Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2527980imm; Mon, 28 May 2018 09:47:50 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqJzcRjggSGRf/i/Ue8oKIzLymIVaunFY1SPpBRCcP0rx9fSy/rXsM00PXVpdN7+ewBRYpb X-Received: by 2002:a17:902:b946:: with SMTP id h6-v6mr14758976pls.3.1527526070532; Mon, 28 May 2018 09:47:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527526070; cv=none; d=google.com; s=arc-20160816; b=yp26+Ws1VbikaREgw5m9R+ya+ssI8If0GQMlZr0z5K/U/jF41hVl9R9KvIyBZaMeD/ N8yVIcKDAsOGE//Evv37Q8isMZeyN/aISpEXP12hNt8WOFQKV4n2KvVhmLcT2tc0J7gQ jQGf4b9SzlCSV6PmdNZCZM1zhnm7a+SBCH/eQoQyrT71+GDfE2GjyWdTMMk1ngNt0e7d KiiZcrZaiByeUg6KBJSV183a2b7llmBi32DIKcih6+1Cd9odF3PK5hScRLGx5Zd/ty+v rpDUQzvtAL6n2vV2GwKRwfOoFVuyZXhC671ccn7xCIeFmTXgJ+RcISUAGOr3uMdxgPnU MHgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=vi15mOVPG/Qy0AFruNx5dGHme64YQyk5LB1uD2+VS+0=; b=JY0dbjzSYNZU79fr0VfjahHejCTRegQpurUH+olckW/3v/uGgBo3MnH/Okndh6rGfp Jn/Wdh49gn4dNtKBb27LLYmdRu8+e6wwLZG5eMvaeeM2XXlJsFL5k3i1QCdqPWr88uN8 jbzeogkdFfFc1QoqWIUPtLlhH8pqshmUjLqTNCjhTVXGPxcAF8IR/IzJ7Y1TwuKJItmh jDaQXQ/RmWiRd/oYcGrZchOA1xp3Prf2JFbDczh9F7xD+Na/FclLlltyuXntaqlGRM8j AxUBFsLMvi4nrV0Ie9MYN0fenMXPjG6VhtzRQmT1vLQUFZ6mtbsCwsp8hz2EM+c7TrQh dvRw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xouw1Rx3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 7-v6si31085795pll.212.2018.05.28.09.47.35; Mon, 28 May 2018 09:47:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xouw1Rx3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1425468AbeE1QqY (ORCPT + 99 others); Mon, 28 May 2018 12:46:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:55048 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932198AbeE1KHC (ORCPT ); Mon, 28 May 2018 06:07:02 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4316E20876; Mon, 28 May 2018 10:07:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527502021; bh=045TxR67YhFnLvzEXaC+j0cRxBTD5EP0x/+t8bL5vPc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xouw1Rx3o7qCc0lz6LJqsEP/VwQwhP+YepKoKLggOVYOekXhN7Fdr0hf09zoQ20ig ONQTYVE74NF7qV/qwSWJyhf3W+1yI0JPfDA5RbwOhBh/VsEJYBJEeDCNEbyy+DxOEH UbFFU8vUUKKzcNEKd8bIF4C4s6Z+haT1UcLXzVIs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Kirill A. Shutemov" , Vlastimil Babka , Andrea Arcangeli , Michal Hocko , "Aneesh Kumar K.V" , Catalin Marinas , David Daney , David Miller , "H. Peter Anvin" , Hugh Dickins , Ingo Molnar , Martin Schwidefsky , Nitin Gupta , Ralf Baechle , Thomas Gleixner , Vineet Gupta , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 3.18 031/185] asm-generic: provide generic_pmdp_establish() Date: Mon, 28 May 2018 12:01:12 +0200 Message-Id: <20180528100052.466166017@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180528100050.700971285@linuxfoundation.org> References: <20180528100050.700971285@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: "Kirill A. Shutemov" [ Upstream commit c58f0bb77ed8bf93dfdde762b01cb67eebbdfc29 ] Patch series "Do not lose dirty bit on THP pages", v4. Vlastimil noted that pmdp_invalidate() is not atomic and we can lose dirty and access bits if CPU sets them after pmdp dereference, but before set_pmd_at(). The bug can lead to data loss, but the race window is tiny and I haven't seen any reports that suggested that it happens in reality. So I don't think it worth sending it to stable. Unfortunately, there's no way to address the issue in a generic way. We need to fix all architectures that support THP one-by-one. All architectures that have THP supported have to provide atomic pmdp_invalidate() that returns previous value. If generic implementation of pmdp_invalidate() is used, architecture needs to provide atomic pmdp_estabish(). pmdp_estabish() is not used out-side generic implementation of pmdp_invalidate() so far, but I think this can change in the future. This patch (of 12): This is an implementation of pmdp_establish() that is only suitable for an architecture that doesn't have hardware dirty/accessed bits. In this case we can't race with CPU which sets these bits and non-atomic approach is fine. Link: http://lkml.kernel.org/r/20171213105756.69879-2-kirill.shutemov@linux.intel.com Signed-off-by: Kirill A. Shutemov Cc: Vlastimil Babka Cc: Andrea Arcangeli Cc: Michal Hocko Cc: Aneesh Kumar K.V Cc: Catalin Marinas Cc: David Daney Cc: David Miller Cc: H. Peter Anvin Cc: Hugh Dickins Cc: Ingo Molnar Cc: Martin Schwidefsky Cc: Nitin Gupta Cc: Ralf Baechle Cc: Thomas Gleixner Cc: Vineet Gupta Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- include/asm-generic/pgtable.h | 15 +++++++++++++++ 1 file changed, 15 insertions(+) --- a/include/asm-generic/pgtable.h +++ b/include/asm-generic/pgtable.h @@ -181,6 +181,21 @@ extern void pgtable_trans_huge_deposit(s extern pgtable_t pgtable_trans_huge_withdraw(struct mm_struct *mm, pmd_t *pmdp); #endif +#ifdef CONFIG_TRANSPARENT_HUGEPAGE +/* + * This is an implementation of pmdp_establish() that is only suitable for an + * architecture that doesn't have hardware dirty/accessed bits. In this case we + * can't race with CPU which sets these bits and non-atomic aproach is fine. + */ +static inline pmd_t generic_pmdp_establish(struct vm_area_struct *vma, + unsigned long address, pmd_t *pmdp, pmd_t pmd) +{ + pmd_t old_pmd = *pmdp; + set_pmd_at(vma->vm_mm, address, pmdp, pmd); + return old_pmd; +} +#endif + #ifndef __HAVE_ARCH_PMDP_INVALIDATE extern void pmdp_invalidate(struct vm_area_struct *vma, unsigned long address, pmd_t *pmdp);