From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752486Ab3KNHbg (ORCPT ); Thu, 14 Nov 2013 02:31:36 -0500 Received: from intranet.asianux.com ([58.214.24.6]:44168 "EHLO intranet.asianux.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751719Ab3KNHbe (ORCPT ); Thu, 14 Nov 2013 02:31:34 -0500 X-Spam-Score: -100.8 Message-ID: <52847CD5.1030105@asianux.com> Date: Thu, 14 Nov 2013 15:33:41 +0800 From: Chen Gang User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130110 Thunderbird/17.0.2 MIME-Version: 1.0 To: Hugh Dickins CC: Jeff Dike , Richard Weinberger , Andrew Morton , linux-kernel@vger.kernel.org, linux-mm@kvack.org, uml-devel , uml-user Subject: Re: [PATCH] arch: um: kernel: skas: mmu: remove pmd_free() and pud_free() for failure processing in init_stub_pte() References: <528308E8.8040203@asianux.com> <52847237.5030405@asianux.com> In-Reply-To: <52847237.5030405@asianux.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/14/2013 02:48 PM, Chen Gang wrote: >> >From the look of it, if an error did occur in init_stub_pte(), >> > then the special mapping of STUB_CODE and STUB_DATA would not >> > be installed, so this area would be invisible to munmap and exit, >> > and with your patch then the pages allocated likely to be leaked. >> > > It sounds reasonable to me: "although 'pgd' related with 'mm', but they > are not installed". But just like you said originally: "better get ACK > from some mm guys". > > > Hmm... is it another issue: "after STUB_CODE succeeds, but STUB_DATA > fails, the STUB_CODE will be leaked". > > >> > Which is not to say that the existing code is actually correct: >> > you're probably right that it's technically wrong. But it would >> > be very hard to get init_stub_pte() to fail, and has anyone >> > reported a problem with it? My guess is not, and my own >> > inclination to dabble here is zero. >> > > Yeah. > If we can not get ACK from any mm guys, and we have no enough time resource to read related source code, for me, I still recommend to remove p?d_free() in failure processing. In the worst cases, we will leak a little memory, and no any other negative effect, it is an executable way which is no any risks. For current mm implementation, it seems we can not assume any thing, although they sounds (or should be) reasonable (include what you said about mm). Thanks. -- Chen Gang