On Thu, Mar 5, 2015 at 3:54 PM, Mel Gorman <mgorman@xxxxxxx> wrote: > if (!prot_numa || !pmd_protnone(*pmd)) { > - entry = pmdp_get_and_clear_notify(mm, addr, pmd); > - entry = pmd_modify(entry, newprot); > + /* > + * NUMA hinting update can avoid a clear and defer the > + * flush as it is not a functional correctness issue if > + * access occurs after the update and this avoids > + * spurious faults. > + */ > + if (prot_numa) { > + entry = *pmd; > + entry = pmd_mkprotnone(entry); > + } else { > + entry = pmdp_get_and_clear_notify(mm, addr, > + pmd); > + entry = pmd_modify(entry, newprot); > + BUG_ON(pmd_write(entry)); > + } > + > ret = HPAGE_PMD_NR; > set_pmd_at(mm, addr, pmd, entry); > - BUG_ON(pmd_write(entry)); So I don't think this is right, nor is the new pte code. You cannot just read the old pte entry, change it, and write it back. That's fundamentally racy, and can drop any concurrent dirty or accessed bit setting. And there are no locks you can use to protect against that, since the accessed and dirty bit are set by hardware. Now, losing the accessed bit doesn't matter - it's a small race, and not a correctness issue. But potentially losing dirty bits is a data loss problem. Did the old prot_numa code do this too? Because if it did, it sounds like it was just buggy. Linus -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>