Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp3023886pxb; Tue, 12 Jan 2021 04:36:40 -0800 (PST) X-Google-Smtp-Source: ABdhPJz8znW6GIzRw80LIvuDOzJOmM3hLKshiFrDGs4sVNZHiup4DNzbrtsdcJT+DMdRRGMZWdNc X-Received: by 2002:a17:907:20f1:: with SMTP id rh17mr3072349ejb.147.1610455000522; Tue, 12 Jan 2021 04:36:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610455000; cv=none; d=google.com; s=arc-20160816; b=fmLqBiA9dIlsU0A9YJEIAej56a7s2woZvcI79WVB7rNwuqh8sE4Ks8j7Y2fFxpxy8/ 8IlWhz5JPLe4B3hpkOJxsuRkI0a76GQH4QB+KHfsyLa+QOYBSbDizrZoc+baIDIGxyOI /PGbl8TmTL7kHbmH6HLXYfqZq1ehuJEwF5DMPYczgmQM5EGqwrugGi4GNncYvDhBYHTg Urt6q/gmeR4SOwxFwEJyQdinfZg8JPhvH8OTTwml6oPXHs7J/RTMYRNxhm1H2piMXFq1 sYHGAMx7ErLHbNvN1CUB/axYFXeFOlrp9AAmCJR03T0o39nXdBT0X2hIJVygYXt1guRc 9riA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:organization :from:references:cc:to:subject:dkim-signature; bh=L1OJr5pkvyOvtq5VyxsZ17t2sX3sq4TUtZVIaiGCPDk=; b=EWBmlEF+Z7Vv6yp4wjypEQ2PtIJ5exsh3yiaSgS8cdSPN81Z1WOEivouwxcDTkl4rQ DTNu6TKNhiDW0GEoPFCil+s85VnDVxM/SKkwcuueA3za1ba3lBlENl6etzDRf/IYYM7L dkVT/vDM/BVjMPoe4K2nroqEf8gGeSm14leM+2saJRjqyk/kg8SpvfQp58/3m+jybz7Y dd7h8c/PMxCyCxkKXp48f4sHReaE3ZcpYCole0Yy4qtUgb5RzdEjRG2KZlD/UbQ4HLbo K9iglcJ+M94UqNvlhA0CbLb0C4BX5uEjlu20dqfBVv0a3uCDoTznhd1djrbSLPhh4nMx MeJg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=G2zlMfyy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h18si1353079eds.65.2021.01.12.04.36.17; Tue, 12 Jan 2021 04:36:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=G2zlMfyy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2403839AbhALJyy (ORCPT + 99 others); Tue, 12 Jan 2021 04:54:54 -0500 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:47190 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730628AbhALJyx (ORCPT ); Tue, 12 Jan 2021 04:54:53 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1610445206; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=L1OJr5pkvyOvtq5VyxsZ17t2sX3sq4TUtZVIaiGCPDk=; b=G2zlMfyyFcWjMUXiErLh3yDHdWlO4ud1h1N9mG9dZ85LTJJeL6i5qezYYs6snR5+qub4Po upnQAvgPs+Nzy23oI5cuEnQqyn2g+BASPX+KkVWJXBVHvhJ08CaklGqiAum/cs/dIR+Rpe Bpt4ZB1hYw676xfzbbd46Ou32qVRlVo= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-280-n6uSQp9IP7y6sUgC_oq6fw-1; Tue, 12 Jan 2021 04:53:21 -0500 X-MC-Unique: n6uSQp9IP7y6sUgC_oq6fw-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 34D2B1934100; Tue, 12 Jan 2021 09:53:20 +0000 (UTC) Received: from [10.36.115.140] (ovpn-115-140.ams2.redhat.com [10.36.115.140]) by smtp.corp.redhat.com (Postfix) with ESMTP id 6A09E77714; Tue, 12 Jan 2021 09:53:18 +0000 (UTC) Subject: Re: [PATCH v2 2/5] mm: Teach pfn_to_online_page() to consider subsection validity To: Dan Williams , linux-mm@kvack.org Cc: Qian Cai , Michal Hocko , vishal.l.verma@intel.com, linux-nvdimm@lists.01.org, linux-kernel@vger.kernel.org, Anshuman Khandual References: <161044407603.1482714.16630477578392768273.stgit@dwillia2-desk3.amr.corp.intel.com> <161044408728.1482714.9086710868634042303.stgit@dwillia2-desk3.amr.corp.intel.com> From: David Hildenbrand Organization: Red Hat GmbH Message-ID: <0586c562-787c-4872-4132-18a49c3ffc8e@redhat.com> Date: Tue, 12 Jan 2021 10:53:17 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.5.0 MIME-Version: 1.0 In-Reply-To: <161044408728.1482714.9086710868634042303.stgit@dwillia2-desk3.amr.corp.intel.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12.01.21 10:34, Dan Williams wrote: > pfn_section_valid() determines pfn validity on subsection granularity. > > pfn_valid_within() internally uses pfn_section_valid(), but gates it > with early_section() to preserve the traditional behavior of pfn_valid() > before subsection support was added. > > pfn_to_online_page() wants the explicit precision that pfn_valid() does > not offer, so use pfn_section_valid() directly. Since > pfn_to_online_page() already open codes the validity of the section > number vs NR_MEM_SECTIONS, there's not much value to using > pfn_valid_within(), just use pfn_section_valid(). This loses the > valid_section() check that pfn_valid_within() was performing, but that > was already redundant with the online check. > > Fixes: b13bc35193d9 ("mm/hotplug: invalid PFNs from pfn_to_online_page()") > Cc: Qian Cai > Cc: Michal Hocko > Reported-by: David Hildenbrand > --- > mm/memory_hotplug.c | 16 ++++++++++++---- > 1 file changed, 12 insertions(+), 4 deletions(-) > > diff --git a/mm/memory_hotplug.c b/mm/memory_hotplug.c > index 55a69d4396e7..a845b3979bc0 100644 > --- a/mm/memory_hotplug.c > +++ b/mm/memory_hotplug.c > @@ -308,11 +308,19 @@ static int check_hotplug_memory_addressable(unsigned long pfn, > struct page *pfn_to_online_page(unsigned long pfn) > { > unsigned long nr = pfn_to_section_nr(pfn); > + struct mem_section *ms; > + > + if (nr >= NR_MEM_SECTIONS) > + return NULL; > + > + ms = __nr_to_section(nr); > + if (!online_section(ms)) > + return NULL; > + > + if (!pfn_section_valid(ms, pfn)) > + return NULL; That's not sufficient for alternative implementations of pfn_valid(). You still need some kind of pfn_valid(pfn) for alternative versions of pfn_valid(). Consider arm64 memory holes in the memmap. See their current (yet to be fixed/reworked) pfn_valid() implementation. (pfn_valid_within() is implicitly active on arm64) Actually, I think we should add something like the following, to make this clearer (pfn_valid_within() is confusing) #ifdef CONFIG_HAVE_ARCH_PFN_VALID /* We might have to check for holes inside the memmap. */ if (!pfn_valid()) return NULL; #endif > > - if (nr < NR_MEM_SECTIONS && online_section_nr(nr) && > - pfn_valid_within(pfn)) > - return pfn_to_page(pfn); > - return NULL; > + return pfn_to_page(pfn); > } > EXPORT_SYMBOL_GPL(pfn_to_online_page); > > -- Thanks, David / dhildenb