Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755458AbdCTTaU (ORCPT ); Mon, 20 Mar 2017 15:30:20 -0400 Received: from mx2.suse.de ([195.135.220.15]:45050 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755293AbdCTTaS (ORCPT ); Mon, 20 Mar 2017 15:30:18 -0400 Date: Mon, 20 Mar 2017 15:29:39 -0400 From: Michal Hocko To: "Rafael J. Wysocki" Cc: Toshi Kani , Jiri Kosina , joeyli , linux-mm@kvack.org, LKML , linux-api@vger.kernel.org Subject: memory hotplug and force_remove Message-ID: <20170320192938.GA11363@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 942 Lines: 24 Hi Rafael, we have been chasing the following BUG() triggering during the memory hotremove (remove_memory): ret = walk_memory_range(PFN_DOWN(start), PFN_UP(start + size - 1), NULL, check_memblock_offlined_cb); if (ret) BUG(); and it took a while to learn that the issue is caused by /sys/firmware/acpi/hotplug/force_remove being enabled. I was really surprised to see such an option because at least for the memory hotplug it cannot work at all. Memory hotplug fails when the memory is still in use. Even if we do not BUG() here enforcing the hotplug operation will lead to problematic behavior later like crash or a silent memory corruption if the memory gets onlined back and reused by somebody else. I am wondering what was the motivation for introducing this behavior and whether there is a way to disallow it for memory hotplug. Or maybe drop it completely. What would break in such a case? Thanks! -- Michal Hocko SUSE Labs