Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp86716pxu; Wed, 2 Dec 2020 15:52:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJxnY1IQGAnyPDWTB5Yz29q0lSidqwugj/AWaecnAG8Gt9PLeVYsdm+g17sVgttyxrKZWeyd X-Received: by 2002:a17:906:1e0e:: with SMTP id g14mr237030ejj.128.1606953134642; Wed, 02 Dec 2020 15:52:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606953134; cv=none; d=google.com; s=arc-20160816; b=hD6UjVNW22vHwdqaVZhAPibdDTTHZnjIxULN9WKMF67m3xGSHN0lmzj38Kx3uTNcdp p2zEVWpE/qYn8M05XnB6amekoMkBFb0z9y2XXv5P8ZXnbTj5+Mrmis+l3Q175P9z5yE6 Jsiu5GwiQrBBgsAHTii7ZQwkpRgwAWgp+X3oV7R7tOqmZ1W2XT954GI0ZB8mIJCtykaC 7BgcfgGV0MTRRv2O6OocGtP6J9SEp0J0A5RmXRBK7VxBpDhJbRarkplnlONE3FhNUfrT n41ttjx9TfO5qIatV5BICai+W63s4Brnb8HKczdVHmW4EQgEgq7TWvezRQ3Gwpq+xX3U ns0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:dkim-signature :date; bh=xT1cEv4RWAkIunihS/3edi4R57niiBYniQOfid3TjS0=; b=RwCprkdXfxMYi3wI4BR8su8wEhXt4LA887C26iFxtrx9CgdAoBIE6bdWCI4Vysl4vY 7VI1g02Tq2hMuS8jWlqxwsVFG3m0NFqoU7AYg4P7ddji9zzcSTvS/bEE620C5sLVetSJ 0Kb9tYi5cA0nIRYfBRHxNIJsn3tb7KoOjt9MsM3tl0QOEZlUSwYbmDxw6rpfyxFGEVnG /TeopWpwsgC5oV+kCfEoEIWGKQHOWaxvtmGQOk4OyBDRurIttRUj24JhA2DWkpBqElpz BEwCodp1ZbnLdmPckVRrPxCUlqr+LQfpbrm0g82WhfgJdhRR+MRrcStP+mPaHPaBlRAX VnIw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=KGKt739K; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c23si91351ejx.330.2020.12.02.15.51.50; Wed, 02 Dec 2020 15:52:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=KGKt739K; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727983AbgLBXsS (ORCPT + 99 others); Wed, 2 Dec 2020 18:48:18 -0500 Received: from mail.kernel.org ([198.145.29.99]:45878 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726958AbgLBXsS (ORCPT ); Wed, 2 Dec 2020 18:48:18 -0500 Date: Wed, 2 Dec 2020 15:47:36 -0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1606952857; bh=9u2sLsqA/pgqgw1aASdJJWXFrLINqvAmzHh0/6/9ogo=; h=From:To:Cc:Subject:In-Reply-To:References:From; b=KGKt739KlwoUynzZmZtSCcV9nJh3WdbCt28K/PjS2aATmTdqX4KrUcbs+Ues9BUGG s5j32+z0hgdCndbzXWGbdl7kFu5dhH03Pg2eIwM3ogjo75yCEFJ1rvJUflEFLN8+3n 9BeEpoh99RcfbSeyj2j+y357sAqBk5OxNHV+zhU0= From: Andrew Morton To: Mike Rapoport Cc: linux-mm@kvack.org, Andrea Arcangeli , Baoquan He , David Hildenbrand , Mel Gorman , Michal Hocko , Mike Rapoport , Qian Cai , Vlastimil Babka , linux-kernel@vger.kernel.org Subject: Re: [PATCH] mm: refactor initialization of stuct page for holes in memory layout Message-Id: <20201202154736.5799e01b4c27a75b98e863fc@linux-foundation.org> In-Reply-To: <20201201181502.2340-1-rppt@kernel.org> References: <20201201181502.2340-1-rppt@kernel.org> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 1 Dec 2020 20:15:02 +0200 Mike Rapoport wrote: > From: Mike Rapoport > > There could be struct pages that are not backed by actual physical memory. > This can happen when the actual memory bank is not a multiple of > SECTION_SIZE or when an architecture does not register memory holes > reserved by the firmware as memblock.memory. > > Such pages are currently initialized using init_unavailable_mem() function > that iterated through PFNs in holes in memblock.memory and if there is a > struct page corresponding to a PFN, the fields if this page are set to > default values and it is marked as Reserved. > > init_unavailable_mem() does not take into account zone and node the page > belongs to and sets both zone and node links in struct page to zero. > > On a system that has firmware reserved holes in a zone above ZONE_DMA, for > instance in a configuration below: > > # grep -A1 E820 /proc/iomem > 7a17b000-7a216fff : Unknown E820 type > 7a217000-7bffffff : System RAM > > unset zone link in struct page will trigger > > VM_BUG_ON_PAGE(!zone_spans_pfn(page_zone(page), pfn), page); That sounds pretty serious. > because there are pages in both ZONE_DMA32 and ZONE_DMA (unset zone link in > struct page) in the same pageblock. > > Interleave initialization of pages that correspond to holes with the > initialization of memory map, so that zone and node information will be > properly set on such pages. > Should this be backported to -stable? If so, do we have a suitable Fixes:?