Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3760331pxk; Tue, 29 Sep 2020 05:44:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx0dMzrNT7sMfCMggIhGFomUJTwyCtELRrMR64ysDkeoTaOFEbVl9QKdCBpVNd721y1twb4 X-Received: by 2002:a50:8e17:: with SMTP id 23mr2992334edw.31.1601383447921; Tue, 29 Sep 2020 05:44:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601383447; cv=none; d=google.com; s=arc-20160816; b=ahjxZ6r2dZtEjp4ac71paHnoi3BujPLPBItvmMVl2dFADlweAvmJ1O0aOXukfQdoEa 9jvXx46vLl4v4gQVGYN2raSqIl/KGSsO6BJ3oWo8ATayE9qQbXjOwiFp9Wyynuz/6eBQ 2lIp309JvggP19/QTOymqIZngcWM+XrKZAIRVfXkox2nbmZPBPdTCPvBjIg0FKYwDTyP k3taqVJOxtOaHvmact9u54x77K4wNHISYD9uQ/VEUcx38XmaU01FJF1s0mUVk8fYmo50 5OkasxD5ZqXYM3DM9UkMWPHAdhNpnjYVgIsReAOZG3Tez2V47yF8v5YxjbQp66Uo2KRS 9sbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=T9DUXXTqnjWmmkUnpdkwawH1t7+g9pxedOmsRBIChjU=; b=I3co+KlL7UIbBPKoLoLU+9XPDklICLHyug4wtUFmcDT/QLZ7vhGjNzZ7oPx9lYkwaW dgg6c/ls0xAix0WGuAG8Nq+nhMz3Z6s42omSLjOzpHjykZZljG2s9C7YFXWMEIJm8Yab AjowhL+lLdEjRm+SOEc732bbKbJvpAuuly3RjEJCu8utv2X5PVAMXCpMQLHQPmbMil+W xj24PaUYf9s11ux/KTLm96Zk9r5Wy6AcV1UhuMtvVP6sAgmLo9nQTmCgDooh6ejD2sQe BvopVSZ8hNp4TW09IOsbgaXi1aR21NB5NCAHL7nRGHAS6rjYYwFJ1JmKAAMFNtDZtnj0 lBJQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0yqtx51Q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q18si2376625edi.175.2020.09.29.05.43.44; Tue, 29 Sep 2020 05:44:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0yqtx51Q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732974AbgI2Mli (ORCPT + 99 others); Tue, 29 Sep 2020 08:41:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:55310 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728397AbgI2LNJ (ORCPT ); Tue, 29 Sep 2020 07:13:09 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DF12421D41; Tue, 29 Sep 2020 11:13:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1601377988; bh=OI6zH4cSlLqINK1rD2V7WSQUI4c0R7s2bwOVUPWSDqk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0yqtx51Qux6uYOmeE/QPK8BVf4sCTnplCuip77+AbtC+bA7TyMuApboNnZozF7IU+ CRJ9GXtMmFwLBS6Icx1UrgqThHSX2hQr7q0K/E5hpgbRm0AvX+7dubG06JGaMZjpZx vizztDwhn+x9wWeImHOJ4yo+aDgkY/IIe4c7I69g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ralph Campbell , Andrew Morton , Yang Shi , Zi Yan , Jerome Glisse , John Hubbard , Alistair Popple , Christoph Hellwig , Jason Gunthorpe , Bharata B Rao , Ben Skeggs , Shuah Khan , Linus Torvalds , Sasha Levin Subject: [PATCH 4.14 005/166] mm/thp: fix __split_huge_pmd_locked() for migration PMD Date: Tue, 29 Sep 2020 12:58:37 +0200 Message-Id: <20200929105935.455172904@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200929105935.184737111@linuxfoundation.org> References: <20200929105935.184737111@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ralph Campbell [ Upstream commit ec0abae6dcdf7ef88607c869bf35a4b63ce1b370 ] A migrating transparent huge page has to already be unmapped. Otherwise, the page could be modified while it is being copied to a new page and data could be lost. The function __split_huge_pmd() checks for a PMD