From patchwork Wed Jul 31 12:21:03 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Hildenbrand X-Patchwork-Id: 13748605 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8B116C3DA7F for ; Wed, 31 Jul 2024 12:21:17 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 2568B6B0089; Wed, 31 Jul 2024 08:21:17 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 206246B008A; Wed, 31 Jul 2024 08:21:17 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 0CDF36B008C; Wed, 31 Jul 2024 08:21:17 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id E28B16B0089 for ; Wed, 31 Jul 2024 08:21:16 -0400 (EDT) Received: from smtpin19.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 861F4C02FC for ; Wed, 31 Jul 2024 12:21:16 +0000 (UTC) X-FDA: 82399957752.19.1990010 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by imf13.hostedemail.com (Postfix) with ESMTP id E11B52000A for ; Wed, 31 Jul 2024 12:21:13 +0000 (UTC) Authentication-Results: imf13.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=Rzfkowe2; spf=pass (imf13.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=none) header.from=redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1722428446; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:references:dkim-signature; bh=4v7hdRCoEPujGr8jK0JqsH11PIwi+iIoAMYv6jnJbDo=; b=vYRNqLPPgCDKtzPo4UCwSxRwuU/cgn5du4nbJr7tawppz3hOLKEhxK/9izKvgiTy/HL5O7 HQLypYhiJ8xUqnhwWi6SaJlSyE5+hIdZpkRI18dfYmo2DB/5ReLW2M7r3ZYoKObI7XO1y8 nQu28l/qzl9eACOU8/ydSmyzLGG4vCY= ARC-Authentication-Results: i=1; imf13.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=Rzfkowe2; spf=pass (imf13.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=none) header.from=redhat.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1722428446; a=rsa-sha256; cv=none; b=j9dd1CQekEMtaZmiQ8nP2lV69ngHlpgblqJYiG++8BVLUnXllt+vonWcIti/MWD3PdSxgY q9x9zDTo/8rc/ym8NdX2B25syuxg0dXAZtS4uPsTkY8SCsHqHrgyFjhplHY60RfUMvKEML YtP+szIfMlmrE+7Khf+womEAVEc/ZPA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1722428473; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=4v7hdRCoEPujGr8jK0JqsH11PIwi+iIoAMYv6jnJbDo=; b=Rzfkowe2dpfdncQGsUEHEEsu0F9QD48gqzUWmYUiNXBnfiPPjFIrp1K/aeSUh2EtIE/mMx rchPUUhJdBVf7TrBFQQvI6eVF+LjM2UgeenKRAd4Q0/FpWqdmp5J5eJUV5ItwZCDkLBuuC 5m1SqZzPS3+GjxgnUi5faMVa9AHuIF0= Received: from mx-prod-mc-01.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-452-QNNGEfMfNBWqurKlxIlLVw-1; Wed, 31 Jul 2024 08:21:10 -0400 X-MC-Unique: QNNGEfMfNBWqurKlxIlLVw-1 Received: from mx-prod-int-02.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-02.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.15]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-01.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 5C18E1954226; Wed, 31 Jul 2024 12:21:08 +0000 (UTC) Received: from t14s.fritz.box (unknown [10.39.194.74]) by mx-prod-int-02.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id A868C1955D42; Wed, 31 Jul 2024 12:21:04 +0000 (UTC) From: David Hildenbrand To: linux-kernel@vger.kernel.org Cc: linux-mm@kvack.org, David Hildenbrand , James Houghton , stable@vger.kernel.org, Peter Xu , Oscar Salvador , Muchun Song , Baolin Wang Subject: [PATCH v3] mm/hugetlb: fix hugetlb vs. core-mm PT locking Date: Wed, 31 Jul 2024 14:21:03 +0200 Message-ID: <20240731122103.382509-1-david@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.0 on 10.30.177.15 X-Rspamd-Server: rspam03 X-Rspam-User: X-Rspamd-Queue-Id: E11B52000A X-Stat-Signature: 8mb8tqp179xhe9d1w6qor6juxad1r85e X-HE-Tag: 1722428473-575751 X-HE-Meta: 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 R5O0BVUB 3pZn/VKCFYrac0jUJv9SOxF3UyH+rXxdEYiQ+GNjtajaW6ykDBNkR3QpMZqr73yzT+ge/bsxUghpzi3bHvXbFNFJ++f7jTvZnMqzjKV5aHkFGWDkvNbZ4pdwA3MwO38bTZuyhLKDPAzOvprt1dyQJrGIFtvqZ/GWYT7m9S1oqqnoRodS13UZp2wcHl80ubQqw8sWVA7hiRoAfT7yaHZLGBowJkznkwoOIw8K5OJgqv1/4ZKJXmHH9yHrZOeuks/6Ji0icZgaI6afHkz6En+d59iz3wJKPN8DiVYeSNRSYoQaxQE1VuMb52239GA/6nBgXk+iB7wairpkk7/KomlG1q0t7rIacb0PbiZNtq/Z5yhWqQjghvonkK0caigORax2sUdSy4Wjty6q7mqIJl0mS4vwZfQ== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: We recently made GUP's common page table walking code to also walk hugetlb VMAs without most hugetlb