linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: David Rientjes <rientjes@google.com>
To: akpm@linux-foundation.org
Cc: linux-mm@kvack.org, weijie.yang@samsung.com,
	isimatu.yasuaki@jp.fujitsu.com, kamezawa.hiroyu@jp.fujitsu.com,
	mel@csn.ul.ie, mhocko@suse.cz, mina86@mina86.com,
	minchan@kernel.org, stable@vger.kernel.org
Subject: Re: [patch 1/6] mm: page_isolation: check pfn validity before access
Date: Wed, 17 Dec 2014 15:56:08 -0800 (PST)	[thread overview]
Message-ID: <alpine.DEB.2.10.1412171548150.16260@chino.kir.corp.google.com> (raw)
In-Reply-To: <548f68b2.K9HkeqWVHZ6daibm%akpm@linux-foundation.org>

On Mon, 15 Dec 2014, akpm@linux-foundation.org wrote:

> From: Weijie Yang <weijie.yang@samsung.com>
> Subject: mm: page_isolation: check pfn validity before access
> 
> In the undo path of start_isolate_page_range(), we need to check the pfn
> validity before accessing its page, or it will trigger an addressing
> exception if there is hole in the zone.
> 
> This issue is found by code-review not a test-trigger.  In
> "CONFIG_HOLES_IN_ZONE" environment, there is a certain chance that it
> would casue an addressing exception when start_isolate_page_range()
> fails, this could affect CMA, hugepage and memory-hotplug function.
> 
> Signed-off-by: Weijie Yang <weijie.yang@samsung.com>
> Acked-by: Michal Nazarewicz <mina86@mina86.com>
> Reviewed-by: Yasuaki Ishimatsu <isimatu.yasuaki@jp.fujitsu.com>
> Cc: KAMEZAWA Hiroyuki <kamezawa.hiroyu@jp.fujitsu.com>
> Cc: Minchan Kim <minchan@kernel.org>
> Cc: Mel Gorman <mel@csn.ul.ie>
> Cc: Michal Hocko <mhocko@suse.cz>
> Cc: <stable@vger.kernel.org>
> Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
> ---
> 
>  mm/page_isolation.c |    7 +++++--
>  1 file changed, 5 insertions(+), 2 deletions(-)
> 
> diff -puN mm/page_isolation.c~mm-page_isolation-check-pfn-validity-before-access mm/page_isolation.c
> --- a/mm/page_isolation.c~mm-page_isolation-check-pfn-validity-before-access
> +++ a/mm/page_isolation.c
> @@ -176,8 +176,11 @@ int start_isolate_page_range(unsigned lo
>  undo:
>  	for (pfn = start_pfn;
>  	     pfn < undo_pfn;
> -	     pfn += pageblock_nr_pages)
> -		unset_migratetype_isolate(pfn_to_page(pfn), migratetype);
> +	     pfn += pageblock_nr_pages) {
> +		page = __first_valid_page(pfn, pageblock_nr_pages);
> +		if (page)
> +			unset_migratetype_isolate(page, migratetype);
> +	}
>  
>  	return -EBUSY;
>  }

This is such an interesting patch because of who acked it and the two 
callers of the function that seem to want different behavior.

The behavior of start_isolate_page_range() is currently to either set the 
migratetype of the pageblocks to MIGRATE_ISOLATE or allow the pageblocks 
to have no valid pages due to a memory hole.

The memory hotplug usecase makes perfect sense since it's entirely 
legitimate to offline memory holes and we would not want to return -EBUSY, 
but that doesn't seem to be what the implementation of 
start_isolate_page_range() is this undo behavior expects pfn_to_page(pfn) 
to be valid up to undo_pfn.

I'm not a CMA expert, but I'm surprised that we want to return success 
here if some pageblocks are actually memory holes.  Don't we want to 
return -EBUSY for such a range?  That seems to be more in line with the 
comment for start_isolate_page_range() which specifies it returns "-EBUSY 
if any part of range cannot be isolated", which would seem to imply memory 
holes as well, but that doesn't match its implementation.

So there's two radically different expectations for this function with 
regard to invalid pfns.  Which one do we want?

If we want it to simply disregard memory holes (memory hotplug), then ack 
the patch with a follow-up to fix the comment.  If we want it to undo on 
memory holes (CMA), then nack the patch since its current implementation 
is correct and we need to fix memory hotplug.

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

  reply	other threads:[~2014-12-17 23:56 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-12-15 23:03 akpm
2014-12-17 23:56 ` David Rientjes [this message]
2014-12-19  2:01   ` Minchan Kim

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=alpine.DEB.2.10.1412171548150.16260@chino.kir.corp.google.com \
    --to=rientjes@google.com \
    --cc=akpm@linux-foundation.org \
    --cc=isimatu.yasuaki@jp.fujitsu.com \
    --cc=kamezawa.hiroyu@jp.fujitsu.com \
    --cc=linux-mm@kvack.org \
    --cc=mel@csn.ul.ie \
    --cc=mhocko@suse.cz \
    --cc=mina86@mina86.com \
    --cc=minchan@kernel.org \
    --cc=stable@vger.kernel.org \
    --cc=weijie.yang@samsung.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox