0.312274]  x86_64_start_kernel+0xe2/0xf0
>> [    0.312275]  common_startup_64+0x13e/0x141
>> [    0.312277]  </TASK>
>>
>> [    0.312834] __pgalloc_tag_add: get_page_tag_ref failed!
>> page=ffffea000400fc00 pfn=1049584 nr=1
>> [    0.312835] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted
>> 7.0.0-rc4-dirty #12 PREEMPT(lazy)
>> [    0.312836] Hardware name: Red Hat KVM, BIOS
>> rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
>> [    0.312837] Call Trace:
>> [    0.312837]  <TASK>
>> [    0.312838]  dump_stack_lvl+0x53/0x70
>> [    0.312840]  __pgalloc_tag_add+0x3a3/0x6e0
>> [    0.312841]  ? __pfx___pgalloc_tag_add+0x10/0x10
>> [    0.312842]  ? rmqueue.constprop.0+0x4fc/0x1ce0
>> [    0.312844]  ? kasan_unpoison+0x27/0x60
>> [    0.312845]  ? __kasan_unpoison_pages+0x2c/0x40
>> [    0.312847]  get_page_from_freelist+0xa54/0x1310
>> [    0.312849]  __alloc_frozen_pages_noprof+0x206/0x4c0
>> [    0.312851]  ? __pfx___alloc_frozen_pages_noprof+0x10/0x10
>> [    0.312853]  alloc_pages_mpol+0x13a/0x3f0
>> [    0.312855]  ? __pfx_alloc_pages_mpol+0x10/0x10
>> [    0.312856]  ? xas_find+0x2d8/0x450
>> [    0.312858]  ? _raw_spin_lock+0x84/0xe0
>> [    0.312859]  ? __pfx__raw_spin_lock+0x10/0x10
>> [    0.312861]  alloc_pages_noprof+0xf6/0x2b0
>> [    0.312862]  __change_page_attr+0x293/0x850
>> [    0.312864]  ? __pfx___change_page_attr+0x10/0x10
>> [    0.312865]  ? _vm_unmap_aliases+0x2d0/0x650
>> [    0.312868]  ? __pfx__vm_unmap_aliases+0x10/0x10
>> [    0.312869]  __change_page_attr_set_clr+0x16c/0x360
>> [    0.312871]  ? spp_getpage+0xbb/0x1e0
>> [    0.312872]  change_page_attr_set_clr+0x220/0x3c0
>> [    0.312873]  ? flush_tlb_one_kernel+0xf/0x30
>> [    0.312875]  ? set_pte_vaddr_p4d+0x110/0x180
>> [    0.312877]  ? __pfx_change_page_attr_set_clr+0x10/0x10
>> [    0.312878]  ? __pfx_set_pte_vaddr_p4d+0x10/0x10
>> [    0.312881]  ? __pfx_mtree_load+0x10/0x10
>> [    0.312883]  ? __pfx_mtree_load+0x10/0x10
>> [    0.312884]  ? __asan_memcpy+0x3c/0x60
>> [    0.312886]  ? set_intr_gate+0x10c/0x150
>> [    0.312888]  set_memory_ro+0x76/0xa0
>> [    0.312889]  ? __pfx_set_memory_ro+0x10/0x10
>> [    0.312891]  idt_setup_apic_and_irq_gates+0x2c1/0x390
>>
>> and more.
> Ok, it's not the only place. Got your point.
>
>> off topic -  if we were to handle only alloc_page_ext() specifically,
>> what would be the most straightforward
>>
>> solution in your mind? I'd really appreciate your insight.
> I was thinking if it's the only special case maybe we can handle it
> somehow differently, like we do when we allocate obj_ext vectors for
> slabs using __GFP_NO_OBJ_EXT. I haven't found a good solution yet but
> since it's not a special case we would not be able to use it even if I
> came up with something...
> I think your way is the most straight-forward but please try my
> suggestion to see if we can avoid extra overhead.
> Thanks,
> Suren.

Hi Suren

Thank you for your feedback. After re-examining this issue,

I realize my previous focus was misplaced.

Upon deeper consideration, I understand that this is not merely a bug,

but rather a warning that indicates a gap in our memory profiling mechanism.

Specifically, the current implementation appears to be missing memory 
allocation

tracking during the period between the buddy system allocation and page_ext

initialization.

This profiling gap means we may not be capturing all relevant memory 
allocation

events during this critical transition phase.

