Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3728077pxv; Mon, 28 Jun 2021 11:17:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxixv9GPWUwmxHd6OM6hVGOUU1gH+6cm6BXeYE8V6DDoUCTgCPqNLEFd2kyLvJiwBwPv0e/ X-Received: by 2002:a17:907:2637:: with SMTP id aq23mr26057486ejc.17.1624904276993; Mon, 28 Jun 2021 11:17:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624904276; cv=none; d=google.com; s=arc-20160816; b=D27Pms2yXz39ePa3EO9FP3iAoEtDJGqEH9Upf2wS4vJsqui1FuTzxj6Kz23dTkDHPI 2yVqxD2Khb8jA+ihK5wtRyEc1lJZdghr0oo+OXarDJwH966q/JE8/enLCiGF/NnUXGxJ mdZ9UlmGbZUV14BWeSO74z9EEY0s1wUda+Mhltw38L9q4lXROCir9D7fJ6WrVUFFYNtu VTnN1FV3Js/jSxZ/qgo3ysfY16FbEND45J1I5YFePQv9nUTgyzYfMxTNhYPaPFE5KbJR Qiv08c8Fh3lf3+wrCQU073E9t7cZF9t2OE9LSQMSRbOmK3SBmVouER6ftrPUOWAJpEDQ ztWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=QNqpTVmXBfGy/5EdpDCheNtpkX/Qrz4dsngjewp+nZA=; b=zI6BDMEYseaHBPMKC3kafh6mi796BgV3NYWV2Q2Z8FHKoC9I73cexO0Oy4sKt+Fa0/ bbZdClJrXbxqIh8bCtp/KWvJZVPQMOJgE9n87NWz0l4GRy2EQBNChVPtUNrl51Cb2otG jsqgPYAaI8iegWmhRcMn2IqNc3st0R/x3ntaQi9rHSBXVGACLNSy+wsQd1XogoA9Cwed 237zIJg31OFPR/kiTsv9C3ohSKuPXloiS6CwiNGDBOW97HGAH11tqSxfAEEvVCp94DZ9 6uFxjAKNwxul0wz+r16aeh3OjHAus7nA+Piem0yijtHzy1qIoWigkk8k3CBxQGht9zN+ KZFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ImvMOqHG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y11si14497328edo.520.2021.06.28.11.17.32; Mon, 28 Jun 2021 11:17:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ImvMOqHG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233544AbhF1O2K (ORCPT + 99 others); Mon, 28 Jun 2021 10:28:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:54752 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233478AbhF1OWd (ORCPT ); Mon, 28 Jun 2021 10:22:33 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 325D761C91; Mon, 28 Jun 2021 14:19:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1624889988; bh=VKD+YqSlQndOJUYi9yrM1jtp34IAS0WGjZS9ks/5YT4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ImvMOqHGvX6crlglsa7r9ujIFnnv9w6XPKE5/5tRJEjtXC6ugw2oQsruv1aZUmp/R JBt/Ragoft4NlrS8dUpkQ2jIp4qoTucg0F1HmwbKn4x+A4kLFLtYaTsNqRdwKCm3QN aA6kelNvnAfDnD14dpR7OM1N0sGUQZBkS0aAWM6TmaaAScblf963vuxIv2/zEACdKW fNYXCecSfDIVoLd2zIUysAbVSCw0e6mS1+PaFqmjkaWBB8IMvnf4939JK7Y+yVss92 iQl9/zCqi6w+oMwZZJmtkWETRkARVJU8wt8Gt805m5If53dkkOeBP2NnBeNg6PiM9x a+kJL9HXqgApw== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Hugh Dickins , Alistair Popple , Jan Kara , Jue Wang , "Kirill A . Shutemov" , "Matthew Wilcox (Oracle)" , Miaohe Lin , Minchan Kim , Naoya Horiguchi , Oscar Salvador , Peter Xu , Ralph Campbell , Shakeel Butt , Wang Yugui , Yang Shi , Zi Yan , Andrew Morton , Linus Torvalds , Greg Kroah-Hartman Subject: [PATCH 5.12 085/110] mm/thp: try_to_unmap() use TTU_SYNC for safe splitting Date: Mon, 28 Jun 2021 10:18:03 -0400 Message-Id: <20210628141828.31757-86-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210628141828.31757-1-sashal@kernel.org> References: <20210628141828.31757-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.12.14-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.12.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.12.14-rc1 X-KernelTest-Deadline: 2021-06-30T14:18+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Hugh Dickins commit 732ed55823fc3ad998d43b86bf771887bcc5ec67 upstream. Stressing huge tmpfs often crashed on unmap_page()'s VM_BUG_ON_PAGE (!unmap_success): with dump_page() showing mapcount:1, but then its raw struct page output showing _mapcount ffffffff i.e. mapcount 0. And even if that particular VM_BUG_ON_PAGE(!unmap_success) is removed, it is immediately followed by a VM_BUG_ON_PAGE(compound_mapcount(head)), and further down an IS_ENABLED(CONFIG_DEBUG_VM) total_mapcount BUG(): all indicative of some mapcount difficulty in development here perhaps. But the !CONFIG_DEBUG_VM path handles the failures correctly and silently. I believe the problem is that once a racing unmap has cleared pte or pmd, try_to_unmap_one() may skip taking the page table