From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-14.6 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, NICE_REPLY_A,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED, USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5D34AC43461 for ; Wed, 9 Sep 2020 06:56:39 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id E95F721741 for ; Wed, 9 Sep 2020 06:56:38 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=ibm.com header.i=@ibm.com header.b="dpMxrd2Y" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org E95F721741 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.ibm.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 1A7F46B0062; Wed, 9 Sep 2020 02:56:37 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 133016B006C; Wed, 9 Sep 2020 02:56:37 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id F14A46B006E; Wed, 9 Sep 2020 02:56:36 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0211.hostedemail.com [216.40.44.211]) by kanga.kvack.org (Postfix) with ESMTP id D52336B0062 for ; Wed, 9 Sep 2020 02:56:36 -0400 (EDT) Received: from smtpin02.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id 943911EF1 for ; Wed, 9 Sep 2020 06:56:36 +0000 (UTC) X-FDA: 77242614792.02.cable47_4f04e93270db Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin02.hostedemail.com (Postfix) with ESMTP id 6B1D81009739D for ; Wed, 9 Sep 2020 06:56:36 +0000 (UTC) X-HE-Tag: cable47_4f04e93270db X-Filterd-Recvd-Size: 12202 Received: from mx0a-001b2d01.pphosted.com (mx0b-001b2d01.pphosted.com [148.163.158.5]) by imf15.hostedemail.com (Postfix) with ESMTP for ; Wed, 9 Sep 2020 06:56:35 +0000 (UTC) Received: from pps.filterd (m0098416.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 0896V3VZ106918; Wed, 9 Sep 2020 02:56:33 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=pp1; bh=tbKBbnn3qpLB6TB/86tvLctaym8MOYwM8jf/RCiSwyk=; b=dpMxrd2YQQRb615QTJwirx9ILJ8R5Pgnbrd4JlvllWV+wN6yvbxmQvrYi8llvb0W685Y MzC4d4c65nMAZB01EyvWWsfB+AAuiMmicaj7MkCLw+bVcFJ8qDPjPdjtVamcElnEFdxu o57+OcJoE5tzyD6DoqVSIZ72q7Jfocv4cOIlic6tr5GfdKG9vrYaj5ECKwZQJU/vWnwM 7yyq/rbWy3x/bBU4E1NHRJJFp9RXoEDmtJlyCwxW/0YACFViOnTg55ZMe9pQS/383r7n b7tLfGPOSe+asbKPrvFeg+d9D8g+CKnugWSnm4N9ooK+eo1w0eaAKCAVMoXzHzN3I06O Wg== Received: from pps.reinject (localhost [127.0.0.1]) by mx0b-001b2d01.pphosted.com with ESMTP id 33estq0u2q-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 09 Sep 2020 02:56:32 -0400 Received: from m0098416.ppops.net (m0098416.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.36/8.16.0.36) with SMTP id 0896q7Wx168923; Wed, 9 Sep 2020 02:56:32 -0400 Received: from ppma01fra.de.ibm.com (46.49.7a9f.ip4.static.sl-reverse.com [159.122.73.70]) by mx0b-001b2d01.pphosted.com with ESMTP id 33estq0u22-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 09 Sep 2020 02:56:32 -0400 Received: from pps.filterd (ppma01fra.de.ibm.com [127.0.0.1]) by ppma01fra.de.ibm.com (8.16.0.42/8.16.0.42) with SMTP id 0896qJus002651; Wed, 9 Sep 2020 06:56:30 GMT Received: from b06cxnps4076.portsmouth.uk.ibm.com (d06relay13.portsmouth.uk.ibm.com [9.149.109.198]) by ppma01fra.de.ibm.com with ESMTP id 33c2a80f61-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 09 Sep 2020 06:56:30 +0000 Received: from d06av22.portsmouth.uk.ibm.com (d06av22.portsmouth.uk.ibm.com [9.149.105.58]) by b06cxnps4076.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 0896uR2315466906 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 9 Sep 2020 06:56:27 GMT Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id A83864C04E; Wed, 9 Sep 2020 06:56:27 +0000 (GMT) Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 11A1E4C040; Wed, 9 Sep 2020 06:56:27 +0000 (GMT) Received: from pomme.local (unknown [9.145.19.60]) by d06av22.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 9 Sep 2020 06:56:26 +0000 (GMT) Subject: Re: [PATCH] mm: don't rely on system state to detect hot-plug operations To: Greg Kroah-Hartman Cc: akpm@linux-foundation.org, david@redhat.com, salvador@suse.de, rafael@kernel.org, nathanl@linux.ibm.com, mhocko@kernel.org, cheloha@linux.ibm.com, stable@vger.kernel.org, Linux-MM References: <5cbd92e1-c00a-4253-0119-c872bfa0f2bc@redhat.com> <20200908170835.85440-1-ldufour@linux.ibm.com> <20200908173113.GB218801@kroah.com> From: Laurent Dufour Message-ID: Date: Wed, 9 Sep 2020 08:56:26 +0200 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.12.0 MIME-Version: 1.0 In-Reply-To: <20200908173113.GB218801@kroah.