From: Minchan Kim <minchan@kernel.org>
To: David Rientjes <rientjes@google.com>
Cc: akpm@linux-foundation.org, linux-mm@kvack.org,
weijie.yang@samsung.com, isimatu.yasuaki@jp.fujitsu.com,
kamezawa.hiroyu@jp.fujitsu.com, mel@csn.ul.ie, mhocko@suse.cz,
mina86@mina86.com, stable@vger.kernel.org
Subject: Re: [patch 1/6] mm: page_isolation: check pfn validity before access
Date: Fri, 19 Dec 2014 02:01:30 +0000 [thread overview]
Message-ID: <20141219020130.GA22412@gmail.com> (raw)
In-Reply-To: <alpine.DEB.2.10.1412171548150.16260@chino.kir.corp.google.com>
On Wed, Dec 17, 2014 at 03:56:08PM -0800, David Rientjes wrote:
> On Mon, 15 Dec 2014, akpm@linux-foundation.org wrote:
>
> > From: Weijie Yang <weijie.yang@samsung.com>
> > Subject: mm: page_isolation: check pfn validity before access
> >
> > In the undo path of start_isolate_page_range(), we need to check the pfn
> > validity before accessing its page, or it will trigger an addressing
> > exception if there is hole in the zone.
> >
> > This issue is found by code-review not a test-trigger. In
> > "CONFIG_HOLES_IN_ZONE" environment, there is a certain chance that it
> > would casue an addressing exception when start_isolate_page_range()
> > fails, this could affect CMA, hugepage and memory-hotplug function.
> >
> > Signed-off-by: Weijie Yang <weijie.yang@samsung.com>
> > Acked-by: Michal Nazarewicz <mina86@mina86.com>
> > Reviewed-by: Yasuaki Ishimatsu <isimatu.yasuaki@jp.fujitsu.com>
> > Cc: KAMEZAWA Hiroyuki <kamezawa.hiroyu@jp.fujitsu.com>
> > Cc: Minchan Kim <minchan@kernel.org>
> > Cc: Mel Gorman <mel@csn.ul.ie>
> > Cc: Michal Hocko <mhocko@suse.cz>
> > Cc: <stable@vger.kernel.org>
> > Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
> > ---
> >
> > mm/page_isolation.c | 7 +++++--
> > 1 file changed, 5 insertions(+), 2 deletions(-)
> >
> > diff -puN mm/page_isolation.c~mm-page_isolation-check-pfn-validity-before-access mm/page_isolation.c
> > --- a/mm/page_isolation.c~mm-page_isolation-check-pfn-validity-before-access
> > +++ a/mm/page_isolation.c
> > @@ -176,8 +176,11 @@ int start_isolate_page_range(unsigned lo
> > undo:
> > for (pfn = start_pfn;
> > pfn < undo_pfn;
> > - pfn += pageblock_nr_pages)
> > - unset_migratetype_isolate(pfn_to_page(pfn), migratetype);
> > + pfn += pageblock_nr_pages) {
> > + page = __first_valid_page(pfn, pageblock_nr_pages);
> > + if (page)
> > + unset_migratetype_isolate(page, migratetype);
> > + }
> >
> > return -EBUSY;
> > }
>
> This is such an interesting patch because of who acked it and the two
> callers of the function that seem to want different behavior.
>
> The behavior of start_isolate_page_range() is currently to either set the
> migratetype of the pageblocks to MIGRATE_ISOLATE or allow the pageblocks
> to have no valid pages due to a memory hole.
>
> The memory hotplug usecase makes perfect sense since it's entirely
> legitimate to offline memory holes and we would not want to return -EBUSY,
> but that doesn't seem to be what the implementation of
> start_isolate_page_range() is this undo behavior expects pfn_to_page(pfn)
> to be valid up to undo_pfn.
>
> I'm not a CMA expert, but I'm surprised that we want to return success
> here if some pageblocks are actually memory holes. Don't we want to
> return -EBUSY for such a range? That seems to be more in line with the
> comment for start_isolate_page_range() which specifies it returns "-EBUSY
> if any part of range cannot be isolated", which would seem to imply memory
> holes as well, but that doesn't match its implementation.
Can CMA have memory hole?
CMA user should allocate CMA area with cma_declare_contiguous which uses
memblock. I'm not familiar with memblock but I don't think it's possible.
>
> So there's two radically different expectations for this function with
> regard to invalid pfns. Which one do we want?
>
> If we want it to simply disregard memory holes (memory hotplug), then ack
> the patch with a follow-up to fix the comment. If we want it to undo on
> memory holes (CMA), then nack the patch since its current implementation
> is correct and we need to fix memory hotplug.
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
prev parent reply other threads:[~2014-12-19 2:00 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-12-15 23:03 [patch 1/6] mm: page_isolation: check pfn validity before access akpm
2014-12-17 23:56 ` David Rientjes
2014-12-19 2:01 ` Minchan Kim [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20141219020130.GA22412@gmail.com \
--to=minchan@kernel.org \
--cc=akpm@linux-foundation.org \
--cc=isimatu.yasuaki@jp.fujitsu.com \
--cc=kamezawa.hiroyu@jp.fujitsu.com \
--cc=linux-mm@kvack.org \
--cc=mel@csn.ul.ie \
--cc=mhocko@suse.cz \
--cc=mina86@mina86.com \
--cc=rientjes@google.com \
--cc=stable@vger.kernel.org \
--cc=weijie.yang@samsung.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.