Received: by 10.223.176.5 with SMTP id f5csp1329305wra; Wed, 7 Feb 2018 17:29:39 -0800 (PST) X-Google-Smtp-Source: AH8x227uRt0uSnXBJcWSMLypUlvF0aZWDHV/iF8OD91E7FYqZmOb4p/Wa2HSvYtDG/EGX4zFnZed X-Received: by 2002:a17:902:7183:: with SMTP id b3-v6mr4639514pll.331.1518053379515; Wed, 07 Feb 2018 17:29:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518053379; cv=none; d=google.com; s=arc-20160816; b=CsGSGiyik/DiamPUAW3GDJVV5Zfpgm9+RylMoQpIXPYU+18KLzZzd6BYjgqDEVyE8+ RBlafPup+LYfzkDSYn8yFTLQYcTUHkBd2Pajb4lOdP06w55uzbnNmunBLzrwyGM+9LTv 2n3JHSzo2xUSVNJx4UHLxfVN5hYhAVp5m25/En8O6O4Fw/yMSaFChf8YotmAs6xFPLKl FB1OcDcAAe4yaIbPJVgUJt018CQdc0tb71mJTIWbkt6dmeQCQR7uG7R6cV3eTE91XnDR 1fpAiDZZQlaQ3K3Gn5e9BEOAOzb4bv7n/9id+XPoLpDTBQny32Q084RN3c7HLvGs/HFe 8F1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :in-reply-to:date:references:subject:cc:to:from :arc-authentication-results; bh=jvbUNzE8i8PYpvqCheVQUue4cXkB1Fu1BoSLsb2qcmU=; b=i2GHrYqfxzN3e/qvLjDmAURQ5gnuspEeIEjYnvQEIKYC9Tm/JZF4NaE94+J5G0WfYw PMgKNGFrJyiCWbBZ0m79GIebD2iUBozrpawrbT7jelr6iHvkpY+ZCEbeMMuRDLFS5oav TvatCzjnNpShy5WHBbtO+lACzXJGLriLlSPoQTuVw4xkI316sirbT/2M4K8K+ti5aP2P WEjMoPmNcegGlK4KZmEnQmnohOz5Kj4WLa9zLkotGFfoc89/6Hfj0c+QhadXgEXSkm3J pESMh7qH4iU1yxFGOLPVpWCASa8cs+pwXO6/NP1t8iaTeC62vCLbznYCBuDsYifusBII WJUA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t76si1683449pgc.273.2018.02.07.17.29.24; Wed, 07 Feb 2018 17:29:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751786AbeBHB2i (ORCPT + 99 others); Wed, 7 Feb 2018 20:28:38 -0500 Received: from mga04.intel.com ([192.55.52.120]:39706 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750806AbeBHB2g (ORCPT ); Wed, 7 Feb 2018 20:28:36 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 07 Feb 2018 17:28:35 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.46,476,1511856000"; d="scan'208";a="29747987" Received: from yhuang-dev.sh.intel.com (HELO yhuang-dev) ([10.239.13.10]) by orsmga001.jf.intel.com with ESMTP; 07 Feb 2018 17:28:32 -0800 From: "Huang\, Ying" To: Andrew Morton Cc: , , Huang Ying , Konrad Rzeszutek Wilk , Dan Streetman , Seth Jennings , Minchan Kim , Tetsuo Handa , Shaohua Li , "Michal Hocko" , Johannes Weiner , Mel Gorman , Shakeel Butt , , Sergey Senozhatsky Subject: Re: [PATCH -mm -v2] mm, swap, frontswap: Fix THP swap if frontswap enabled References: <20180207070035.30302-1-ying.huang@intel.com> <20180207130534.259cd71a595c6275b2da38d3@linux-foundation.org> Date: Thu, 08 Feb 2018 09:28:31 +0800 In-Reply-To: <20180207130534.259cd71a595c6275b2da38d3@linux-foundation.org> (Andrew Morton's message of "Wed, 7 Feb 2018 13:05:34 -0800") Message-ID: <877ero1d8g.fsf@yhuang-dev.intel.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=ascii Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Andrew Morton writes: > On Wed, 7 Feb 2018 15:00:35 +0800 "Huang, Ying" wrote: > >> From: Huang Ying >> >> It was reported by Sergey Senozhatsky that if THP (Transparent Huge >> Page) and frontswap (via zswap) are both enabled, when memory goes low >> so that swap is triggered, segfault and memory corruption will occur >> in random user space applications as