Received: by 2002:a05:6358:f14:b0:e5:3b68:ec04 with SMTP id b20csp1652459rwj; Sat, 24 Dec 2022 00:52:08 -0800 (PST) X-Google-Smtp-Source: AMrXdXuTn3t8hTLVRTUeCQid7T7GPTS2dHN/Iuk2ZKiUg7+8J7afZHcwBaxvqNMTsPrs5fM4IZFN X-Received: by 2002:a17:902:da86:b0:188:f570:7bdf with SMTP id j6-20020a170902da8600b00188f5707bdfmr17810708plx.40.1671871927785; Sat, 24 Dec 2022 00:52:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1671871927; cv=none; d=google.com; s=arc-20160816; b=UVd7WMb0sEfTkFIzDEXdbMMiXeYD/Yg4WASGoc806AOj4snrJQFVYU0KOvws8jF0Sc +TM3MAl2+vSpncXs4G5LEkcDbzPVi0YrDZ2e9qvOGvDZelrNAfZYX/jNDbyVu94uMLRi NYT/iw7AGUnCz/RlqlmQkfI7U84kT95K+DIFwNcjPnXnj9GPvJvn7ZGb2oMaXfeVqkjn fwl0RMow3xsWJamNHQhhp/PnjjkSZFRBJwJnRh8u7o0x6B8OzZeFiAc5CEiCuwy5iFC3 B3q/f97hksJKWJcMXvEvJIC65cizQMFC/hZoefBZTlzwLkz2AA8ZctMdtE5syhEBl6pf ou2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:mime-version:date :dkim-signature; bh=ihTDH6jZHdlVGdscYLo+1J1fOC8tjCOiHkEMZL35An0=; b=gTC5Ed5B1ogJ37leruxl+cMm1tQl9WBIN96U+69Y/+iTO73HzHNS0FQEwVk18WMBpH GIr9AOk16XMhuyLNqe6Jb0xY14BdtmDLFINlZSlPZjs426g9DgO1vq6pu3auUhi/R2D3 UllEMJixrKQk4GVoVO3xjQ4I9w/Ta4l0J0CE3exOsv7ms2y44vIkr7XNnA8yU+RP74ep cWdCqRHXdHySJOfTfXeUxZGxLUpT8tuW7X5EzYtG3fnWV/Y654Pqrcr/Jf51qN5SSYje TDPemn9CTbzkM60fjTiCK7OT3CDFQNupnpY3FkZvclLNEnIBoRZfm5I9lgTyTH4bt3+H a8oA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=O2Rgjytv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q2-20020a170902edc200b0018c166e2304si5460179plk.299.2022.12.24.00.51.59; Sat, 24 Dec 2022 00:52:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=O2Rgjytv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230386AbiLXIUl (ORCPT + 64 others); Sat, 24 Dec 2022 03:20:41 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58892 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230073AbiLXIUj (ORCPT ); Sat, 24 Dec 2022 03:20:39 -0500 Received: from mail-pf1-x449.google.com (mail-pf1-x449.google.com [IPv6:2607:f8b0:4864:20::449]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6BAFADFA2 for ; Sat, 24 Dec 2022 00:20:38 -0800 (PST) Received: by mail-pf1-x449.google.com with SMTP id k22-20020aa79736000000b0057f3577fdbaso3549972pfg.8 for ; Sat, 24 Dec 2022 00:20:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=ihTDH6jZHdlVGdscYLo+1J1fOC8tjCOiHkEMZL35An0=; b=O2RgjytvDPz+6g9CFcczLL248lQ0CKGMUUPXSrAXNh49DWEMFH6BB2Lu/8S/m1Kd7R Bbsz01ZiRT223Syp1Eh8kai1+ObucV/135HjfhH/GAAJY7X6m0MNIIp+V8920RBGR8RY ft42nde+5+lSZI87XCDPY+KcgYaQE4nB4d1mZWFmGojxerVBeU6Wi9EA+5lLrc0hezdj rTwNYEsX9FdvJGxM1T5juuxMYPYcEZ4eDajArurOQ2qOcm79cw1AWS9I0uiItkwStEHd aYL4JlQ+/BpySpoV/dNjsTPOdw2ifprcV9CU3S2243eAiX/YA4qE6bWLcOQhevfRonxY BV3g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=ihTDH6jZHdlVGdscYLo+1J1fOC8tjCOiHkEMZL35An0=; b=EexG6WmFFnxgFeOfM6h10HPJuyvpZqdCmrA1kcQuv171cR7PhwyQuWrJAtqOp0uC86 I/1FeD5cU3ZJfJLY3HrHeyy3GZxj6sg6qHb17mMGr5kXpxAEyvg1n8X/4GQbDpG6xoS3 5Xi30kAJrHuIkYP+veIFgWpOUAMwhE0Q2QJNykpxY8bWam3YN7PIkFvvkM1wDJtyfHol MjeT7WavxUpqYxTFf+8RCq8H6qc/3+JjQ9awXN6qSMQS/sA+EddEleXwkjODQdpWI6Cf ueAib4oOesbd6ImjEVlMX8/OpKcpnAFoUBKfbPsia1qguQaXBYGMANx+69FpJ5Xx7C9Y xszw== X-Gm-Message-State: AFqh2kprdrSkndIV8AH5O0J/e5Yn0JObmDZ9/nCfqoEMheEICEcusS3i xkHlbPQ6zPabh9C0pn53tGk7nXPlqcxc X-Received: from zokeefe3.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:1b6]) (user=zokeefe job=sendgmr) by 2002:a17:90b:3015:b0:219:c8d5:27d7 with SMTP id hg21-20020a17090b301500b00219c8d527d7mr1200309pjb.141.1671870037941; Sat, 24 Dec 2022 00:20:37 -0800 (PST) Date: Sat, 24 Dec 2022 00:20:34 -0800 Mime-Version: 1.0 X-Mailer: git-send-email 2.39.0.314.g84b9a713c41-goog Message-ID: <20221224082035.3197140-1-zokeefe@google.com> Subject: [PATCH v3 1/2] mm/MADV_COLLAPSE: don't expand collapse when vm_end is past requested end From: "Zach O'Keefe" To: linux-mm@kvack.org Cc: stable@vger.kernel.org, linux-kernel@vger.kernel.org, Andrew Morton , Hugh Dickins , Yang Shi , "Zach O'Keefe" Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org MADV_COLLAPSE acts on one hugepage-aligned/sized region at a time, until it has collapsed all eligible memory contained within the bounds supplied by the user. At the top of each hugepage iteration we (re)lock mmap_lock and (re)validate the VMA for eligibility and update variables that might have changed while mmap_lock was dropped. One thing that might occur, is that the VMA could be resized, and as such, we refetch vma->vm_end to make sure we don't collapse past the end of the VMA's new end. However, it's possible that when refetching vma>vm_end that we expand the region acted on by MADV_COLLAPSE if vma->vm_end is greater than size+len supplied by the user. The consequence here is that we may attempt to collapse more memory than requested, possibly yielding either "too much success" or "false failure" user-visible results. An example of the former is if we MADV_COLLAPSE the first 4MiB of a 2TiB mmap()'d file, the incorrect refetch would cause the operation to block for much longer than anticipated as we attempt to collapse the entire TiB region. An example of the latter is that applying MADV_COLLPSE to a 4MiB file mapped to the start of a 6MiB VMA will successfully collapse the first 4MiB, then incorrectly attempt to collapse the last hugepage-aligned/sized region -- fail (since readahead/page cache lookup will fail) -- and report a failure to the user. Don't expand the acted-on region when refetching vma->vm_end. Fixes: 4d24de9425f7 ("mm: MADV_COLLAPSE: refetch vm_end after reacquiring mmap_lock") Reported-by: Hugh Dickins Signed-off-by: Zach O'Keefe Cc: Yang Shi Cc: stable@vger.kernel.org --- v2->v3: Add 'Cc: stable@vger.kernel.org' as per stable-kernel-rules. v1->v2: Updated changelog to make clear what user-visible issues this patch addresses, as well makes the case for backporting (Andrew Morton). While there aren't any stability risks, without this patch there exist trivial examples where MADV_COLLAPSE won't work; as such, this should be backported to stable 6.1.X to make MADV_COLLAPSE dependable in such cases. v1: https://lore.kernel.org/linux-mm/CAAa6QmRx_b2UCJWE2XZ3=3c3-_N3R4cDGX6Wm4OT7qhFC6U_SQ@mail.gmail.com/T/#m6c91da3cdbd9b1d1ebb29d415962deb158a2c658 --- mm/khugepaged.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mm/khugepaged.c b/mm/khugepaged.c index 5cb401aa2b9d..b4d2ec0a94ed 100644 --- a/mm/khugepaged.c +++ b/mm/khugepaged.c @@ -2649,7 +2649,7 @@ int madvise_collapse(struct vm_area_struct *vma, struct vm_area_struct **prev, goto out_nolock; } - hend = vma->vm_end & HPAGE_PMD_MASK; + hend = min(hend, vma->vm_end & HPAGE_PMD_MASK); } mmap_assert_locked(mm); memset(cc->node_load, 0, sizeof(cc->node_load)); -- 2.39.0.314.g84b9a713c41-goog