lock, and emerge from try_to_unmap() before the racing task has reached decrementing mapcount. Instead of abandoning the unsafe VM_BUG_ON_PAGE(), and the ones that follow, use PVMW_SYNC in try_to_unmap_one() in this case: adding TTU_SYNC to the options, and passing that from unmap_page(). When CONFIG_DEBUG_VM, or for non-debug too? Consensus is to do the same for both: the slight overhead added should rarely matter, except perhaps if splitting sparsely-populated multiply-mapped shmem. Once confident that bugs are fixed, TTU_SYNC here can be removed, and the race tolerated. Link: https://lkml.kernel.org/r/c1e95853-8bcd-d8fd-55fa-e7f2488e78f@google.com Fixes: fec89c109f3a ("thp: rewrite freeze_page()/unfreeze_page() with generic rmap walkers") Signed-off-by: Hugh Dickins Cc: Alistair Popple Cc: Jan Kara Cc: Jue Wang Cc: Kirill A. Shutemov Cc: "Matthew Wilcox (Oracle)" Cc: Miaohe Lin Cc: Minchan Kim Cc: Naoya Horiguchi Cc: Oscar Salvador Cc: Peter Xu Cc: Ralph Campbell Cc: Shakeel Butt Cc: Wang Yugui Cc: Yang Shi Cc: Zi Yan Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- include/linux/rmap.h | 1 + mm/huge_memory.c | 2 +- mm/page_vma_mapped.c | 11 +++++++++++ mm/rmap.c | 17 ++++++++++++++++- 4 files changed, 29 insertions(+), 2 deletions(-) diff --git a/include/linux/rmap.h b/include/linux/rmap.h index def5c62c93b3..8d04e7deedc6 100644 --- a/include/linux/rmap.h +++ b/include/linux/rmap.h @@ -91,6 +91,7 @@ enum ttu_flags { TTU_SPLIT_HUGE_PMD = 0x4, /* split huge PMD if any */ TTU_IGNORE_MLOCK = 0x8, /* ignore mlock */ + TTU_SYNC = 0x10, /* avoid racy checks with PVMW_SYNC */ TTU_IGNORE_HWPOISON = 0x20, /* corrupted page is recoverable */ TTU_BATCH_FLUSH = 0x40, /* Batch TLB flushes where possible * and caller guarantees they will diff --git a/mm/huge_memory.c b/mm/huge_memory.c index e1ad01e68aa3..9c71a61e4c59 100644 --- a/mm/huge_memory.c +++ b/mm/huge_memory.c @@ -2358,7 +2358,7 @@ void vma_adjust_trans_huge(struct vm_area_struct *vma, static void unmap_page(struct page *page) { - enum ttu_flags ttu_flags = TTU_IGNORE_MLOCK | + enum ttu_flags ttu_flags = TTU_IGNORE_MLOCK | TTU_SYNC | TTU_RMAP_LOCKED | TTU_SPLIT_HUGE_PMD; bool unmap_success; diff --git a/mm/page_vma_mapped.c b/mm/page_vma_mapped.c index 86e3a3688d59..da6744015abd 100644 --- a/mm/page_vma_mapped.c +++ b/mm/page_vma_mapped.c @@ -212,6 +212,17 @@ restart: pvmw->ptl = NULL; } } else if (!pmd_present(pmde)) { + /* + * If PVMW_SYNC, take and drop THP pmd lock so that we + * cannot return prematurely, while zap_huge_pmd() has + * cleared *pmd but not decremented compound_mapcount(). + */ + if ((pvmw->flags & PVMW_SYNC) && + PageTransCompound(pvmw->page)) { + spinlock_t *ptl = pmd_lock(mm, pvmw->pmd); + + spin_unlock(ptl); + } return false; } if (!map_pte(pvmw)) diff --git a/mm/rmap.c b/mm/rmap.c index b0fc27e77d6d..735a1b514f83 100644 --- a/mm/rmap.c +++ b/mm/rmap.c @@ -1405,6 +1405,15 @@ static bool try_to_unmap_one(struct page *page, struct vm_area_struct *vma, struct mmu_notifier_range range; enum ttu_flags flags = (enum ttu_flags)(long)arg; + /* + * When racing against e.g. zap_pte_range() on another cpu, + * in between its ptep_get_and_clear_full() and page_remove_rmap(), + * try_to_unmap() may return false when it is about to become true, + * if page table locking is skipped: use TTU_SYNC to wait for that. + */ + if (flags & TTU_SYNC) + pvmw.flags = PVMW_SYNC; + /* munlock has nothing to gain from examining un-locked vmas */ if ((flags & TTU_MUNLOCK) && !(vma->vm_flags & VM_LOCKED)) return true; @@ -1777,7 +1786,13 @@ bool try_to_unmap(struct page *page, enum ttu_flags flags) else rmap_walk(page, &rwc); - return !page_mapcount(page) ? true : false; + /* + * When racing against e.g. zap_pte_range() on another cpu, + * in between its ptep_get_and_clear_full() and page_remove_rmap(), + * try_to_unmap() may return false when it is about to become true, + * if page table locking is skipped: use TTU_SYNC to wait for that. + */ + return !page_mapcount(page); } /** -- 2.30.2