follow, >> >> kernel: urxvt[338]: segfault at 20 ip 00007fc08889ae0d sp 00007ffc73a7fc40 error 6 in libc-2.26.so[7fc08881a000+1ae000] >> #0 0x00007fc08889ae0d _int_malloc (libc.so.6) >> #1 0x00007fc08889c2f3 malloc (libc.so.6) >> #2 0x0000560e6004bff7 _Z14rxvt_wcstoutf8PKwi (urxvt) >> #3 0x0000560e6005e75c n/a (urxvt) >> #4 0x0000560e6007d9f1 _ZN16rxvt_perl_interp6invokeEP9rxvt_term9hook_typez (urxvt) >> #5 0x0000560e6003d988 _ZN9rxvt_term9cmd_parseEv (urxvt) >> #6 0x0000560e60042804 _ZN9rxvt_term6pty_cbERN2ev2ioEi (urxvt) >> #7 0x0000560e6005c10f _Z17ev_invoke_pendingv (urxvt) >> #8 0x0000560e6005cb55 ev_run (urxvt) >> #9 0x0000560e6003b9b9 main (urxvt) >> #10 0x00007fc08883af4a __libc_start_main (libc.so.6) >> #11 0x0000560e6003f9da _start (urxvt) >> >> After bisection, it was found the first bad commit is >> bd4c82c22c367e068 ("mm, THP, swap: delay splitting THP after swapped >> out"). >> >> The root cause is as follow. >> >> When the pages are written to swap device during swapping out in >> swap_writepage(), zswap (fontswap) is tried to compress the pages >> instead to improve the performance. But zswap (frontswap) will treat >> THP as normal page, so only the head page is saved. After swapping >> in, tail pages will not be restored to its original contents, so cause >> the memory corruption in the applications. >> >> This is fixed via splitting THP before writing the page to swap device >> if frontswap is enabled. To deal with the situation where frontswap >> is enabled at runtime, whether the page is THP is checked before using >> frontswap during swapping out too. >> >> ... >> >> --- a/mm/page_io.c >> +++ b/mm/page_io.c >> @@ -250,7 +250,7 @@ int swap_writepage(struct page *page, struct writeback_control *wbc) >> unlock_page(page); >> goto out; >> } >> - if (frontswap_store(page) == 0) { >> + if (!PageTransHuge(page) && frontswap_store(page) == 0) { >> set_page_writeback(page); >> unlock_page(page); >> end_page_writeback(page); >> diff --git a/mm/swapfile.c b/mm/swapfile.c >> index 006047b16814..0b7c7883ce64 100644 >> --- a/mm/swapfile.c >> +++ b/mm/swapfile.c >> @@ -934,6 +934,9 @@ int get_swap_pages(int n_goal, bool cluster, swp_entry_t swp_entries[]) >> >> /* Only single cluster request supported */ >> WARN_ON_ONCE(n_goal > 1 && cluster); >> + /* Frontswap doesn't support THP */ >> + if (frontswap_enabled() && cluster) >> + goto noswap; >> > > hm. This is assuming that "cluster==true" means "this is thp swap". > That's presently true, but is it appropriate that get_swap_pages() is > peeking at "cluster" to work out why it is being called? > > Or would it be cleaner to do this in get_swap_page()? Something like > > --- a/mm/swap_slots.c~a > +++ a/mm/swap_slots.c > @@ -317,8 +317,11 @@ swp_entry_t get_swap_page(struct page *p > entry.val = 0; > > if (PageTransHuge(page)) { > - if (IS_ENABLED(CONFIG_THP_SWAP)) > - get_swap_pages(1, true, &entry); > + /* Frontswap doesn't support THP */ > + if (!frontswap_enabled()) { > + if (IS_ENABLED(CONFIG_THP_SWAP)) > + get_swap_pages(1, true, &entry); > + } > return entry; > } > Sure. I will do this. Best Regards, Huang, Ying