My approach is to dynamically allocate codetag_ref when get_page_tag_ref 
fails,

and maintain a linked list to track all buddy system allocations that 
occur prior to page_ext initialization.

  However, this introduces performance concerns:

1. Free Path Overhead: When freeing these pages, we would need to 
traverse the entire linked list to locate

      the corresponding codetag_ref, resulting in O(n) lookup complexity 
per free operation.

2. Initialization Overhead: During init_page_alloc_tagging, iterating 
through the linked list to assign codetag_ref to

      page_ext would introduce additional traversal cost.

If the number of pages is substantial, this could incur significant 
overhead. What are your thoughts on this? I look forward to your 
suggestions.


Thanks

Hao

>
>> Thanks.
>>
>>
>>>>>> If the slab cache has no free objects, it falls back
>>>>>> to the buddy allocator to allocate memory. However, at this point page_ext
>>>>>> is not yet fully initialized, so these newly allocated pages have no
>>>>>> codetag set. These pages may later be reclaimed by KASAN,which causes
>>>>>> the warning to trigger when they are freed because their codetag ref is
>>>>>> still empty.
>>>>>>
>>>>>> Use a global array to track pages allocated before page_ext is fully
>>>>>> initialized, similar to how kmemleak tracks early allocations.
>>>>>> When page_ext initialization completes, set their codetag
>>>>>> to empty to avoid warnings when they are freed later.
>>>>>>
>>>>>> ...
>>>>>>
>>>>>> --- a/include/linux/alloc_tag.h
>>>>>> +++ b/include/linux/alloc_tag.h
>>>>>> @@ -74,6 +74,9 @@ static inline void set_codetag_empty(union codetag_ref *ref)
>>>>>>
>>>>>>    #ifdef CONFIG_MEM_ALLOC_PROFILING
>>>>>>
>>>>>> +bool mem_profiling_is_available(void);
>>>>>> +void alloc_tag_add_early_pfn(unsigned long pfn);
>>>>>> +
>>>>>>    #define ALLOC_TAG_SECTION_NAME       "alloc_tags"
>>>>>>
>>>>>>    struct codetag_bytes {
>>>>>> diff --git a/lib/alloc_tag.c b/lib/alloc_tag.c
>>>>>> index 58991ab09d84..a5bf4e72c154 100644
>>>>>> --- a/lib/alloc_tag.c
>>>>>> +++ b/lib/alloc_tag.c
>>>>>> @@ -6,6 +6,7 @@
>>>>>>    #include <linux/kallsyms.h>
>>>>>>    #include <linux/module.h>
>>>>>>    #include <linux/page_ext.h>
>>>>>> +#include <linux/pgalloc_tag.h>
>>>>>>    #include <linux/proc_fs.h>
>>>>>>    #include <linux/seq_buf.h>
>>>>>>    #include <linux/seq_file.h>
>>>>>> @@ -26,6 +27,82 @@ static bool mem_profiling_support;
>>>>>>
>>>>>>    static struct codetag_type *alloc_tag_cttype;
>>>>>>
>>>>>> +/*
>>>>>> + * State of the alloc_tag
>>>>>> + *
>>>>>> + * This is used to describe the states of the alloc_tag during bootup.
>>>>>> + *
>>>>>> + * When we need to allocate page_ext to store codetag, we face an
>>>>>> + * initialization timing problem:
>>>>>> + *
>>>>>> + * Due to initialization order, pages may be allocated via buddy system
>>>>>> + * before page_ext is fully allocated and initialized. Although these
>>>>>> + * pages call the allocation hooks, the codetag will not be set because
>>>>>> + * page_ext is not yet available.
>>>>>> + *
>>>>>> + * When these pages are later free to the buddy system, it triggers
>>>>>> + * warnings because their codetag is actually empty if
>>>>>> + * CONFIG_MEM_ALLOC_PROFILING_DEBUG is enabled.
>>>>>> + *
>>>>>> + * Additionally, in this situation, we cannot record detailed allocation
>>>>>> + * information for these pages.
>>>>>> + */
>>>>>> +enum mem_profiling_state {
>>>>>> +     DOWN,                   /* No mem_profiling functionality yet */
>>>>>> +     UP                      /* Everything is working */
>>>>>> +};
>>>>>> +
>>>>>> +static enum mem_profiling_state mem_profiling_state = DOWN;
>>>>>> +
>>>>>> +bool mem_profiling_is_available(void)
>>>>>> +{
>>>>>> +     return mem_profiling_state == UP;
>>>>>> +}
>>>>>> +
>>>>>> +#ifdef CONFIG_MEM_ALLOC_PROFILING_DEBUG
>>>>>> +
>>>>>> +#define EARLY_ALLOC_PFN_MAX          256
>>>>>> +
>>>>>> +static unsigned long early_pfns[EARLY_ALLOC_PFN_MAX];
>>>>> It's unfortunate that this isn't __initdata.
>>>>>
>>>>>> +static unsigned int early_pfn_count;
>>>>>> +static DEFINE_SPINLOCK(early_pfn_lock);
>>>>>> +
>>>>>>
>>>>>> ...
>>>>>>
>>>>>> --- a/mm/page_alloc.c
>>>>>> +++ b/mm/page_alloc.c
>>>>>> @@ -1293,6 +1293,13 @@ void __pgalloc_tag_add(struct page *page, struct task_struct *task,
>>>>>>                 alloc_tag_add(&ref, task->alloc_tag, PAGE_SIZE * nr);
>>>>>>                 update_page_tag_ref(handle, &ref);
>>>>>>                 put_page_tag_ref(handle);
>>>>>> +     } else {
>>>> This branch can be marked as "unlikely".
>>>>
>>>>>> +             /*
>>>>>> +              * page_ext is not available yet, record the pfn so we can
>>>>>> +              * clear the tag ref later when page_ext is initialized.
>>>>>> +              */
>>>>>> +             if (!mem_profiling_is_available())
>>>>>> +                     alloc_tag_add_early_pfn(page_to_pfn(page));
>>>>>>         }
>>>>>>    }
>>>>> All because of this, I believe.  Is this fixable?
>>>>>
>>>>> If we take that `else', we know we're running in __init code, yes?  I
>>>>> don't see how `__init pgalloc_tag_add_early()' could be made to work.
>>>>> hrm.  Something clever, please.
>>>> We can have a pointer to a function that is initialized to point to
>>>> alloc_tag_add_early_pfn, which is defined as __init and uses
>>>> early_pfns which now can be defined as __initdata. After
>>>> clear_early_alloc_pfn_tag_refs() is done we reset that pointer to
>>>> NULL. __pgalloc_tag_add() instead of calling alloc_tag_add_early_pfn()
>>>> directly checks that pointer and if it's not NULL then calls the
>>>> function that it points to. This way __pgalloc_tag_add() which is not
>>>> an __init function will be invoking alloc_tag_add_early_pfn() __init
>>>> function only until we are done with initialization. I haven't tried
>>>> this but I think that should work. This also eliminates the need for
>>>> mem_profiling_state variable since we can use this function pointer
>>>> instead.
>>>>
>>>>


