Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp1509269ybp; Fri, 11 Oct 2019 15:40:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqx77TWsgm/HnaoHqErPnTfoQbIgpOuovwCq+7uLO+meRPRDImX5R9NqsbZ1A71PB49xV6lr X-Received: by 2002:a50:f384:: with SMTP id g4mr15767220edm.282.1570833615305; Fri, 11 Oct 2019 15:40:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570833615; cv=none; d=google.com; s=arc-20160816; b=DFd/9owoAKYG+hvZsbDqzLZn6Q6NfhO4ykclgt+Qro8I2Z3oW+GywwaVi9bhFyHtnM F3vIgPUZaR6L7JaTK9PMZ0bFO6lwbLFCQ72GnM5npOxgyZeCjMnv82uwg0rtSpYlCImA zGW6BEVoKwXenVt3sm+y6ZL1UU4ed66nuEvD5cGbztHHE3a+gbv3xqflobJxPiI02Uds DZO2dRwP4m8gadVNULfz1oH9eLACDGpLgVTfAOCUdSEfcVMRqQq4FWFbg8mCW0ZNjKjW 3MjnhQ+0fIcIe3/FCSSMqU3nhoCgZTZwBmvWHRu8Oxt/JE7afdAPHPRjiywNMFBMA38o w1iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=8wHlfHamotote0CUQ+xgShQwXOx9DUES8PefFTvZJls=; b=St83P0YVVRwvQVFornBzc7PbeYta9ArteuW59tn15nCNCbuf6oIgffzWv5TAXdFLdP ei+c6EQG4fEO9kTGes5E8lHupMKfY2BaUsDQmnzoquEzx7YiB/CeD/ZVtkkZAS4Z2z8I 9jHXTFoAlesHQeedRa2PF08uy8ThP2KTv7ZdWdRtsP8Z2d+1xp+R8mdE5iTAevs/ZpGm Z7vKhzYPBS+mO3VCC6smR1ySaYMgUjTjUbOpVLnMOlu3isbt4Q/UoUwCb6R43dz7DEjQ NFkZ7JuTVPQa711ViUt5LzB4Tuptq45Bw9mz0kGHtDYjAiwLbL6NRRxry69fFJko1HdA zrZg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CPXMhtAQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g25si6112252ejr.409.2019.10.11.15.39.51; Fri, 11 Oct 2019 15:40:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CPXMhtAQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729393AbfJKWQf (ORCPT + 99 others); Fri, 11 Oct 2019 18:16:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:36914 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729124AbfJKWQf (ORCPT ); Fri, 11 Oct 2019 18:16:35 -0400 Received: from localhost.localdomain (c-73-231-172-41.hsd1.ca.comcast.net [73.231.172.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A53F9206CD; Fri, 11 Oct 2019 22:16:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570832195; bh=M1UCWtUQBgIjYG4651k6EPCtET4bBtdbxlyASuHK0mo=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=CPXMhtAQCg6yCVsqHqY7yrIWbqdBfmUiop4Rh8U1wiqL+qqTxu2kcQyM0ztXuLOi9 gcrmh6X3VluuEsKamMJVzIlILQjiX8ukDnY4x1wSAnsZEyKPZZ1vsEXEk4+6/KtU1b /cP8xYxgIvk2o3RrgxFPDoJdCmJkJWhCofl1nW9U= Date: Fri, 11 Oct 2019 15:16:34 -0700 From: Andrew Morton To: David Hildenbrand Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, Greg Kroah-Hartman , "Rafael J. Wysocki" , Michal Hocko , "Aneesh Kumar K.V" Subject: Re: [PATCH v1] drivers/base/memory.c: Don't access uninitialized memmaps in soft_offline_page_store() Message-Id: <20191011151634.0b566c9e32e8d0e11181d025@linux-foundation.org> In-Reply-To: <20191010141200.8985-1-david@redhat.com> References: <20191010141200.8985-1-david@redhat.com> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 10 Oct 2019 16:12:00 +0200 David Hildenbrand wrote: > Uninitialized memmaps contain garbage and in the worst case trigger kernel > BUGs, especially with CONFIG_PAGE_POISONING. They should not get > touched. > > Right now, when trying to soft-offline a PFN that resides on a memory > block that was never onlined, one gets a misleading error with > CONFIG_PAGE_POISONING: > :/# echo 5637144576 > /sys/devices/system/memory/soft_offline_page > [ 23.097167] soft offline: 0x150000 page already poisoned > > But the actual result depends on the garbage in the memmap. > > soft_offline_page() can only work with online pages, it returns -EIO in > case of ZONE_DEVICE. Make sure to only forward pages that are online > (iow, managed by the buddy) and, therefore, have an initialized memmap. > > Add a check against pfn_to_online_page() and similarly return -EIO. > > Fixes: f1dd2cd13c4b ("mm, memory_hotplug: do not associate hotadded memory to zones until online") # visible after d0dc12e86b319 Should this be cc:stable? What is the relationship between this and some similar fixes in the series "mm/memory_hotplug: Shrink zones before removing memory", v6? Should any of the patches in "mm/memory_hotplug: Shrink zones before removing memory", v6 be cc:stable?