Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2477793imm; Mon, 28 May 2018 08:50:53 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqxCTUOwE2S4HLEu+hvj9G1bwL81DHoUFSr7vn2JuuLShHlIiadMrc0pYEkykfU6rVbUt/P X-Received: by 2002:aa7:83c7:: with SMTP id j7-v6mr13976610pfn.50.1527522653699; Mon, 28 May 2018 08:50:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527522653; cv=none; d=google.com; s=arc-20160816; b=CJX5utAo5nGUWM+Ff4OjOWgTTuOpwNrOScuQ3qGAUTjZqpkMouNpLbMCTxicI207t+ pPOjnL6rt2DmfCq+WpcNi5T5BPXoUa0nBADwjj7z+Ya85E0VBd+00QqOBv9kSAbXVhNu m7CIWMbqxR+uupc4C8bLd40DxQgKjUMCBipIVjgxiJ4n61Wu2o4Lt+HF2us8oUEII9R7 a6R4Hs2BzNxP83rUO4KVT9WOlSdkrPrAxcpHrIU7MljJ7CSGoKMSVNfUuyyq9N346hXr yl3XDkw1CI5Yb5FfllEEA/dxSecacLNTjJil+tetcL3bKYAoO2Krq382cQJYuEC9b0kO 9syA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=82mgWf6zKTcnADNzd91AexJNC3eHu0/OlO4/0BQTV4E=; b=a19HWHI362OxTWHnsibAM4aprYJRGGQYK+ErOomWeNB1+CL73w3C5/dmQebI7qApnQ nv6OsEEN4iIus7l6YB++nveL+PXCL8kLvO2Zn7KNgWjJ4em2jf+UjXqeVu1hKAl9iA4W /MfoXs0ZM721Hfl1ZqELXB52iaaiLTmEH9dgyd/Iata0/dHnR2mDIiQRMQBXvSPpqDDd jhGgcFRN5TF8olTxD8qLxMm94XXgqdHWW5uvWL6Ux/pHJjYWmZDaTB5aFeDR9uCTICEe 6wKI/S9NKldHmRoO7uOj4pCqsWi2FKsudliGBrE0obL/EuoqWC3L9gVImGz3TrzAKA1j A4Vw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vQ0v7wIN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i15-v6si2478942pgf.220.2018.05.28.08.50.38; Mon, 28 May 2018 08:50:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vQ0v7wIN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1034968AbeE1PuM (ORCPT + 99 others); Mon, 28 May 2018 11:50:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:36352 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S936952AbeE1KQN (ORCPT ); Mon, 28 May 2018 06:16:13 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A99A9208A5; Mon, 28 May 2018 10:16:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527502572; bh=fkMzFlABwwIl/bY2AGr0HcylGIsS++VtltemitI/Osk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vQ0v7wINsSgV5rJdHAOkCPiR9PZqHWh0Q4x342gMBBAGlE93LiRXlg0Jg1ffGyKa3 NbUeYmeneI9JStgUgsqC43XakaYJohuSUKxRYHT1kmEpgAyKtGX6aj6MGJ6fpBd1uE qLhMQ0jFSyOKZo19gMoDZr33l6PmrWOcXLbcUohQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Kirill A. Shutemov" , Vlastimil Babka , Andrea Arcangeli , Michal Hocko , "Aneesh Kumar K.V" , Catalin Marinas , David Daney , David Miller , "H. Peter Anvin" , Hugh Dickins , Ingo Molnar , Martin Schwidefsky , Nitin Gupta , Ralf Baechle , Thomas Gleixner , Vineet Gupta , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 4.4 051/268] asm-generic: provide generic_pmdp_establish() Date: Mon, 28 May 2018 12:00:25 +0200 Message-Id: <20180528100207.739905012@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180528100202.045206534@linuxfoundation.org> References: <20180528100202.045206534@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: "Kirill A. Shutemov" [ Upstream commit c58f0bb77ed8bf93dfdde762b01cb67eebbdfc29 ] Patch series "Do not lose dirty bit on THP pages", v4. Vlastimil noted that pmdp_invalidate() is not atomic and we can lose dirty and access bits if CPU sets them after pmdp dereference, but before set_pmd_at(). The bug can lead to data loss, but the race window is tiny and I haven't seen any reports that suggested that it happens in reality. So I don't think it worth sending it to stable. Unfortunately, there's no way to address the issue in a generic way. We need to fix all architectures that support THP one-by-one. All architectures that have THP supported have to provide atomic pmdp_invalidate() that returns previous value. If generic implementation of pmdp_invalidate() is used, architecture needs to provide atomic pmdp_estabish(). pmdp_estabish() is not used out-side generic implementation of pmdp_invalidate() so far, but I think this can change in the future. This patch (of 12): This is an implementation of pmdp_establish() that is only suitable for an architecture that doesn't have hardware dirty/accessed bits. In this case we can't race with CPU which sets these bits and non-atomic approach is fine. Link: http://lkml.kernel.org/r/20171213105756.69879-2-kirill.shutemov@linux.intel.com Signed-off-by: Kirill A. Shutemov Cc: Vlastimil Babka Cc: Andrea Arcangeli Cc: Michal Hocko Cc: Aneesh Kumar K.V Cc: Catalin Marinas Cc: David Daney Cc: David Miller Cc: H. Peter Anvin Cc: Hugh Dickins Cc: Ingo Molnar Cc: Martin Schwidefsky Cc: Nitin Gupta Cc: Ralf Baechle Cc: Thomas Gleixner Cc: Vineet Gupta Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- include/asm-generic/pgtable.h | 15 +++++++++++++++ 1 file changed, 15 insertions(+) --- a/include/asm-generic/pgtable.h +++ b/include/asm-generic/pgtable.h @@ -237,6 +237,21 @@ extern void pgtable_trans_huge_deposit(s extern pgtable_t pgtable_trans_huge_withdraw(struct mm_struct *mm, pmd_t *pmdp); #endif +#ifdef CONFIG_TRANSPARENT_HUGEPAGE +/* + * This is an implementation of pmdp_establish() that is only suitable for an + * architecture that doesn't have hardware dirty/accessed bits. In this case we + * can't race with CPU which sets these bits and non-atomic aproach is fine. + */ +static inline pmd_t generic_pmdp_establish(struct vm_area_struct *vma, + unsigned long address, pmd_t *pmdp, pmd_t pmd) +{ + pmd_t old_pmd = *pmdp; + set_pmd_at(vma->vm_mm, address, pmdp, pmd); + return old_pmd; +} +#endif + #ifndef __HAVE_ARCH_PMDP_INVALIDATE extern void pmdp_invalidate(struct vm_area_struct *vma, unsigned long address, pmd_t *pmdp);