migration entry before calling __split_huge_pmd_locked() leading one to think that __split_huge_pmd_locked() can handle splitting a migrating PMD. However, the code always increments the page->_mapcount and adjusts the memory control group accounting assuming the page is mapped. Also, if the PMD entry is a migration PMD entry, the call to is_huge_zero_pmd(*pmd) is incorrect because it calls pmd_pfn(pmd) instead of migration_entry_to_pfn(pmd_to_swp_entry(pmd)). Fix these problems by checking for a PMD migration entry. Fixes: 84c3fc4e9c56 ("mm: thp: check pmd migration entry in common path") Signed-off-by: Ralph Campbell Signed-off-by: Andrew Morton Reviewed-by: Yang Shi Reviewed-by: Zi Yan Cc: Jerome Glisse Cc: John Hubbard Cc: Alistair Popple Cc: Christoph Hellwig Cc: Jason Gunthorpe Cc: Bharata B Rao Cc: Ben Skeggs Cc: Shuah Khan Cc: [4.14+] Link: https://lkml.kernel.org/r/20200903183140.19055-1-rcampbell@nvidia.com Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- mm/huge_memory.c | 40 +++++++++++++++++++++++----------------- 1 file changed, 23 insertions(+), 17 deletions(-) diff --git a/mm/huge_memory.c b/mm/huge_memory.c index 9f3d4f84032bc..51068ef1dff5a 100644 --- a/mm/huge_memory.c +++ b/mm/huge_memory.c @@ -2078,7 +2078,7 @@ static void __split_huge_pmd_locked(struct vm_area_struct *vma, pmd_t *pmd, put_page(page); add_mm_counter(mm, MM_FILEPAGES, -HPAGE_PMD_NR); return; - } else if (is_huge_zero_pmd(*pmd)) { + } else if (pmd_trans_huge(*pmd) && is_huge_zero_pmd(*pmd)) { return __split_huge_zero_page_pmd(vma, haddr, pmd); } @@ -2131,27 +2131,33 @@ static void __split_huge_pmd_locked(struct vm_area_struct *vma, pmd_t *pmd, pte = pte_offset_map(&_pmd, addr); BUG_ON(!pte_none(*pte)); set_pte_at(mm, addr, pte, entry); - atomic_inc(&page[i]._mapcount); - pte_unmap(pte); - } - - /* - * Set PG_double_map before dropping compound_mapcount to avoid - * false-negative page_mapped(). - */ - if (compound_mapcount(page) > 1 && !TestSetPageDoubleMap(page)) { - for (i = 0; i < HPAGE_PMD_NR; i++) + if (!pmd_migration) atomic_inc(&page[i]._mapcount); + pte_unmap(pte); } - if (atomic_add_negative(-1, compound_mapcount_ptr(page))) { - /* Last compound_mapcount is gone. */ - __dec_node_page_state(page, NR_ANON_THPS); - if (TestClearPageDoubleMap(page)) { - /* No need in mapcount reference anymore */ + if (!pmd_migration) { + /* + * Set PG_double_map before dropping compound_mapcount to avoid + * false-negative page_mapped(). + */ + if (compound_mapcount(page) > 1 && + !TestSetPageDoubleMap(page)) { for (i = 0; i < HPAGE_PMD_NR; i++) - atomic_dec(&page[i]._mapcount); + atomic_inc(&page[i]._mapcount); + } + + lock_page_memcg(page); + if (atomic_add_negative(-1, compound_mapcount_ptr(page))) { + /* Last compound_mapcount is gone. */ + __dec_lruvec_page_state(page, NR_ANON_THPS); + if (TestClearPageDoubleMap(page)) { + /* No need in mapcount reference anymore */ + for (i = 0; i < HPAGE_PMD_NR; i++) + atomic_dec(&page[i]._mapcount); + } } + unlock_page_memcg(page); } smp_wmb(); /* make pte visible before pmd */ -- 2.25.1