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US X-TM-AS-GCONF: 00 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.235,18.0.687 definitions=2020-09-09_03:2020-09-08,2020-09-09 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxlogscore=999 priorityscore=1501 malwarescore=0 impostorscore=0 adultscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 suspectscore=0 phishscore=0 bulkscore=0 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2006250000 definitions=main-2009090056 X-Rspamd-Queue-Id: 6B1D81009739D X-Spamd-Result: default: False [0.00 / 100.00] X-Rspamd-Server: rspam03 Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Le 08/09/2020 =C3=A0 19:31, Greg Kroah-Hartman a =C3=A9crit=C2=A0: > On Tue, Sep 08, 2020 at 07:08:35PM +0200, Laurent Dufour wrote: >> In register_mem_sect_under_node() the system_state=E2=80=99s value is = checked to >> detect whether the operation the call is made during boot time or duri= ng an >> hot-plug operation. Unfortunately, that check is wrong on some >> architecture, and may lead to sections being registered under multiple >> nodes if node's memory ranges are interleaved. >> >> This can be seen on PowerPC LPAR after multiple memory hot-plug and >> hot-unplug operations are done. At the next reboot the node's memory r= anges >> can be interleaved and since the call to link_mem_sections() is made i= n >> topology_init() while the system is in the SYSTEM_SCHEDULING state, th= e >> node's id is not checked, and the sections registered multiple times. = In >> that case, the system is able to boot but later hot-plug operation may= lead >> to this panic because the node's links are correctly broken: >> >> ------------[ cut here ]------------ >> kernel BUG at /Users/laurent/src/linux-ppc/mm/memory_hotplug.c:1084! >> Oops: Exception in kernel mode, sig: 5 [#1] >> LE PAGE_SIZE=3D64K MMU=3DHash SMP NR_CPUS=3D2048 NUMA pSeries >> Modules linked in: rpadlpar_io rpaphp pseries_rng rng_core vmx_crypto = gf128mul binfmt_misc ip_tables x_tables xfs libcrc32c crc32c_vpmsum autof= s4 >> CPU: 8 PID: 10256 Comm: drmgr Not tainted 5.9.0-rc1+ #25 >> NIP: c000000000403f34 LR: c000000000403f2c CTR: 0000000000000000 >> REGS: c0000004876e3660 TRAP: 0700 Not tainted (5.9.0-rc1+) >> MSR: 800000000282b033 CR: 24000448= XER: 20040000 >> CFAR: c000000000846d20 IRQMASK: 0 >> GPR00: c000000000403f2c c0000004876e38f0 c0000000012f6f00 ffffffffffff= ffef >> GPR04: 0000000000000227 c0000004805ae680 0000000000000000 00000004886f= 0000 >> GPR08: 0000000000000226 0000000000000003 0000000000000002 ffffffffffff= fffd >> GPR12: 0000000088000484 c00000001ec96280 0000000000000000 000000000000= 0000 >> GPR16: 0000000000000000 0000000000000000 0000000000000004 000000000000= 0003 >> GPR20: c00000047814ffe0 c0000007ffff7c08 0000000000000010 c00000000133= 32c8 >> GPR24: 0000000000000000 c0000000011f6cc0 0000000000000000 000000000000= 0000 >> GPR28: ffffffffffffffef 0000000000000001 0000000150000000 000000001000= 0000 >> NIP [c000000000403f34] add_memory_resource+0x244/0x340 >> LR [c000000000403f2c] add_memory_resource+0x23c/0x340 >> Call Trace: >> [c0000004876e38f0] [c000000000403f2c] add_memory_resource+0x23c/0x340 = (unreliable) >> [c0000004876e39c0] [c00000000040408c] __add_memory+0x5c/0xf0 >> [c0000004876e39f0] [c0000000000e2b94] dlpar_add_lmb+0x1b4/0x500 >> [c0000004876e3ad0] [c0000000000e3888] dlpar_memory+0x1f8/0xb80 >> [c0000004876e3b60] [c0000000000dc0d0] handle_dlpar_errorlog+0xc0/0x190 >> [c0000004876e3bd0] [c0000000000dc398] dlpar_store+0x198/0x4a0 >> [c0000004876e3c90] [c00000000072e630] kobj_attr_store+0x30/0x50 >> [c0000004876e3cb0] [c00000000051f954] sysfs_kf_write+0x64/0x90 >> [c0000004876e3cd0] [c00000000051ee40] kernfs_fop_write+0x1b0/0x290 >> [c0000004876e3d20] [c000000000438dd8] vfs_write+0xe8/0x290 >> [c0000004876e3d70] [c0000000004391ac] ksys_write+0xdc/0x130 >> [c0000004876e3dc0] [c000000000034e40] system_call_exception+0x160/0x27= 0 >> [c0000004876e3e20] [c00000000000d740] system_call_common+0xf0/0x27c >> Instruction dump: >> 48442e35 60000000 0b030000 3cbe0001 7fa3eb78 7bc48402 38a5fffe 7ca5fa1= 4 >> 78a58402 48442db1 60000000 7c7c1b78 <0b030000> 7f23cb78 4bda371d 60000= 000 >> ---[ end trace 562fd6c109cd0fb2 ]--- >> >> This patch addresses the root cause by not relying on the system_state >> value to detect whether the call is due to a hot-plug operation or not= . An >> additional parameter is added to link_mem_sections() to tell the conte= xt of >> the call and this parameter is propagated to register_mem_sect_under_n= ode() >> throuugh the walk_memory_blocks()'s call. >> >> Fixes: 4fbce633910e ("mm/memory_hotplug.c: make register_mem_sect_unde= r_node() a callback of walk_memory_range()") >> Signed-off-by: Laurent Dufour >> Cc: stable@vger.kernel.org >> Cc: Greg Kroah-Hartman >> Cc: "Rafael J. Wysocki" >> Cc: Andrew Morton >> --- >> drivers/base/node.c | 20 +++++++++++++++----- >> include/linux/node.h | 6 +++--- >> mm/memory_hotplug.c | 3 ++- >> 3 files changed, 20 insertions(+), 9 deletions(-) >> >> diff --git a/drivers/base/node.c b/drivers/base/node.c >> index 508b80f6329b..27f828eeb531 100644 >> --- a/drivers/base/node.c >> +++ b/drivers/base/node.c >> @@ -762,14 +762,19 @@ static int __ref get_nid_for_pfn(unsigned long p= fn) >> } >> =20 >> /* register memory section under specified node if it spans that nod= e */ >> +struct rmsun_args { >> + int nid; >> + bool hotadd; >> +}; >> static int register_mem_sect_under_node(struct memory_block *mem_blk= , >> - void *arg) >> + void *args) >> { >> unsigned long memory_block_pfns =3D memory_block_size_bytes() / PAG= E_SIZE; >> unsigned long start_pfn =3D section_nr_to_pfn(mem_blk->start_sectio= n_nr); >> unsigned long end_pfn =3D start_pfn + memory_block_pfns - 1; >> - int ret, nid =3D *(int *)arg; >> + int ret, nid =3D ((struct rmsun_args *)args)->nid; >> unsigned long pfn; >> + bool hotadd =3D ((struct rmsun_args *)args)->hotadd; >> =20 >> for (pfn =3D start_pfn; pfn <=3D end_pfn; pfn++) { >> int page_nid; >> @@ -789,7 +794,7 @@ static int register_mem_sect_under_node(struct mem= ory_block *mem_blk, >> * case, during hotplug we know that all pages in the memory >> * block belong to the same node. >> */ >> - if (system_state =3D=3D SYSTEM_BOOTING) { >> + if (!hotadd) { >> page_nid =3D get_nid_for_pfn(pfn); >> if (page_nid < 0) >> continue; >> @@ -832,10 +837,15 @@ void unregister_memory_block_under_nodes(struct = memory_block *mem_blk) >> kobject_name(&node_devices[mem_blk->nid]->dev.kobj)); >> } >> =20 >> -int link_mem_sections(int nid, unsigned long start_pfn, unsigned long= end_pfn) >> +int link_mem_sections(int nid, unsigned long start_pfn, unsigned long= end_pfn, >> + bool hotadd) >> { >> + struct rmsun_args args; >> + >> + args.nid =3D nid; >> + args.hotadd =3D hotadd; >> return walk_memory_blocks(PFN_PHYS(start_pfn), >> - PFN_PHYS(end_pfn - start_pfn), (void *)&nid, >> + PFN_PHYS(end_pfn - start_pfn), (void *)&args, >> register_mem_sect_under_node); >> } >> =20 >> diff --git a/include/linux/node.h b/include/linux/node.h >> index 4866f32a02d8..6df9a4548650 100644 >> --- a/include/linux/node.h >> +++ b/include/linux/node.h >> @@ -100,10 +100,10 @@ typedef void (*node_registration_func_t)(struct= node *); >> =20 >> #if defined(CONFIG_MEMORY_HOTPLUG_SPARSE) && defined(CONFIG_NUMA) >> extern int link_mem_sections(int nid, unsigned long start_pfn, >> - unsigned long end_pfn); >> + unsigned long end_pfn, bool hotadd); >> #else >> static inline int link_mem_sections(int nid, unsigned long start_pfn= , >> - unsigned long end_pfn) >> + unsigned long end_pfn, bool hotadd) >=20 > Adding a random boolean flag to a function is a horrible way to do > anything. >=20 > Now you need to look up what that flag means every time you run across = a > caller, breaking your reading of what is happening. >=20 > Make this two different functions please, that describe what they do, > and have them call a common "helper function" that does the work with > the flag if you really want to do this type of thing. >=20 > link_mem_sections() and link_mem_sections_hotadd()? >=20 > But not this way, please no. Thanks Greg for commenting on this. I agree, this is too opaque. Cheers, Laurent.