Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp4169030imm; Mon, 30 Jul 2018 09:47:23 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdxKqvJP/i4o/ZZRY5ambfM+BHOlS9BxS92++K46hVqMPwanq7+9DV+tMj2ZkdjtuiRHNcD X-Received: by 2002:a63:3d41:: with SMTP id k62-v6mr17104482pga.254.1532969243220; Mon, 30 Jul 2018 09:47:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532969243; cv=none; d=google.com; s=arc-20160816; b=YoSsZWKUettMnbabuz+jOZotVfh717tQvhZ8+7tfOVLSi5UWkL+oP5uHYkvamEfv6p pRKnX/6YS0Na2gBhUV0CGl/calyqk8Ndy5ijhNkiZ6/AgFQWfvhKYie60ZUPkDTQ2l5c d+2IxFgf19WU0+jRkr+MhhZiF4Nnp9UPTIYv8hQK0ZQLSjpL/F+FuwKqdqu4rUidHgdr u8RdTbAjkoL2+MC3MAPUnC0xj0IWZ//CcyDLfMIr1i6M6EU5u/VC5s6vI3EZdLmLf8EL bqQHaifkLQ2GU6tKs8REwUyMx5b8UVlLGvYKj46KLgbutK9hV0kJymo2FiLgZqUATi1U OmiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:arc-authentication-results; bh=03JrjOSNbpQ9+Wmc47cYSkWAfFU235f1uJrZSouYewU=; b=z0S4qpxLH020EHrWbq+tzrhBaxLqXIDzDvs40uEuktG6hOjAB1Z6oIeMqTATGrj0KM 6XqAtIfbBGEWIm2IexDxbFJlqZpt9fKhorpIcq81u779zq8Cncb78/eEfqnL/trsoZHS 5Mig0moyKdP/ZnLaGm3O7qINK3Q5sADQnxrtRQSjbgs1z96zTWGOn7DW2OcocsGEHxfy /O59+DU5ghx/2JPQJ1tQ8vn49QtMQ6eRvYLL0YGR+DVv/7XDry9/QOzGY/bEoYo837J2 lAInvAx6PZojHOyGkz3wKvcUPLzmM5N9n4wnkd5RBPS6ACIle4KubIkZn/WORLFMGHVY eixA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q8-v6si11820003pgh.675.2018.07.30.09.47.09; Mon, 30 Jul 2018 09:47:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732144AbeG3SVB (ORCPT + 99 others); Mon, 30 Jul 2018 14:21:01 -0400 Received: from mx2.suse.de ([195.135.220.15]:60106 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730607AbeG3SVA (ORCPT ); Mon, 30 Jul 2018 14:21:00 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id C176BACEA; Mon, 30 Jul 2018 16:45:09 +0000 (UTC) Date: Mon, 30 Jul 2018 09:44:59 -0700 From: Davidlohr Bueso To: Jane Chu Cc: akpm@linux-foundation.org, dan.j.williams@intel.com, mhocko@suse.com, jack@suse.cz, jglisse@redhat.com, mike.kravetz@oracle.com, linux-mm@kvack.org, linux-nvdimm@lists.01.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] ipc/shm.c add ->pagesize function to shm_vm_ops Message-ID: <20180730164459.zduhnk7itoldqnom@linux-r8p5> Mail-Followup-To: Jane Chu , akpm@linux-foundation.org, dan.j.williams@intel.com, mhocko@suse.com, jack@suse.cz, jglisse@redhat.com, mike.kravetz@oracle.com, linux-mm@kvack.org, linux-nvdimm@lists.01.org, linux-kernel@vger.kernel.org References: <20180727211727.5020-1-jane.chu@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20180727211727.5020-1-jane.chu@oracle.com> User-Agent: NeoMutt/20170912 (1.9.0) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 27 Jul 2018, Jane Chu wrote: >Commit 05ea88608d4e13 (mm, hugetlbfs: introduce ->pagesize() to >vm_operations_struct) adds a new ->pagesize() function to >hugetlb_vm_ops, intended to cover all hugetlbfs backed files. > >With System V shared memory model, if "huge page" is specified, >the "shared memory" is backed by hugetlbfs files, but the mappings >initiated via shmget/shmat have their original vm_ops overwritten >with shm_vm_ops, so we need to add a ->pagesize function to shm_vm_ops. >Otherwise, vma_kernel_pagesize() returns PAGE_SIZE given a hugetlbfs >backed vma, result in below BUG: > >fs/hugetlbfs/inode.c > 443 if (unlikely(page_mapped(page))) { > 444 BUG_ON(truncate_op); > >[ 242.268342] hugetlbfs: oracle (4592): Using mlock ulimits for SHM_HUGETLB is deprecated >[ 282.653208] ------------[ cut here ]------------ >[ 282.708447] kernel BUG at fs/hugetlbfs/inode.c:444! >[ 282.818957] Modules linked in: nfsv3 rpcsec_gss_krb5 nfsv4 ... >[ 284.025873] CPU: 35 PID: 5583 Comm: oracle_5583_sbt Not tainted 4.14.35-1829.el7uek.x86_64 #2 >[ 284.246609] task: ffff9bf0507aaf80 task.stack: ffffa9e625628000 >[ 284.317455] RIP: 0010:remove_inode_hugepages+0x3db/0x3e2 >.... >[ 285.292389] Call Trace: >[ 285.321630] hugetlbfs_evict_inode+0x1e/0x3e >[ 285.372707] evict+0xdb/0x1af >[ 285.408185] iput+0x1a2/0x1f7 >[ 285.443661] dentry_unlink_inode+0xc6/0xf0 >[ 285.492661] __dentry_kill+0xd8/0x18d >[ 285.536459] dput+0x1b5/0x1ed >[ 285.571939] __fput+0x18b/0x216 >[ 285.609495] ____fput+0xe/0x10 >[ 285.646030] task_work_run+0x90/0xa7 >[ 285.688788] exit_to_usermode_loop+0xdd/0x116 >[ 285.740905] do_syscall_64+0x187/0x1ae >[ 285.785740] entry_SYSCALL_64_after_hwframe+0x150/0x0 > >Suggested-by: Mike Kravetz >Signed-off-by: Jane Chu Acked-by: Davidlohr Bueso