lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 28 Mar 2011 15:37:35 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Daniel Kiper <dkiper@...-space.pl>
Cc:	ian.campbell@...rix.com, andi.kleen@...el.com,
	haicheng.li@...ux.intel.com, fengguang.wu@...el.com,
	jeremy@...p.org, konrad.wilk@...cle.com,
	dan.magenheimer@...cle.com, v.tolstov@...fip.ru, pasik@....fi,
	dave@...ux.vnet.ibm.com, wdauchy@...il.com, rientjes@...gle.com,
	xen-devel@...ts.xensource.com, linux-kernel@...r.kernel.org,
	linux-mm@...ck.org
Subject: Re: [PATCH 3/3] mm: Extend memory hotplug API to allow memory
 hotplug in virtual machines

On Mon, 28 Mar 2011 11:25:07 +0200
Daniel Kiper <dkiper@...-space.pl> wrote:

> This patch contains online_page_chain and apropriate functions
> for registering/unregistering online page notifiers. It allows
> to do some machine specific tasks during online page stage which
> is required to implement memory hotplug in virtual machines.
> Additionally, __online_page_increment_counters() and
> __online_page_free() function was add to ease generic
> hotplug operation.
> 
>  
>  void lock_memory_hotplug(void)
> @@ -361,27 +373,91 @@ int __remove_pages(struct zone *zone, unsigned long phys_start_pfn,
>  }
>  EXPORT_SYMBOL_GPL(__remove_pages);
>  
> -void online_page(struct page *page)
> +int register_online_page_notifier(struct notifier_block *nb)
> +{
> +	int rc;
> +
> +	lock_memory_hotplug();
> +	rc = raw_notifier_chain_register(&online_page_chain, nb);
> +	unlock_memory_hotplug();
> +
> +	return rc;
> +}
> +EXPORT_SYMBOL_GPL(register_online_page_notifier);
> +
> +int unregister_online_page_notifier(struct notifier_block *nb)
> +{
> +	int rc;
> +
> +	lock_memory_hotplug();
> +	rc = raw_notifier_chain_unregister(&online_page_chain, nb);
> +	unlock_memory_hotplug();
> +
> +	return rc;
> +}
> +EXPORT_SYMBOL_GPL(unregister_online_page_notifier);
> +
> +void __online_page_increment_counters(struct page *page, int inc_total)
>  {
>  	unsigned long pfn = page_to_pfn(page);
>  
> -	totalram_pages++;
> +	if (inc_total == OP_INCREMENT_TOTAL_COUNTERS)
> +		totalram_pages++;
> +
>  	if (pfn >= num_physpages)
>  		num_physpages = pfn + 1;
>  
>  #ifdef CONFIG_HIGHMEM
> -	if (PageHighMem(page))
> +	if (inc_total == OP_INCREMENT_TOTAL_COUNTERS && PageHighMem(page))
>  		totalhigh_pages++;
>  #endif
>  
>  #ifdef CONFIG_FLATMEM
>  	max_mapnr = max(pfn, max_mapnr);
>  #endif
> +}
> +EXPORT_SYMBOL_GPL(__online_page_increment_counters);
>  
> +void __online_page_free(struct page *page)
> +{
>  	ClearPageReserved(page);
>  	init_page_count(page);
>  	__free_page(page);
>  }
> +EXPORT_SYMBOL_GPL(__online_page_free);
> +
> +static int generic_online_page_notifier(struct notifier_block *nb, unsigned long val, void *v)
> +{
> +	struct page *page = v;
> +
> +	__online_page_increment_counters(page, OP_INCREMENT_TOTAL_COUNTERS);
> +	__online_page_free(page);
> +
> +	return NOTIFY_OK;
> +}
> +
> +/*
> + * 0 priority makes this the fallthrough default. All
> + * architectures wanting to override this should set
> + * a higher priority and return NOTIFY_STOP to keep
> + * this from running.
> + */
> +
> +static struct notifier_block generic_online_page_nb = {
> +	.notifier_call = generic_online_page_notifier,
> +	.priority = 0
> +};
> +
> +static int __init init_online_page_chain(void)
> +{
> +	return register_online_page_notifier(&generic_online_page_nb);
> +}
> +pure_initcall(init_online_page_chain);
> +
> +static void online_page(struct page *page)
> +{
> +	raw_notifier_call_chain(&online_page_chain, 0, page);
> +}
>  

This is a bit strange.  Normally we'll use a notifier chain to tell
listeners "hey, X just happened".  But this code is different - it
instead uses a notifier chain to tell handlers "hey, do X".  Where in
this case, X is "free a page".

And this (ab)use of notifiers is not a good fit!  Because we have the
obvious problem that if there are three registered noftifiers, we don't
want to be freeing the page three times.  Hence the tricks with
notifier callout return values.

If there are multiple independent notifier handlers, how do we manage
their priorities?  And what are the effects of the ordering of the
registration calls?

And when one callback overrides an existing one, is there any point in
leaving the original one installed at all?

I dunno, it's all a bit confusing and strange.  Perhaps it would help
if you were to explain exactly what behaviour you want here, and we can
look to see if there is a more idiomatic way of doing it.



Also...  I don't think we need (the undocumented)
OP_DO_NOT_INCREMENT_TOTAL_COUNTERS and OP_INCREMENT_TOTAL_COUNTERS. 
Just do

void __online_page_increment_counters(struct page *page,
					bool inc_total_counters);

and pass it "true" or false".

And then document it, please.  The code as you have it contains no
explanation of the inc_total_counters argument and hence no guidance to
others regarding how to use it.


I merged your patch 1/3.

I skipped your patch 2/3, as the new macros appear to have no callers
in this patchset.

I suggest that once we're happy with them, your patches 2 and 3 be
merged up via whichever tree merges the Xen balloon driver changes. 
That might be my tree, I forget :) Was anyone else thinking of grabbing
them?

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