linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: Michal Hocko <mhocko@suse.cz>
To: Gavin Shan <shangw@linux.vnet.ibm.com>
Cc: linux-mm@kvack.org, dave@linux.vnet.ibm.com, rientjes@google.com,
	akpm@linux-foundation.org
Subject: Re: [PATCH v3 2/3] mm/sparse: fix possible memory leak
Date: Tue, 3 Jul 2012 14:51:54 +0200	[thread overview]
Message-ID: <20120703125154.GB9470@tiehlicka.suse.cz> (raw)
In-Reply-To: <20120703033823.GA497@shangw>

On Tue 03-07-12 11:38:23, Gavin Shan wrote:
> On Mon, Jul 02, 2012 at 05:46:28PM +0200, Michal Hocko wrote:
> >On Mon 02-07-12 21:40:53, Gavin Shan wrote:
> >> On Mon, Jul 02, 2012 at 11:43:31AM +0200, Michal Hocko wrote:
> >> >On Mon 02-07-12 17:28:56, Gavin Shan wrote:
> >> >> sparse_index_init() is designed to be safe if two copies of it race.  It
> >> >> uses "index_init_lock" to ensure that, even in the case of a race, only
> >> >> one CPU will manage to do:
> >> >> 
> >> >> 	mem_section[root] = section;
> >> >> 
> >> >> However, in the case where two copies of sparse_index_init() _do_ race,
> >> >> the one that loses the race will leak the "section" that
> >> >> sparse_index_alloc() allocated for it.  This patch fixes that leak.
> >> >
> >> >I would still like to hear how we can possibly race in this code path.
> >> >I've thought that memory onlining is done from a single CPU.
> >> >
> >> 
> >> Hi Michael, how about to use the following changelog? :-)
> >> 
> >> -----
> >> 
> >> sparse_index_init() is designed to be safe if two copies of it race.  It
> >> uses "index_init_lock" to ensure that, even in the case of a race, only
> >> one CPU will manage to do:
> >> 
> >> mem_section[root] = section;
> >> 
> >> However, in the case where two copies of sparse_index_init() _do_ race,
> >> which is probablly caused by making online for multiple memory sections
> >> that depend on same entry of array mem_section[] simultaneously from
> >> different CPUs. 
> >
> >And you really think that this clarified the things? You have just
> >tweaked the comment to sound more obscure.
> >
> >OK, so you have pushed me into the code...
> >If you had looked into the hotplug callchain up to add_memory you would
> >have seen that the whole arch_add_memory -> __add_pages -> ... ->
> >sparse_index_init is called with lock_memory_hotplug held so the hotplug
> >cannot run from the multiple CPUs.
> >
> >I do not see any other users apart from  boot time
> >sparse_memory_present_with_active_regions and add_memory so I think that
> >the lock is just a heritage from old days.
> >
> 
> I just had quick go-through on the source code as you suggested and I
> think you're right, Michal. So please drop this :-)
> 
> With CONFIG_ARCH_MEMORY_PROBE enabled on Power machines, following
> functions would be included in hotplug path.

I am not sure why you are mentioning Power arch here, add_memory which
does the locking is arch independent.

> 
> memory_probe_store
> add_memory
> 	lock_memory_hotplug	/* protect the whole hotplug path */
> arch_add_memory
> __add_pages
> __add_section
> sparse_add_one_section
> sparse_index_init
> sparse_index_alloc
> 
> The mutex "mem_hotplug_mutex" will be hold by lock_memory_hotplug() to protect
> the whole hotplug path. 

> However, I'm wandering if we can remove the "index_init_lock" of
> function sparse_index_init() since that sounds duplicate lock.

Heh, that's what I am asking from the very beginning... I do not see any
purpose of the lock but I might be missing something. So make sure you
really understand the locking of this code if you are going to send a
patch to remove the lock.
-- 
Michal Hocko
SUSE Labs
SUSE LINUX s.r.o.
Lihovarska 1060/12
190 00 Praha 9    
Czech Republic

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

  reply	other threads:[~2012-07-03 12:51 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-07-02  9:28 [PATCH v3 1/3] mm/sparse: optimize sparse_index_alloc Gavin Shan
2012-07-02  9:28 ` [PATCH v3 2/3] mm/sparse: fix possible memory leak Gavin Shan
2012-07-02  9:43   ` Michal Hocko
2012-07-02 13:40     ` Gavin Shan
2012-07-02 15:46       ` Michal Hocko
2012-07-03  3:38         ` Gavin Shan
2012-07-03 12:51           ` Michal Hocko [this message]
2012-07-02 11:04   ` David Rientjes
2012-07-02 13:28     ` Gavin Shan
2012-07-02 21:19       ` David Rientjes
2012-07-03  1:19         ` Gavin Shan
2012-07-02  9:28 ` [PATCH v3 3/3] mm/sparse: more check on mem_section number Gavin Shan
2012-07-02 11:05   ` David Rientjes

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20120703125154.GB9470@tiehlicka.suse.cz \
    --to=mhocko@suse.cz \
    --cc=akpm@linux-foundation.org \
    --cc=dave@linux.vnet.ibm.com \
    --cc=linux-mm@kvack.org \
    --cc=rientjes@google.com \
    --cc=shangw@linux.vnet.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox