From: David Rientjes <rientjes@google.com>
To: akpm@linux-foundation.org
Cc: linux-mm@kvack.org, weijie.yang@samsung.com,
isimatu.yasuaki@jp.fujitsu.com, kamezawa.hiroyu@jp.fujitsu.com,
mel@csn.ul.ie, mhocko@suse.cz, mina86@mina86.com,
minchan@kernel.org, stable@vger.kernel.org
Subject: Re: [patch 1/6] mm: page_isolation: check pfn validity before access
Date: Wed, 17 Dec 2014 15:56:08 -0800 (PST) [thread overview]
Message-ID: <alpine.DEB.2.10.1412171548150.16260@chino.kir.corp.google.com> (raw)
In-Reply-To: <548f68b2.K9HkeqWVHZ6daibm%akpm@linux-foundation.org>
On Mon, 15 Dec 2014, akpm@linux-foundation.org wrote:
> From: Weijie Yang <weijie.yang@samsung.com>
> Subject: mm: page_isolation: check pfn validity before access
>
> In the undo path of start_isolate_page_range(), we need to check the pfn
> validity before accessing its page, or it will trigger an addressing
> exception if there is hole in the zone.
>
> This issue is found by code-review not a test-trigger. In
> "CONFIG_HOLES_IN_ZONE" environment, there is a certain chance that it
> would casue an addressing exception when start_isolate_page_range()
> fails, this could affect CMA, hugepage and memory-hotplug function.
>
> Signed-off-by: Weijie Yang <weijie.yang@samsung.com>
> Acked-by: Michal Nazarewicz <mina86@mina86.com>
> Reviewed-by: Yasuaki Ishimatsu <isimatu.yasuaki@jp.fujitsu.com>
> Cc: KAMEZAWA Hiroyuki <kamezawa.hiroyu@jp.fujitsu.com>
> Cc: Minchan Kim <minchan@kernel.org>
> Cc: Mel Gorman <mel@csn.ul.ie>
> Cc: Michal Hocko <mhocko@suse.cz>
> Cc: <stable@vger.kernel.org>
> Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
> ---
>
> mm/page_isolation.c | 7 +++++--
> 1 file changed, 5 insertions(+), 2 deletions(-)
>
> diff -puN mm/page_isolation.c~mm-page_isolation-check-pfn-validity-before-access mm/page_isolation.c
> --- a/mm/page_isolation.c~mm-page_isolation-check-pfn-validity-before-access
> +++ a/mm/page_isolation.c
> @@ -176,8 +176,11 @@ int start_isolate_page_range(unsigned lo
> undo:
> for (pfn = start_pfn;
> pfn < undo_pfn;
> - pfn += pageblock_nr_pages)
> - unset_migratetype_isolate(pfn_to_page(pfn), migratetype);
> + pfn += pageblock_nr_pages) {
> + page = __first_valid_page(pfn, pageblock_nr_pages);
> + if (page)
> + unset_migratetype_isolate(page, migratetype);
> + }
>
> return -EBUSY;
> }
This is such an interesting patch because of who acked it and the two
callers of the function that seem to want different behavior.
The behavior of start_isolate_page_range() is currently to either set the
migratetype of the pageblocks to MIGRATE_ISOLATE or allow the pageblocks
to have no valid pages due to a memory hole.
The memory hotplug usecase makes perfect sense since it's entirely
legitimate to offline memory holes and we would not want to return -EBUSY,
but that doesn't seem to be what the implementation of
start_isolate_page_range() is this undo behavior expects pfn_to_page(pfn)
to be valid up to undo_pfn.
I'm not a CMA expert, but I'm surprised that we want to return success
here if some pageblocks are actually memory holes. Don't we want to
return -EBUSY for such a range? That seems to be more in line with the
comment for start_isolate_page_range() which specifies it returns "-EBUSY
if any part of range cannot be isolated", which would seem to imply memory
holes as well, but that doesn't match its implementation.
So there's two radically different expectations for this function with
regard to invalid pfns. Which one do we want?
If we want it to simply disregard memory holes (memory hotplug), then ack
the patch with a follow-up to fix the comment. If we want it to undo on
memory holes (CMA), then nack the patch since its current implementation
is correct and we need to fix memory hotplug.
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
next prev parent reply other threads:[~2014-12-17 23:56 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-12-15 23:03 akpm
2014-12-17 23:56 ` David Rientjes [this message]
2014-12-19 2:01 ` Minchan Kim
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=alpine.DEB.2.10.1412171548150.16260@chino.kir.corp.google.com \
--to=rientjes@google.com \
--cc=akpm@linux-foundation.org \
--cc=isimatu.yasuaki@jp.fujitsu.com \
--cc=kamezawa.hiroyu@jp.fujitsu.com \
--cc=linux-mm@kvack.org \
--cc=mel@csn.ul.ie \
--cc=mhocko@suse.cz \
--cc=mina86@mina86.com \
--cc=minchan@kernel.org \
--cc=stable@vger.kernel.org \
--cc=weijie.yang@samsung.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox