Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp515032ybp; Thu, 10 Oct 2019 23:16:38 -0700 (PDT) X-Google-Smtp-Source: APXvYqydakuiuEu1DRM/EHQO0uhkc3G0V42tGIoQXBAzOTVjNUbUR5uBXuVZDT9r3Nz/E6JU3wzG X-Received: by 2002:a17:906:6011:: with SMTP id o17mr11757327ejj.172.1570774598750; Thu, 10 Oct 2019 23:16:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570774598; cv=none; d=google.com; s=arc-20160816; b=zBnlMG2x/MJMFquWQ5p1hE4SFd9NT6d1rY6eG/F93KnnIHHml1YsXt/rushvvCcq/W a+v2+xSfmzE3UrKWwUfQO6Lz7iwMUEnxH15p6mO7C+pj6a6XeqfRn5iLG+mgZbygPMVs mwy9UxwuPPJHDLK2rGvuSbtSsZ3OU8QOqVmskx1bDSTRZFjfKReokc6QhAvqiKYEZHQK LVFJXJKSagSe3BZp0ER6dyx1z8zl4PQU0uVLwlrxtAURCGuUqyOIBSjRQAj2e7j21CFd tXR70zpJeai2Z3bXwOEFM7kocOl5v3CQW4OG+7KHM5P2BXeGLOis34EjMp1gC7QQaf9N 24lw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-id:content-language:accept-language:in-reply-to:references :message-id:date:thread-index:thread-topic:subject:cc:to:from; bh=hLbp2zvF/78f5my7/n9q9kOxXez12WnTlwrbL+4QEq0=; b=TWgn8flU7OqoM8dPYNUhPHrjM8zDJNzV2x1bxJ930Kz/25nDfWGfKnRzJ5+UKomzID aayQGff4CEiJv934++2GDSpICNi8K8yIcBZJzy8qgMlVxe5BXwBIbnK7LwNugfjCfjcr b0UHiGGkQGQH9Rzd0KgOo3iumAXMRDNGA0SzPTKIaGhIlSlqD+nC+6tMzT4lkEnyVr4a 0Ufcz621BOxpZZMCyO/11Sl0EuUqFbGTpKPaXRH0rDL8gErZUgQF7gi9rov6dmpvYEl3 g+j+sbSPdn59A4C8HtmwUTfhof0r36BOCgiE2MFcDbJauSKXnYp0uhfmPhv3JzsSC0VB 33qw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w58si5148352edc.312.2019.10.10.23.16.15; Thu, 10 Oct 2019 23:16:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727340AbfJKGPt convert rfc822-to-8bit (ORCPT + 99 others); Fri, 11 Oct 2019 02:15:49 -0400 Received: from tyo162.gate.nec.co.jp ([114.179.232.162]:45482 "EHLO tyo162.gate.nec.co.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727066AbfJKGPs (ORCPT ); Fri, 11 Oct 2019 02:15:48 -0400 Received: from mailgate01.nec.co.jp ([114.179.233.122]) by tyo162.gate.nec.co.jp (8.15.1/8.15.1) with ESMTPS id x9B6FatW020534 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 11 Oct 2019 15:15:36 +0900 Received: from mailsv01.nec.co.jp (mailgate-v.nec.co.jp [10.204.236.94]) by mailgate01.nec.co.jp (8.15.1/8.15.1) with ESMTP id x9B6FZuR002915; Fri, 11 Oct 2019 15:15:36 +0900 Received: from mail02.kamome.nec.co.jp (mail02.kamome.nec.co.jp [10.25.43.5]) by mailsv01.nec.co.jp (8.15.1/8.15.1) with ESMTP id x9B6E396014848; Fri, 11 Oct 2019 15:15:35 +0900 Received: from bpxc99gp.gisp.nec.co.jp ([10.38.151.147] [10.38.151.147]) by mail02.kamome.nec.co.jp with ESMTP id BT-MMP-9394841; Fri, 11 Oct 2019 15:02:51 +0900 Received: from BPXM23GP.gisp.nec.co.jp ([10.38.151.215]) by BPXC19GP.gisp.nec.co.jp ([10.38.151.147]) with mapi id 14.03.0439.000; Fri, 11 Oct 2019 15:02:50 +0900 From: Naoya Horiguchi To: David Hildenbrand CC: Michal Hocko , "linux-kernel@vger.kernel.org" , "linux-mm@kvack.org" , Andrew Morton Subject: Re: [PATCH v2 2/2] mm/memory-failure.c: Don't access uninitialized memmaps in memory_failure() Thread-Topic: [PATCH v2 2/2] mm/memory-failure.c: Don't access uninitialized memmaps in memory_failure() Thread-Index: AQHVfq1QC/9/3IlYuEK91tWnhgAEnKdRy5KAgAEYjwCAAAI1AIAABLgAgAABxQCAAXH3gA== Date: Fri, 11 Oct 2019 06:02:49 +0000 Message-ID: <20191011060249.GA30500@hori.linux.bs1.fc.nec.co.jp> References: <20191009142435.3975-1-david@redhat.com> <20191009142435.3975-3-david@redhat.com> <20191009144323.GH6681@dhcp22.suse.cz> <5a626821-77e9-e26b-c2ee-219670283bf0@redhat.com> <20191010073526.GC18412@dhcp22.suse.cz> <18383432-c74a-9ce5-a3c6-1e57d54cb629@redhat.com> <52e81b85-c460-5b99-a297-e065caab3a16@redhat.com> In-Reply-To: <52e81b85-c460-5b99-a297-e065caab3a16@redhat.com> Accept-Language: en-US, ja-JP Content-Language: ja-JP X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.34.125.96] Content-Type: text/plain; charset="iso-2022-jp" Content-ID: <89CA1456C580664C8DA0362F03F6C601@gisp.nec.co.jp> Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-TM-AS-MML: disable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 10, 2019 at 09:58:40AM +0200, David Hildenbrand wrote: > On 10.10.19 09:52, David Hildenbrand wrote: > > On 10.10.19 09:35, Michal Hocko wrote: > >> On Thu 10-10-19 09:27:32, David Hildenbrand wrote: > >>> On 09.10.19 16:43, Michal Hocko wrote: > >>>> On Wed 09-10-19 16:24:35, David Hildenbrand wrote: > >>>>> We should check for pfn_to_online_page() to not access uninitialized > >>>>> memmaps. Reshuffle the code so we don't have to duplicate the error > >>>>> message. > >>>>> > >>>>> Cc: Naoya Horiguchi > >>>>> Cc: Andrew Morton > >>>>> Cc: Michal Hocko > >>>>> Signed-off-by: David Hildenbrand > >>>>> --- > >>>>> mm/memory-failure.c | 14 ++++++++------ > >>>>> 1 file changed, 8 insertions(+), 6 deletions(-) > >>>>> > >>>>> diff --git a/mm/memory-failure.c b/mm/memory-failure.c > >>>>> index 7ef849da8278..e866e6e5660b 100644 > >>>>> --- a/mm/memory-failure.c > >>>>> +++ b/mm/memory-failure.c > >>>>> @@ -1253,17 +1253,19 @@ int memory_failure(unsigned long pfn, int flags) > >>>>> if (!sysctl_memory_failure_recovery) > >>>>> panic("Memory failure on page %lx", pfn); > >>>>> > >>>>> - if (!pfn_valid(pfn)) { > >>>>> + p = pfn_to_online_page(pfn); > >>>>> + if (!p) { > >>>>> + if (pfn_valid(pfn)) { > >>>>> + pgmap = get_dev_pagemap(pfn, NULL); > >>>>> + if (pgmap) > >>>>> + return memory_failure_dev_pagemap(pfn, flags, > >>>>> + pgmap); > >>>>> + } > >>>>> pr_err("Memory failure: %#lx: memory outside kernel control\n", > >>>>> pfn); > >>>>> return -ENXIO; > >>>> > >>>> Don't we need that earlier at hwpoison_inject level? > >>>> > >>> > >>> Theoretically yes, this is another instance. But pfn_to_online_page(pfn) > >>> alone would not be sufficient as discussed. We would, again, have to > >>> special-case ZONE_DEVICE via things like get_dev_pagemap() ... > >>> > >>> But mm/hwpoison-inject.c:hwpoison_inject() is a pure debug feature either way: > >>> > >>> /* > >>> * Note that the below poison/unpoison interfaces do not involve > >>> * hardware status change, hence do not require hardware support. > >>> * They are mainly for testing hwpoison in software level. > >>> */ > >>> > >>> So it's not that bad compared to memory_failure() called from real HW or > >>> drivers/base/memory.c:soft_offline_page_store()/hard_offline_page_store() > >> > >> Yes, this is just a toy. And yes we need to handle zone device pages > >> here because a) people likely want to test MCE behavior even on these > >> pages and b) HW can really trigger MCEs there as well. I was just > >> pointing that the patch is likely incomplete. > >> > > > > I rather think this deserves a separate patch as it is a separate > > interface :) > > > > I do wonder why hwpoison_inject() has to perform so much extra work > > compared to other memory_failure() users. This smells like legacy > > leftovers to me, but I might be wrong. The interface is fairly old, > > though. Does anybody know why we need this magic? I can spot quite some > > duplicate checks/things getting performed. It concerns me too, this *is* an old legacy code. I guess it was left as-is because no one complained about it. That's not good, so I'll do some cleanup. > > > > Naiive me would just make the interface perform the same as > > hard_offline_page_store(). But most probably I am not getting the real > > purpose of both different interfaces. Maybe for historical reason, we have these slightly different interfaces: - corrupt-pfn - purely for debugging purpose - paired with unpoison-pfn - used by in-kernel tool tools/vm/page-types.c - hard_offline_page - paired with soft_offline_page - used by other userspace tools like mcelog But these don't explain why implemented differently, so I think that both should be written in the same manner. > > > > HWPOISON_INJECT is only selected for DEBUG_KERNEL, so I would have > > guessed that fixing this is not urgent. > > > > BTW: mm/memory-failure.c:soft_offline_page() also looks wrong and needs > > fixing to make sure we access initialized memmaps. > > > > To be more precise, soft_offline_page_store() needs a > pfn_to_online_page() check. Will send a patch. Thanks for finding this. - Naoya Horiguchi