Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2432138imj; Mon, 18 Feb 2019 06:01:12 -0800 (PST) X-Google-Smtp-Source: AHgI3IacwPNnEPbeL23h6/18IgYHwu7/XpKQhaC6grKHnFAADuhrYFO5mII9Tt47iZNl+vyDRImT X-Received: by 2002:a17:902:8344:: with SMTP id z4mr5596634pln.77.1550498472611; Mon, 18 Feb 2019 06:01:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550498472; cv=none; d=google.com; s=arc-20160816; b=Wi1AaEaiNS77G9Exy+bcoIOqnsjJqp3DYY63vxYidaqns9wPzW0EYbYGY4OnrGX2bh CqC3jEq/3nqceg5wzZAsgaOY3aTEiQEHpBVgPmitxKad+oeSEjdV3JhQR1zMOoMiwp9B s7TnEwcYEc4CKOLUDqLzpDXAa9mk+YKyscrMVcoLjNtW5HEFiQ87i832D1qIDxgwfZrq RNknRuJPVSWKqkhgjBWKK0UpZqT3NuWlQhw5eijKbl8ElBSTTfb/0sAgCcRSflX3U5d5 g8cvxHh+Xo6ZvSRxmxfaX4idtT+FBDMBam2DL4ibQgOxyXrbGFOtnJME79//2+beCjTa 0/aA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=uzvTIW/ACLoG/nZeB6TY1wblAQGxKxAlSmI6JRJvF3Q=; b=Ps1GATP0M8wumxoSzraL4FyUM7P8DgZeaq2OUCE+itIw6su7zjKEpyVh5BZp84/iMx SQ8UcCIx+6fPV7l0Fi7i/adGJOaowEV9BbPNB/CFZLR9JfEZOnxbuCoyjtpuLv6bhsO4 3jmuEYqa8obqzXSzYHDPXmr8UGZK3ZnibeXBVNyySNnsPsLR+xLLRVPPz9orPTCljSQS EuoPx1CPIeWKvYnEXSiMxqrz7yc4JQs5ZNb6IpC8K/unKM4XEKJ0nmQM37X88l7z3apN tt+S6X2HRofzRgLeNvqloI43gFJtZp/TaK0xeg6c29+69iWYEonr9o2m5o+3ZJMCEEhf A6Kg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NwpgX1lT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u63si13210497pfi.196.2019.02.18.06.00.56; Mon, 18 Feb 2019 06:01:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NwpgX1lT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388764AbfBROAJ (ORCPT + 99 others); Mon, 18 Feb 2019 09:00:09 -0500 Received: from mail.kernel.org ([198.145.29.99]:41200 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388729AbfBROAE (ORCPT ); Mon, 18 Feb 2019 09:00:04 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0EEED21901; Mon, 18 Feb 2019 14:00:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550498403; bh=aFjieyZYYwveOPYqSr/9Es57ygI1lunuUOj0vtRubAg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NwpgX1lTtQK4iR969mMI814Fxsr7g5XFfyxQer7Y3qtkJv3von0+f1Gvq640x7DCr 777mxTpY8yvE0LLAgjhZpW4HjHqJk7BDzazZq/9ONu4hmAQ+sA1sVCy0ScUQwB9IaV NkrsjMDoi3ysW3jKOjlEJ8NVlDGYzCikqmYKR6uA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Aneesh Kumar K.V" , "Kirill A. Shutemov" , Michael Ellerman , Benjamin Herrenschmidt , Michael Neuling , Paul Mackerras , Balbir Singh , Andrew Morton , Hugh Dickins , Linus Torvalds , Minchan Kim Subject: [PATCH 4.9 58/58] mm: stop leaking PageTables Date: Mon, 18 Feb 2019 14:44:19 +0100 Message-Id: <20190218133512.824952794@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190218133508.567416115@linuxfoundation.org> References: <20190218133508.567416115@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Hugh Dickins commit b0b9b3df27d100a975b4e8818f35382b64a5e35c upstream. 4.10-rc loadtest (even on x86, and even without THPCache) fails with "fork: Cannot allocate memory" or some such; and /proc/meminfo shows PageTables growing. Commit 953c66c2b22a ("mm: THP page cache support for ppc64") that got merged in rc1 removed the freeing of an unused preallocated pagetable after do_fault_around() has called map_pages(). This is usually a good optimization, so that the followup doesn't have to reallocate one; but it's not sufficient to shift the freeing into alloc_set_pte(), since there are failure cases (most commonly VM_FAULT_RETRY) which never reach finish_fault(). Check and free it at the outer level in do_fault(), then we don't need to worry in alloc_set_pte(), and can restore that to how it was (I cannot find any reason to pte_free() under lock as it was doing). And fix a separate pagetable leak, or crash, introduced by the same change, that could only show up on some ppc64: why does do_set_pmd()'s failure case attempt to withdraw a pagetable when it never deposited one, at the same time overwriting (so leaking) the vmf->prealloc_pte? Residue of an earlier implementation, perhaps? Delete it. Fixes: 953c66c2b22a ("mm: THP page cache support for ppc64") Cc: Aneesh Kumar K.V Cc: Kirill A. Shutemov Cc: Michael Ellerman Cc: Benjamin Herrenschmidt Cc: Michael Neuling Cc: Paul Mackerras Cc: Balbir Singh Cc: Andrew Morton Signed-off-by: Hugh Dickins Signed-off-by: Linus Torvalds Signed-off-by: Minchan Kim Signed-off-by: Greg Kroah-Hartman --- mm/memory.c | 21 +++++++++++++++------ 1 file changed, 15 insertions(+), 6 deletions(-) --- a/mm/memory.c +++ b/mm/memory.c @@ -3329,15 +3329,24 @@ static int do_fault(struct fault_env *fe { struct vm_area_struct *vma = fe->vma; pgoff_t pgoff = linear_page_index(vma, fe->address); + int ret; /* The VMA was not fully populated on mmap() or missing VM_DONTEXPAND */ if (!vma->vm_ops->fault) - return VM_FAULT_SIGBUS; - if (!(fe->flags & FAULT_FLAG_WRITE)) - return do_read_fault(fe, pgoff); - if (!(vma->vm_flags & VM_SHARED)) - return do_cow_fault(fe, pgoff); - return do_shared_fault(fe, pgoff); + ret = VM_FAULT_SIGBUS; + else if (!(fe->flags & FAULT_FLAG_WRITE)) + ret = do_read_fault(fe, pgoff); + else if (!(vma->vm_flags & VM_SHARED)) + ret = do_cow_fault(fe, pgoff); + else + ret = do_shared_fault(fe, pgoff); + + /* preallocated pagetable is unused: free it */ + if (fe->prealloc_pte) { + pte_free(vma->vm_mm, fe->prealloc_pte); + fe->prealloc_pte = 0; + } + return ret; } static int numa_migrate_prep(struct page *page, struct vm_area_struct *vma,