Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752523AbdIEQoC (ORCPT ); Tue, 5 Sep 2017 12:44:02 -0400 Received: from mx2.suse.de ([195.135.220.15]:39669 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752165AbdIEQn5 (ORCPT ); Tue, 5 Sep 2017 12:43:57 -0400 Date: Tue, 5 Sep 2017 18:43:42 +0200 From: Michal Hocko To: Laurent Dufour Cc: linux-mm@kvack.org, akpm@linux-foundation.org, kirill@shutemov.name, linux-kernel@vger.kernel.org Subject: Re: [PATCH] mm: Fix mem_cgroup_oom_disable() call missing Message-ID: <20170905164342.wrzof7kn4o4ybeg5@dhcp22.suse.cz> References: <1504625439-31313-1-git-send-email-ldufour@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1504625439-31313-1-git-send-email-ldufour@linux.vnet.ibm.com> User-Agent: NeoMutt/20170609 (1.8.3) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1982 Lines: 57 On Tue 05-09-17 17:30:39, Laurent Dufour wrote: > Seen while reading the code, in handle_mm_fault(), in the case > arch_vma_access_permitted() is failing the call to mem_cgroup_oom_disable() > is not made. > > To fix that, move the call to mem_cgroup_oom_enable() after calling > arch_vma_access_permitted() as it should not have entered the memcg OOM. > > Fixes: bae473a423f6 ("mm: introduce fault_env") > Signed-off-by: Laurent Dufour Acked-by: Michal Hocko > --- > mm/memory.c | 10 +++++----- > 1 file changed, 5 insertions(+), 5 deletions(-) > > diff --git a/mm/memory.c b/mm/memory.c > index 56e48e4593cb..274547075486 100644 > --- a/mm/memory.c > +++ b/mm/memory.c > @@ -3888,6 +3888,11 @@ int handle_mm_fault(struct vm_area_struct *vma, unsigned long address, > /* do counter updates before entering really critical section. */ > check_sync_rss_stat(current); > > + if (!arch_vma_access_permitted(vma, flags & FAULT_FLAG_WRITE, > + flags & FAULT_FLAG_INSTRUCTION, > + flags & FAULT_FLAG_REMOTE)) > + return VM_FAULT_SIGSEGV; > + > /* > * Enable the memcg OOM handling for faults triggered in user > * space. Kernel faults are handled more gracefully. > @@ -3895,11 +3900,6 @@ int handle_mm_fault(struct vm_area_struct *vma, unsigned long address, > if (flags & FAULT_FLAG_USER) > mem_cgroup_oom_enable(); > > - if (!arch_vma_access_permitted(vma, flags & FAULT_FLAG_WRITE, > - flags & FAULT_FLAG_INSTRUCTION, > - flags & FAULT_FLAG_REMOTE)) > - return VM_FAULT_SIGSEGV; > - > if (unlikely(is_vm_hugetlb_page(vma))) > ret = hugetlb_fault(vma->vm_mm, vma, address, flags); > else > -- > 2.7.4 > > -- > To unsubscribe, send a message with 'unsubscribe linux-mm' in > the body to majordomo@kvack.org. For more info on Linux MM, > see: http://www.linux-mm.org/ . > Don't email: email@kvack.org -- Michal Hocko SUSE Labs