Received: by 10.223.176.5 with SMTP id f5csp850712wra; Wed, 7 Feb 2018 08:30:54 -0800 (PST) X-Google-Smtp-Source: AH8x226uSwq+chSjM5lXYPtUJdKrnQG18Fq0maSKIf9kEP8BzQh6tEJCqDg1qfWElvjscP22r4Ze X-Received: by 2002:a17:902:b189:: with SMTP id s9-v6mr6527931plr.243.1518021054016; Wed, 07 Feb 2018 08:30:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518021053; cv=none; d=google.com; s=arc-20160816; b=C12LcTn4iTf1gli5aAZ+gffX/Kdf/3ry+a5V75jWMJyxTIUTIYuSxOswskZTcIoWH5 7ZJHyfZCkx8cAPi3fmOpgssJ4O7B/FF45+PjVNJY+CxrzRKoyc+5zz8uPWfZlRh7+cUv V8M1MzMHdQHS7lQNbpWJjaRZM3lAl/YLxxbpj7mi0TarKxWkbnzq+cPTvcZsPjStCSOY sq+4JbEftoLIXcb6RrSKshuNwVXYB27YlzTOz0MRpUxOXK7RGi543tu5qGkbRS5AXQ59 JNd3eC/0SEzunvHYUka0z9vRwFnn/kEvt2KgTgahXJjl053dzSs/1mM5JNZ5ue3qd1Kc bqvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=4aQJm6/HJ+N7evqIdD9BVgDprQtJROl1yMUpbL5uTHY=; b=CIMzHSNDf7Rx7xA+uPxc9Zq0k5TWW8RUojnkDWzddsO5ETffHx9Ck9s/6vF/GKmO+P MMmhzyWCisAyJBbCMOSemlNJ/7wGC4mlCNR7L00BBFyMrefJ6oOmhnulsepuKc+XMcT4 8AVDkphdr+a4YPgzyNQLWtbYFNRhPd8iJgQKvkEjYMbfwIMovVmoXUVgs92JydeRg78G gjF9G68oeGMg+dzARvPu8wEgZ7dw3yNpJVsR1MZfxGdQ+KDm+BRyDEpEsNm+Xj6OJzws veW6un4ZAapoPHuDWVrvb50gQaLUHACFf4GjAmvN49Qo23Xk/Ll4XdKzVUDtqbyiL2mD SVMg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=ND8LqhNo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d12si1099582pgv.538.2018.02.07.08.30.38; Wed, 07 Feb 2018 08:30:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=ND8LqhNo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932164AbeBGQ2Z (ORCPT + 99 others); Wed, 7 Feb 2018 11:28:25 -0500 Received: from userp2120.oracle.com ([156.151.31.85]:39936 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932119AbeBGQ2X (ORCPT ); Wed, 7 Feb 2018 11:28:23 -0500 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w17GRZ0v067950; Wed, 7 Feb 2018 16:27:55 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=date : from : to : cc : subject : message-id : references : mime-version : content-type : in-reply-to; s=corp-2017-10-26; bh=4aQJm6/HJ+N7evqIdD9BVgDprQtJROl1yMUpbL5uTHY=; b=ND8LqhNo1RcMy12Y83lg9EZQoc+nEPkam1mhkNta0Fb+HtdZTeXeE0WPQGZDSw0wNEdK EqrZcC5OlJTTLuTTW5ya5sW86VyssJG5VdkiXfwqI9BjztAkXOTTScypG+BNEKq2m9vR VD0WV/bUOXANheU99MBwJMWH4J2A8gwJIq5ZFcV7YfjM5d54pGUXgRwltd5fxpZNiilF jA/GJKg6PnqmI5C8k82H/GvfZ+m2rx80Zc5ORaflCgyQ/9aHlgAKks78WeLNCL+v8afv YfeE+BIyvSxS79/jduvlhAl5k0biFMZpCt876rHzuJcmwNUtWSb9nqmFiMVqOztW8Mx/ hQ== Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by userp2120.oracle.com with ESMTP id 2g04fj0af9-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 07 Feb 2018 16:27:54 +0000 Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by userv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w17GRsoA024235 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 7 Feb 2018 16:27:54 GMT Received: from abhmp0015.oracle.com (abhmp0015.oracle.com [141.146.116.21]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w17GRqjs024825; Wed, 7 Feb 2018 16:27:52 GMT Received: from char.us.oracle.com (/10.137.176.158) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 07 Feb 2018 08:27:51 -0800 Received: by char.us.oracle.com (Postfix, from userid 1000) id 547496A00DE; Wed, 7 Feb 2018 11:27:50 -0500 (EST) Date: Wed, 7 Feb 2018 11:27:50 -0500 From: Konrad Rzeszutek Wilk To: "Huang, Ying" Cc: Andrew Morton , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Huang Ying , Dan Streetman , Seth Jennings , Minchan Kim , Tetsuo Handa , Shaohua Li , Michal Hocko , Johannes Weiner , Mel Gorman , Shakeel Butt , stable@vger.kernel.org, Sergey Senozhatsky Subject: Re: [PATCH -mm -v2] mm, swap, frontswap: Fix THP swap if frontswap enabled Message-ID: <20180207162750.GB26849@char.us.oracle.com> References: <20180207070035.30302-1-ying.huang@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180207070035.30302-1-ying.huang@intel.com> User-Agent: Mutt/1.8.3 (2017-05-23) X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8798 signatures=668663 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1802070207 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Feb 07, 2018 at 03:00:35PM +0800, Huang, Ying wrote: > From: Huang Ying > > It was reported by Sergey Senozhatsky that if THP (Transparent Huge > Page) and frontswap (via zswap) are both enabled, when memory goes low > so that swap is triggered, segfault and memory corruption will occur > in random user space applications as follow, > > kernel: urxvt[338]: segfault at 20 ip 00007fc08889ae0d sp 00007ffc73a7fc40 error 6 in libc-2.26.so[7fc08881a000+1ae000] > #0 0x00007fc08889ae0d _int_malloc (libc.so.6) > #1 0x00007fc08889c2f3 malloc (libc.so.6) > #2 0x0000560e6004bff7 _Z14rxvt_wcstoutf8PKwi (urxvt) > #3 0x0000560e6005e75c n/a (urxvt) > #4 0x0000560e6007d9f1 _ZN16rxvt_perl_interp6invokeEP9rxvt_term9hook_typez (urxvt) > #5 0x0000560e6003d988 _ZN9rxvt_term9cmd_parseEv (urxvt) > #6 0x0000560e60042804 _ZN9rxvt_term6pty_cbERN2ev2ioEi (urxvt) > #7 0x0000560e6005c10f _Z17ev_invoke_pendingv (urxvt) > #8 0x0000560e6005cb55 ev_run (urxvt) > #9 0x0000560e6003b9b9 main (urxvt) > #10 0x00007fc08883af4a __libc_start_main (libc.so.6) > #11 0x0000560e6003f9da _start (urxvt) > > After bisection, it was found the first bad commit is > bd4c82c22c367e068 ("mm, THP, swap: delay splitting THP after swapped > out"). > > The root cause is as follow. > > When the pages are written to swap device during swapping out in > swap_writepage(), zswap (fontswap) is tried to compress the pages > instead to improve the performance. But zswap (frontswap) will treat > THP as normal page, so only the head page is saved. After swapping > in, tail pages will not be restored to its original contents, so cause > the memory corruption in the applications. > > This is fixed via splitting THP before writing the page to swap device > if frontswap is enabled. To deal with the situation where frontswap > is enabled at runtime, whether the page is THP is checked before using > frontswap during swapping out too. > > Reported-and-tested-by: Sergey Senozhatsky > Signed-off-by: "Huang, Ying" > Cc: Konrad Rzeszutek Wilk Reviewed-by: Konrad Rzeszutek Wilk > Cc: Dan Streetman > Cc: Seth Jennings > Cc: Minchan Kim > Cc: Tetsuo Handa > Cc: Shaohua Li > Cc: Michal Hocko > Cc: Johannes Weiner > Cc: Mel Gorman > Cc: Shakeel Butt > Cc: stable@vger.kernel.org # 4.14 > Fixes: bd4c82c22c367e068 ("mm, THP, swap: delay splitting THP after swapped out") > > Changelog: > > v2: > > - Move frontswap check into swapfile.c to avoid to make vmscan.c > depends on frontswap. > --- > mm/page_io.c | 2 +- > mm/swapfile.c | 3 +++ > 2 files changed, 4 insertions(+), 1 deletion(-) > > diff --git a/mm/page_io.c b/mm/page_io.c > index b41cf9644585..6dca817ae7a0 100644 > --- a/mm/page_io.c > +++ b/mm/page_io.c > @@ -250,7 +250,7 @@ int swap_writepage(struct page *page, struct writeback_control *wbc) > unlock_page(page); > goto out; > } > - if (frontswap_store(page) == 0) { > + if (!PageTransHuge(page) && frontswap_store(page) == 0) { > set_page_writeback(page); > unlock_page(page); > end_page_writeback(page); > diff --git a/mm/swapfile.c b/mm/swapfile.c > index 006047b16814..0b7c7883ce64 100644 > --- a/mm/swapfile.c > +++ b/mm/swapfile.c > @@ -934,6 +934,9 @@ int get_swap_pages(int n_goal, bool cluster, swp_entry_t swp_entries[]) > > /* Only single cluster request supported */ > WARN_ON_ONCE(n_goal > 1 && cluster); > + /* Frontswap doesn't support THP */ > + if (frontswap_enabled() && cluster) > + goto noswap; > > avail_pgs = atomic_long_read(&nr_swap_pages) / nr_pages; > if (avail_pgs <= 0) > -- > 2.15.1 >