Received: by 10.213.65.68 with SMTP id h4csp1376582imn; Wed, 14 Mar 2018 19:34:21 -0700 (PDT) X-Google-Smtp-Source: AG47ELvLFpO72G0KDOPIXO9hbig6DFiOAnjfciUbWChEu8y8+lrTC3wBbYG1+q7wPLZS24+fzwU+ X-Received: by 10.98.253.17 with SMTP id p17mr6259247pfh.105.1521081261150; Wed, 14 Mar 2018 19:34:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521081261; cv=none; d=google.com; s=arc-20160816; b=K6WpNQPPb2KkjT8CrZT2k2YdAPFAYmq4ILwQLEjwRTyec73Q27xJgGRQ5BjDnewAZQ SE9vTh8AJeL5aMvBeQxZjsLVwd03Ummf22/t7n7HY3v363FpPp4Y8/LxMRf+/mUJzClF V91KICJn8zpP7hRXIZfoMnmYNnoam1gZf6T+3XC1KlHCmYbaw5JA4exsyds7DD2OFT4b IkacKqT5FW6AOvw0wChRG0LM7SIo5rQA160D3hJdEFTMLCR/AgTkm+O5jgt60Q8744qp dZyG0dm8KCkV6k+wlLJOMcAFglsMGdLiM7/kbbEhWnI+goY1ekREoqyTHZyF122VeQkb QBBA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:arc-authentication-results; bh=3mn3oNMR3CcQ27ESjZyowSk0k5PwxOwWLnIJhwxa0w8=; b=gBJnGNYnmY6FxwOac3LyCbYIlNiRSgRKDsUmHt6gdFGfa5Q3paK+Gr52TxwgvSKBJc 4vtSXx0Tu/DXIQlSedv4PJDSHhKUUynXGE3cxynnYBuvme3xnx3EOchaGwvYIgvKFFIm KB+HHWbkPHZWlHoK8ImJcjbrrucJ/nu9D3DqOumpWREM9g+N8+1uNq5dOOb3vns6S7EI T6ZhIXPmJ/A1l8SgZrj+W0m6oEu+t7SwLfIuRDi1IaibA2JI7NuZAWyDpIlOikXyFJfV CLt2eTUSfKe2Kv332fokke1YevM6apuiU3itO/d2K7Hwz9PUGyoH0O3fjfB5t32AjkjB U2Zw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m1si2809130pgc.757.2018.03.14.19.34.07; Wed, 14 Mar 2018 19:34:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752047AbeCOCcw (ORCPT + 99 others); Wed, 14 Mar 2018 22:32:52 -0400 Received: from mail-ot0-f193.google.com ([74.125.82.193]:36454 "EHLO mail-ot0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751512AbeCOCcu (ORCPT ); Wed, 14 Mar 2018 22:32:50 -0400 Received: by mail-ot0-f193.google.com with SMTP id 108-v6so5422185otv.3 for ; Wed, 14 Mar 2018 19:32:50 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=3mn3oNMR3CcQ27ESjZyowSk0k5PwxOwWLnIJhwxa0w8=; b=t3hA3Cb3Kqu3AsS92rcV64XO75Rj0LF55KCL05Cc7F8HgtcTrOFxHGO1nFS+6CfX4S Y+zfQ8JI+i3bt3pS60Jd5p1EKX8yaoJQAXKcmbIO3ckdBb7cMde8QKlNFzCatiyZrc51 SVv/dGNvHVgmj17QfNOE0xK+DUfCDNieBPVT3o/WiRoyT3RmijXK1ULnWj7j1Yc/Cri4 Q+OpWB/IF5OvVm3WfjLSumiYI2NTED2kErSOw1Xlu0T1fvezolTOPK4WrayaNG8u021/ N2M9PYA9M6qGCxfUAmqepNH8q57xBQGQ1x2zuqut+z4J3IMx3F5s33PBTVdJ+CMPl6bf Q15g== X-Gm-Message-State: AElRT7ERhgUPAmfa1/4LewvxVWBk6laGfXw100MsG8mOqDn2lbQPiNuZ dDha8Kwgc0Mx9NZUL6yyocYVUWTjjFVB8yPKqQi/zA== X-Received: by 10.157.40.231 with SMTP id s94mr4243088ota.36.1521081170351; Wed, 14 Mar 2018 19:32:50 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a9d:39f6:0:0:0:0:0 with HTTP; Wed, 14 Mar 2018 19:32:49 -0700 (PDT) In-Reply-To: References: <20180314134431.13241-1-ard.biesheuvel@linaro.org> <20180314141323.GD23100@dhcp22.suse.cz> <20180314145450.GI23100@dhcp22.suse.cz> From: Daniel Vacek Date: Thu, 15 Mar 2018 03:32:49 +0100 Message-ID: Subject: Re: [PATCH] Revert "mm/page_alloc: fix memmap_init_zone pageblock alignment" To: Ard Biesheuvel Cc: Michal Hocko , linux-arm-kernel , Linux Kernel Mailing List , Mark Rutland , Will Deacon , Catalin Marinas , Marc Zyngier , Mel Gorman , Paul Burton , Pavel Tatashin , Vlastimil Babka , Andrew Morton , Linus Torvalds Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 14, 2018 at 6:36 PM, Ard Biesheuvel wrote: > On 14 March 2018 at 16:41, Ard Biesheuvel wrote: >> On 14 March 2018 at 15:54, Ard Biesheuvel wrote: >>> On 14 March 2018 at 14:54, Michal Hocko wrote: >>>> On Wed 14-03-18 14:35:12, Ard Biesheuvel wrote: >>>>> On 14 March 2018 at 14:13, Michal Hocko wrote: >>>>> > Does http://lkml.kernel.org/r/20180313224240.25295-1-neelx@redhat.com >>>>> > fix your issue? From the debugging info you provided it should because >>>>> > the patch prevents jumping backwards. >>>>> > >>>>> >>>>> The patch does fix the boot hang. >>>>> >>>>> But I am concerned that we are papering over a fundamental flaw in >>>>> memblock_next_valid_pfn(). >>>> >>>> It seems that memblock_next_valid_pfn is doing the right thing here. It >>>> is the alignment which moves the pfn back AFAICS. I am not really >>>> impressed about the original patch either, to be completely honest. >>>> It just looks awfully tricky. I still didn't manage to wrap my head >>>> around the original issue though so I do not have much better ideas to >>>> be honest. >>> >>> So first of all, memblock_next_valid_pfn() never refers to its max_pfn >>> argument, which is odd nut easily fixed. >>> Then, the whole idea of substracting one so that the pfn++ will >>> produce the expected value is rather hacky, >>> >>> But the real problem is that rounding down pfn for the next iteration >>> is dodgy, because early_pfn_valid() isn't guaranteed to return true >>> for the rounded down value. I know it is probably fine in reality, but >>> dodgy as hell. The same applies to the call to early_pfn_in_nid() btw >>> >>> So how about something like this (apologies on Gmail's behalf for the >>> whitespace damage, I can resend it as a proper patch) >>> >>> >>> ---------8<----------- >>> diff --git a/mm/page_alloc.c b/mm/page_alloc.c >>> index 3d974cb2a1a1..b89ca999ee3b 100644 >>> --- a/mm/page_alloc.c >>> +++ b/mm/page_alloc.c >>> @@ -5352,28 +5352,29 @@ >>> * function. They do not exist on hotplugged memory. >>> */ >>> if (context != MEMMAP_EARLY) >>> goto not_early; >>> >>> - if (!early_pfn_valid(pfn)) { >>> + if (!early_pfn_valid(pfn) || !early_pfn_in_nid(pfn, nid)) { >>> #ifdef CONFIG_HAVE_MEMBLOCK_NODE_MAP >>> /* >>> * Skip to the pfn preceding the next valid one (or >>> * end_pfn), such that we hit a valid pfn (or end_pfn) >>> * on our next iteration of the loop. Note that it needs >>> * to be pageblock aligned even when the region itself >>> * is not. move_freepages_block() can shift ahead of >>> * the valid region but still depends on correct page >>> * metadata. >>> */ >>> - pfn = (memblock_next_valid_pfn(pfn, end_pfn) & >>> - ~(pageblock_nr_pages-1)) - 1; >>> -#endif >>> + pfn = memblock_next_valid_pfn(pfn, end_pfn); >>> + if (pfn >= end_pfn) >>> + break; >>> + pfn &= ~(pageblock_nr_pages - 1); >>> +#else >>> continue; >>> +#endif >>> } >>> - if (!early_pfn_in_nid(pfn, nid)) >>> - continue; >>> if (!update_defer_init(pgdat, pfn, end_pfn, &nr_initialised)) >>> break; >>> >>> #ifdef CONFIG_HAVE_MEMBLOCK_NODE_MAP >>> /* >>> ---------8<----------- >>> >>> This ensures that we enter the remainder of the loop with a properly >>> aligned pfn, rather than tweaking the value of pfn so it assumes the >>> expected value after 'pfn++' >> >> Um, this does not actually solve the issue. I guess this is due to the >> fact that a single pageblock size chunk could have both valid and >> invalid PFNs, and so rounding down the first PFN of the second valid >> chunk moves you back to the first chunk. > > OK, so the original patch attempted to ensure that of each pageblock, > at least the first struct page gets initialized, even though the PFN > may not be valid. Unfortunately, this code is not complete, given that > start_pfn itself may be misaligned, and so the issue it attempts to > solve may still occur. You're wrong here. > Then, I think it is absolutely dodgy to settle for only initializing > the first struct page, rather than all of them, only because a > specific VM_BUG_ON() references the flag field of the first struct > page. > IMO, we should fix this by initializing all struct page entries for > each pageblock sized chunk that has any valid PFNs. That's precisely what my patch does. At least with CONFIG_HAVE_ARCH_PFN_VALID disabled. And it looks only arm implements arch pfn_valid() which I was not testing with and I am not sure it's correct. Check my other email --nX