Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp2533329pxy; Sat, 24 Apr 2021 19:39:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJynZDx5v9nF/18A0dS6BnuRCNR2EcWxDWynXscFLf7Qsr+3cbEnCQE91N5z8sTYmdjiK5oT X-Received: by 2002:a63:f511:: with SMTP id w17mr10858721pgh.416.1619318381634; Sat, 24 Apr 2021 19:39:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619318381; cv=none; d=google.com; s=arc-20160816; b=Rurc54pNMoQFNdN2SXNbeLSN+JPKcF1aKGvbuKwXIgZPnrlsQjSfJ6HaF+OkOBh439 zaUPZQT8jhthx3TmjjXzxuPH+fFfqWkqN1jaH1LidVLBGD1s3NKZGNI1b4phxyvpeIZB SQKKk7qPwBjAD0Ge4slSVetr0xeRjjWG0oVeObrSO7LFjP83XtLJ3oWTup5mKIIfWRhk U2OmySKffdI4p3DN7apkZ0nDO/ii2wLHuTPuhMUdMfNE50ckqEy/Qu18Idaz7MGEWoZb 7coziUxNG7hn2i0Cfb02VJN5ImZ+AgYYhkQT8qBcsx/jNN6WQl0ZZ/oSPJnP1jh4E6gY uMFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=fQvAWdUCDzzv6bfUgFzRlFwkkp6kZp11ugIHzn5cK4c=; b=QfE0bixOZTHUaEfrSFFNmB5pID7H1AKeodFSQ5B7AR4lmYszmlbrGnVZh8Ar8dwTDO zCOlIER4w9h/nHTsMKmnJzot6F2HMNQMUWCXUfTaeSt+mxiLeeng+YMW6QtQ9HXjYuzJ m+HKPt3mUov8KjYhuAXrFLDKCT6tjW2MNE2IXWOg6lVVf31jbI5dSPKUDIJZKHt1rPiH D0jdmKPFv/C7WFsb8Oi4cBrG4lTKu2ZTKCExw5MP71cx8PBJLcCo9njaGkO9x4xL75aw HQ3LSY2mGMcL6eFIs0+E3GpCOwjLCQvlIJ479wm2NW04LW7XLWGu2aCdbeip1pXBvKgy Hfqg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x126si11683766pfb.117.2021.04.24.19.39.16; Sat, 24 Apr 2021 19:39:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230403AbhDYCjG (ORCPT + 99 others); Sat, 24 Apr 2021 22:39:06 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:16155 "EHLO szxga04-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229586AbhDYCjE (ORCPT ); Sat, 24 Apr 2021 22:39:04 -0400 Received: from DGGEMS411-HUB.china.huawei.com (unknown [172.30.72.59]) by szxga04-in.huawei.com (SkyGuard) with ESMTP id 4FSXF36bRQzpbTG; Sun, 25 Apr 2021 10:35:19 +0800 (CST) Received: from huawei.com (10.175.104.174) by DGGEMS411-HUB.china.huawei.com (10.3.19.211) with Microsoft SMTP Server id 14.3.498.0; Sun, 25 Apr 2021 10:38:17 +0800 From: Miaohe Lin To: CC: , , , , , , , , , , , , , , , Subject: [PATCH v4 2/4] swap: fix do_swap_page() race with swapoff Date: Sun, 25 Apr 2021 10:38:04 +0800 Message-ID: <20210425023806.3537283-3-linmiaohe@huawei.com> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20210425023806.3537283-1-linmiaohe@huawei.com> References: <20210425023806.3537283-1-linmiaohe@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.175.104.174] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When I was investigating the swap code, I found the below possible race window: CPU 1 CPU 2 ----- ----- do_swap_page if (data_race(si->flags & SWP_SYNCHRONOUS_IO) swap_readpage if (data_race(sis->flags & SWP_FS_OPS)) { swapoff .. p->swap_file = NULL; .. struct file *swap_file = sis->swap_file; struct address_space *mapping = swap_file->f_mapping;[oops!] Note that for the pages that are swapped in through swap cache, this isn't an issue. Because the page is locked, and the swap entry will be marked with SWAP_HAS_CACHE, so swapoff() can not proceed until the page has been unlocked. Fix this race by using get/put_swap_device() to guard against concurrent swapoff. Fixes: 0bcac06f27d7 ("mm,swap: skip swapcache for swapin of synchronous device") Reported-by: kernel test robot (auto build test ERROR) Signed-off-by: Miaohe Lin --- include/linux/swap.h | 9 +++++++++ mm/memory.c | 11 +++++++++-- 2 files changed, 18 insertions(+), 2 deletions(-) diff --git a/include/linux/swap.h b/include/linux/swap.h index c9e7fea10b83..46d51d058d05 100644 --- a/include/linux/swap.h +++ b/include/linux/swap.h @@ -527,6 +527,15 @@ static inline struct swap_info_struct *swp_swap_info(swp_entry_t entry) return NULL; } +static inline struct swap_info_struct *get_swap_device(swp_entry_t entry) +{ + return NULL; +} + +static inline void put_swap_device(struct swap_info_struct *si) +{ +} + #define swap_address_space(entry) (NULL) #define get_nr_swap_pages() 0L #define total_swap_pages 0L diff --git a/mm/memory.c b/mm/memory.c index 27014c3bde9f..39c910678387 100644 --- a/mm/memory.c +++ b/mm/memory.c @@ -3311,6 +3311,7 @@ vm_fault_t do_swap_page(struct vm_fault *vmf) { struct vm_area_struct *vma = vmf->vma; struct page *page = NULL, *swapcache; + struct swap_info_struct *si = NULL; swp_entry_t entry; pte_t pte; int locked; @@ -3338,14 +3339,16 @@ vm_fault_t do_swap_page(struct vm_fault *vmf) goto out; } + /* Prevent swapoff from happening to us. */ + si = get_swap_device(entry); + if (unlikely(!si)) + goto out; delayacct_set_flag(current, DELAYACCT_PF_SWAPIN); page = lookup_swap_cache(entry, vma, vmf->address); swapcache = page; if (!page) { - struct swap_info_struct *si = swp_swap_info(entry); - if (data_race(si->flags & SWP_SYNCHRONOUS_IO) && __swap_count(entry) == 1) { /* skip swapcache */ @@ -3514,6 +3517,8 @@ vm_fault_t do_swap_page(struct vm_fault *vmf) unlock: pte_unmap_unlock(vmf->pte, vmf->ptl); out: + if (si) + put_swap_device(si); return ret; out_nomap: pte_unmap_unlock(vmf->pte, vmf->ptl); @@ -3525,6 +3530,8 @@ vm_fault_t do_swap_page(struct vm_fault *vmf) unlock_page(swapcache); put_page(swapcache); } + if (si) + put_swap_device(si); return ret; } -- 2.19.1