Received: by 10.192.165.148 with SMTP id m20csp4348272imm; Mon, 30 Apr 2018 17:02:23 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrPtJxze6Z6gg7Khq3XD489n/zOEW5Y2lji5hGJ9VhCPiPWFtNKQeqOLbYQ3ggguvLjTrX9 X-Received: by 2002:a63:9741:: with SMTP id d1-v6mr11651875pgo.447.1525132943592; Mon, 30 Apr 2018 17:02:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525132943; cv=none; d=google.com; s=arc-20160816; b=dyxnjI+XRKlQC4Y2P2ah10gxNT7PBZ3tXRQ9ZAb5Fc0+xidNf1r0mn9dCRlILC4fqo J0OMeS3utbF+CQLMomyrwt+tMtjxVodqqbZglpcKeNrotHR/4ILF+gw9AXe2ht9Qh7Mh pFND725eaLTwaNG8QtIQbn1HnrGu2pW3STbXL4bvND4/EtGX9Zy1iWS2KUnKCZ8uxBuW NkRwBWg0msL9bqMZC+z4+dlEpzi+X8YxiCFakJodotoGLYNn5W587hkkepbc88nuUjP/ rNpF8m8qhms30WKUq4hZnWjw6ABXZ0E5HpWBQ337pA+YPSTmaDV3uo4lNTdaRfEYoOXT EAcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :arc-authentication-results; bh=6ZVucXwq/5Y/CwKUdkzTH3a+BPTm+3gHATOB7ycm21g=; b=VT9mYnpmOW82Lh0zdh1Snn9Heju+CX8/+RuXN/RHRkT9/0PDT+erFOxyLKfU9tr/fH 991nzGOZiMFXqbpdz5kkMwX9rwWF0CzCzqLKzN0LlIUzLzz0rqpcP0TN/u2LhJS94CMQ Nlh5oXXtx4GneWNlCLvCFwb0CDLDkl1A+9QUnBbkY5H81v4Mu3HUE+CgVykWfH33OZ5X fPL/e78nlivcaJxxKobdSvH9OfFa9BJrDapP9Zkl5reWwZNGBvSEsgDhNJFzLB51ymGA KrTYd5JR4OOthbvUrclZsPth+39XD4NxC6xkfSi5SUch/X4i7ObcWCglL7e6zhMqkiwt uP0A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s124-v6si7059604pgc.4.2018.04.30.17.02.08; Mon, 30 Apr 2018 17:02:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755622AbeEAABs (ORCPT + 99 others); Mon, 30 Apr 2018 20:01:48 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:45402 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753530AbeEAABr (ORCPT ); Mon, 30 Apr 2018 20:01:47 -0400 Received: from akpm3.svl.corp.google.com (unknown [104.133.9.71]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id D4D5D5B1; Tue, 1 May 2018 00:01:46 +0000 (UTC) Date: Mon, 30 Apr 2018 17:01:45 -0700 From: Andrew Morton To: Steven Rostedt Cc: Pavel Tatashin , steven.sistare@oracle.com, daniel.m.jordan@oracle.com, linux-kernel@vger.kernel.org, tglx@linutronix.de, mhocko@suse.com, linux-mm@kvack.org, mgorman@techsingularity.net, mingo@kernel.org, peterz@infradead.org, fengguang.wu@intel.com, dennisszhou@gmail.com Subject: Re: [PATCH v2] mm: access to uninitialized struct page Message-Id: <20180430170145.544342905604331c0e1b95d9@linux-foundation.org> In-Reply-To: <20180430195858.5242373c@gandalf.local.home> References: <20180426202619.2768-1-pasha.tatashin@oracle.com> <20180430162658.598dd5dcdd0c67e36953281c@linux-foundation.org> <20180430195858.5242373c@gandalf.local.home> X-Mailer: Sylpheed 3.6.0 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 30 Apr 2018 19:58:58 -0400 Steven Rostedt wrote: > On Mon, 30 Apr 2018 16:26:58 -0700 > Andrew Morton wrote: > > > On Thu, 26 Apr 2018 16:26:19 -0400 Pavel Tatashin wrote: > > > > > The following two bugs were reported by Fengguang Wu: > > > > > > kernel reboot-without-warning in early-boot stage, last printk: > > > early console in setup code > > > > > > http://lkml.kernel.org/r/20180418135300.inazvpxjxowogyge@wfg-t540p.sh.intel.com > > > > > > ... > > > > > > --- a/init/main.c > > > +++ b/init/main.c > > > @@ -585,8 +585,8 @@ asmlinkage __visible void __init start_kernel(void) > > > setup_log_buf(0); > > > vfs_caches_init_early(); > > > sort_main_extable(); > > > - trap_init(); > > > mm_init(); > > > + trap_init(); > > > > > > ftrace_init(); > > > > Gulp. Let's hope that nothing in mm_init() requires that trap_init() > > has been run. What happens if something goes wrong during mm_init() > > and the architecture attempts to raise a software exception, hits a bus > > error, div-by-zero, etc, etc? Might there be hard-to-discover > > dependencies in such a case? > > I mentioned the same thing. > I guess the same concern applies to all the code which we've always run before trap_init(), and that's quite a lot of stuff. So we should be OK. But don't quote me ;)