  reply	other threads:[~2026-03-23  9:16 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-03-19  8:31 [PATCH] mm/alloc_tag: clear codetag for pages allocated before page_ext initialization Hao Ge
2026-03-19 22:28 ` Andrew Morton
2026-03-19 23:44   ` Suren Baghdasaryan
2026-03-19 23:48     ` Suren Baghdasaryan
2026-03-20  1:57       ` Hao Ge
2026-03-20  2:14         ` Suren Baghdasaryan
2026-03-23  9:15           ` Hao Ge [this message]
2026-03-23 22:47             ` Suren Baghdasaryan
2026-03-24  9:43               ` Hao Ge
2026-03-25  0:21                 ` Suren Baghdasaryan
2026-03-25  2:07                   ` Hao Ge
2026-03-25  6:25                     ` Suren Baghdasaryan
2026-03-25  7:35                       ` Suren Baghdasaryan
2026-03-25 11:20                         ` Hao Ge
2026-03-25 15:17                           ` Suren Baghdasaryan
2026-03-26  1:44                             ` Hao Ge
2026-03-26  5:04                               ` Suren Baghdasaryan
2026-03-26  5:33                                 ` Hao Ge
2026-03-26  8:23                                   ` Suren Baghdasaryan
2026-03-20  3:14 ` Andrew Morton
2026-03-20  4:18   ` Suren Baghdasaryan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=575e727e-cd47-41df-966a-142425aa8a8b@linux.dev \
    --to=hao.ge@linux.dev \
    --cc=akpm@linux-foundation.org \
    --cc=kent.overstreet@linux.dev \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=surenb@google.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox