Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp969386imm; Wed, 23 May 2018 08:16:20 -0700 (PDT) X-Google-Smtp-Source: AB8JxZq3+AkSjLwec7rqq6TNjvsIDqhrYwhgSgV2cDng7Kp/d6qeKBMISvhB6rbc7mkttO9Nm6We X-Received: by 2002:a63:7a11:: with SMTP id v17-v6mr2454228pgc.97.1527088580469; Wed, 23 May 2018 08:16:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527088580; cv=none; d=google.com; s=arc-20160816; b=K+kT9qW/B9Q7HWh6wR+SLpQ6riFPl8c5TQ4aEAOq3klMo4NRK6Q26MtdUEYAnHObok BwD7z9LiMu9jwlVqVnfcbaY/knTpYP6drIo351Uw7m5YNWry6YkvPclkoh8YkTbK/6GR XajhnA7YPKFdrVhox9CLywawC/4uy+kgjwtkXktEkgnVxkYUEFF/sV0s/hiyT8OtZu0M DEcs/VMXPb0yNNac054J8ObnnkoKeZCXFOAxNsT4Hkq4HzSAzjTFeOsyoFkBs5IObvrC v2PDlTOdUpqwqmsaqsDuwz1GL2ySDcRCtgqgeDldlEZ0+qXmpqROCJZS4j4T1UhevKVs PVZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=0y569tcAt0Gp+I9uL0z9JhRmiH5UGxjXcImDaId8D98=; b=mjS462yjDQr+zE5FYAyh/dnibVl+2gL3SJs5E+cEf84pnd16Q/LNxHVUqGkznk7D2X wSEieJEVMEXMdtb2FRxGwslh5OxOnAy0kC5F+5+kuQHBgGg63ye/aDdgDw5P+Tx2EgM7 tv2Ml405O6Xm+9ep1TvOf73C3zI+r0Y80bu/KUnJNrkf6p6UoE+CsPfAdtjcf4svfG0y Xe/3l87TbmEOJXqPg7k8y0MlB9EY4oLpaO9/4Sl1+QE7gHnUdBmJqF4JTnQ8MTY91eEH hK3C4zpC9c+QEj5UuRZPgFVtItGtqTGms2nAnqrtD4OOSZ799X1Y9q/cpw84cX01TvUS 5/TQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o3-v6si18219599pls.64.2018.05.23.08.16.05; Wed, 23 May 2018 08:16:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933511AbeEWPMU (ORCPT + 99 others); Wed, 23 May 2018 11:12:20 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:45280 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S933475AbeEWPMP (ORCPT ); Wed, 23 May 2018 11:12:15 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 0585240BC04A; Wed, 23 May 2018 15:12:15 +0000 (UTC) Received: from t460s.redhat.com (ovpn-116-112.ams2.redhat.com [10.36.116.112]) by smtp.corp.redhat.com (Postfix) with ESMTP id 8D34710C564A; Wed, 23 May 2018 15:12:11 +0000 (UTC) From: David Hildenbrand To: linux-mm@kvack.org Cc: linux-kernel@vger.kernel.org, David Hildenbrand , Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , kasan-dev@googlegroups.com Subject: [PATCH v1 03/10] kasan: prepare for online/offline of different start/size Date: Wed, 23 May 2018 17:11:44 +0200 Message-Id: <20180523151151.6730-4-david@redhat.com> In-Reply-To: <20180523151151.6730-1-david@redhat.com> References: <20180523151151.6730-1-david@redhat.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Wed, 23 May 2018 15:12:15 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Wed, 23 May 2018 15:12:15 +0000 (UTC) for IP:'10.11.54.3' DOMAIN:'int-mx03.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'david@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The memory notifier has an important restriction right now: it only works if offline_pages() is called with the same parameters as online_pages(). To overcome this restriction, let's handle it per section. We could do it in smaller granularity, but then we get more vm_area overhead and cannot check that cleanly for actual online parts. A section is marked online as soon as at least one page is online. Similarly, a section is marked offline as soon as all pages are offline. So handling it on a per-section basis allows us to be more flexible. We asssume here, that a section is not split between boot and hotplug memory. Cc: Andrey Ryabinin Cc: Alexander Potapenko Cc: Dmitry Vyukov Cc: kasan-dev@googlegroups.com Signed-off-by: David Hildenbrand --- mm/kasan/kasan.c | 107 ++++++++++++++++++++++++++++++----------------- 1 file changed, 69 insertions(+), 38 deletions(-) diff --git a/mm/kasan/kasan.c b/mm/kasan/kasan.c index a8b85706e2d6..901601a562a9 100644 --- a/mm/kasan/kasan.c +++ b/mm/kasan/kasan.c @@ -827,62 +827,93 @@ static bool shadow_mapped(unsigned long addr) return !pte_none(*pte); } -static int __meminit kasan_mem_notifier(struct notifier_block *nb, - unsigned long action, void *data) +static void kasan_offline_pages(unsigned long start_pfn, unsigned long nr_pages) { - struct memory_notify *mem_data = data; - unsigned long nr_shadow_pages, start_kaddr, shadow_start; - unsigned long shadow_end, shadow_size; + unsigned long start = SECTION_ALIGN_DOWN(start_pfn); + unsigned long end = SECTION_ALIGN_UP(start_pfn + nr_pages); + unsigned long pfn; - nr_shadow_pages = mem_data->nr_pages >> KASAN_SHADOW_SCALE_SHIFT; - start_kaddr = (unsigned long)pfn_to_kaddr(mem_data->start_pfn); - shadow_start = (unsigned long)kasan_mem_to_shadow((void *)start_kaddr); - shadow_size = nr_shadow_pages << PAGE_SHIFT; - shadow_end = shadow_start + shadow_size; + for (pfn = start; pfn < end; pfn += PAGES_PER_SECTION) { + void *addr, *shadow_start; + struct vm_struct *vm; - if (WARN_ON(mem_data->nr_pages % KASAN_SHADOW_SCALE_SIZE) || - WARN_ON(start_kaddr % (KASAN_SHADOW_SCALE_SIZE << PAGE_SHIFT))) - return NOTIFY_BAD; + /* still online? nothing to do then */ + if (online_section_nr(pfn_to_section_nr(pfn))) + continue; - switch (action) { - case MEM_GOING_ONLINE: { - void *ret; + addr = pfn_to_kaddr(pfn); + shadow_start = kasan_mem_to_shadow(addr); + + /* + * Only hot-added memory has a vm_area. Freeing shadow mapped + * during boot would be tricky, so we'll just have to keep it. + */ + vm = find_vm_area(shadow_start); + if (vm) + vfree(shadow_start); + } +} + +static int kasan_online_pages(unsigned long start_pfn, unsigned long nr_pages) +{ + unsigned long start = SECTION_ALIGN_DOWN(start_pfn); + unsigned long end = SECTION_ALIGN_UP(start_pfn + nr_pages); + unsigned long pfn; + + for (pfn = start; pfn < end; pfn += PAGES_PER_SECTION) { + unsigned long shadow_start, shadow_size; + void *addr, *ret; + + /* already online? nothing to do then */ + if (online_section_nr(pfn_to_section_nr(pfn))) + continue; + + addr = pfn_to_kaddr(pfn); + shadow_size = (PAGES_PER_SECTION << PAGE_SHIFT) >> + KASAN_SHADOW_SCALE_SHIFT; + shadow_start = (unsigned long)kasan_mem_to_shadow(addr); /* * If shadow is mapped already than it must have been mapped - * during the boot. This could happen if we onlining previously + * during boot. This could happen if we're onlining previously * offlined memory. */ if (shadow_mapped(shadow_start)) - return NOTIFY_OK; + continue; ret = __vmalloc_node_range(shadow_size, PAGE_SIZE, shadow_start, - shadow_end, GFP_KERNEL, - PAGE_KERNEL, VM_NO_GUARD, - pfn_to_nid(mem_data->start_pfn), - __builtin_return_address(0)); + shadow_start + shadow_size, + GFP_KERNEL, PAGE_KERNEL, VM_NO_GUARD, + pfn_to_nid(pfn), + __builtin_return_address(0)); if (!ret) - return NOTIFY_BAD; - + goto out_free; kmemleak_ignore(ret); - return NOTIFY_OK; } - case MEM_CANCEL_ONLINE: - case MEM_OFFLINE: { - struct vm_struct *vm; + return 0; +out_free: + kasan_offline_pages(start_pfn, nr_pages); + return -ENOMEM; +} - /* - * Only hot-added memory have vm_area. Freeing shadow - * mapped during boot would be tricky, so we'll just - * have to keep it. - */ - vm = find_vm_area((void *)shadow_start); - if (vm) - vfree((void *)shadow_start); - } +static int __meminit kasan_mem_notifier(struct notifier_block *nb, + unsigned long action, void *data) +{ + struct memory_notify *mem_data = data; + int ret = 0; + + switch (action) { + case MEM_GOING_ONLINE: + ret = kasan_online_pages(mem_data->start_pfn, + mem_data->nr_pages); + break; + case MEM_CANCEL_ONLINE: + case MEM_OFFLINE: + kasan_offline_pages(mem_data->start_pfn, mem_data->nr_pages); + break; } - return NOTIFY_OK; + return notifier_from_errno(ret); } static int __init kasan_memhotplug_init(void) -- 2.17.0