special-casing, preparing for the future of having less hugetlb-specific page table walking code in the codebase. Turns out that we missed one page table locking detail: page table locking for hugetlb folios that are not mapped using a single PMD/PUD. Assume we have hugetlb folio that spans multiple PTEs (e.g., 64 KiB hugetlb folios on arm64 with 4 KiB base page size). GUP, as it walks the page tables, will perform a pte_offset_map_lock() to grab the PTE table lock. However, hugetlb that concurrently modifies these page tables would actually grab the mm->page_table_lock: with USE_SPLIT_PTE_PTLOCKS, the locks would differ. Something similar can happen right now with hugetlb folios that span multiple PMDs when USE_SPLIT_PMD_PTLOCKS. This issue can be reproduced [1], for example triggering: [ 3105.936100] ------------[ cut here ]------------ [ 3105.939323] WARNING: CPU: 31 PID: 2732 at mm/gup.c:142 try_grab_folio+0x11c/0x188 [ 3105.944634] Modules linked in: [...] [ 3105.974841] CPU: 31 PID: 2732 Comm: reproducer Not tainted 6.10.0-64.eln141.aarch64 #1 [ 3105.980406] Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-4.fc40 05/24/2024 [ 3105.986185] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 3105.991108] pc : try_grab_folio+0x11c/0x188 [ 3105.994013] lr : follow_page_pte+0xd8/0x430 [ 3105.996986] sp : ffff80008eafb8f0 [ 3105.999346] x29: ffff80008eafb900 x28: ffffffe8d481f380 x27: 00f80001207cff43 [ 3106.004414] x26: 0000000000000001 x25: 0000000000000000 x24: ffff80008eafba48 [ 3106.009520] x23: 0000ffff9372f000 x22: ffff7a54459e2000 x21: ffff7a546c1aa978 [ 3106.014529] x20: ffffffe8d481f3c0 x19: 0000000000610041 x18: 0000000000000001 [ 3106.019506] x17: 0000000000000001 x16: ffffffffffffffff x15: 0000000000000000 [ 3106.024494] x14: ffffb85477fdfe08 x13: 0000ffff9372ffff x12: 0000000000000000 [ 3106.029469] x11: 1fffef4a88a96be1 x10: ffff7a54454b5f0c x9 : ffffb854771b12f0 [ 3106.034324] x8 : 0008000000000000 x7 : ffff7a546c1aa980 x6 : 0008000000000080 [ 3106.038902] x5 : 00000000001207cf x4 : 0000ffff9372f000 x3 : ffffffe8d481f000 [ 3106.043420] x2 : 0000000000610041 x1 : 0000000000000001 x0 : 0000000000000000 [ 3106.047957] Call trace: [ 3106.049522] try_grab_folio+0x11c/0x188 [ 3106.051996] follow_pmd_mask.constprop.0.isra.0+0x150/0x2e0 [ 3106.055527] follow_page_mask+0x1a0/0x2b8 [ 3106.058118] __get_user_pages+0xf0/0x348 [ 3106.060647] faultin_page_range+0xb0/0x360 [ 3106.063651] do_madvise+0x340/0x598 Let's make huge_pte_lockptr() effectively use the same PT locks as any core-mm page table walker would. Add ptep_lockptr() to obtain the PTE page table lock using a pte pointer -- unfortunately we cannot convert pte_lockptr() because virt_to_page() doesn't work with kmap'ed page tables we can have with CONFIG_HIGHPTE. Take care of PTE tables possibly spanning multiple pages, and take care of CONFIG_PGTABLE_LEVELS complexity when e.g., PMD_SIZE == PUD_SIZE. For example, with CONFIG_PGTABLE_LEVELS == 2, core-mm would detect with hugepagesize==PMD_SIZE pmd_leaf() and use the pmd_lockptr(), which would end up just mapping to the per-MM PT lock. There is one ugly case: powerpc 8xx, whereby we have an 8 MiB hugetlb folio being mapped using two PTE page tables. While hugetlb wants to take the PMD table lock, core-mm would grab the PTE table lock of one of both PTE page tables. In such corner cases, we have to make sure that both locks match, which is (fortunately!) currently guaranteed for 8xx as it does not support SMP and consequently doesn't use split PT locks. [1] https://lore.kernel.org/all/1bbfcc7f-f222-45a5-ac44-c5a1381c596d@redhat.com/ Fixes: 9cb28da54643 ("mm/gup: handle hugetlb in the generic follow_page_mask code") Reviewed-by: James Houghton Cc: Cc: Peter Xu Cc: Oscar Salvador Cc: Muchun Song Cc: Baolin Wang Signed-off-by: David Hildenbrand Acked-by: Peter Xu --- Third time is the charm? Retested on arm64 and x86-64. Cross-compiled on a bunch of others. v2 -> v3: * Handle CONFIG_PGTABLE_LEVELS oddities as good as possible. It's a mess. Remove the size >= P4D_SIZE check and simply default to the &mm->page_table_lock. * Align the PTE pointer to the start of the page table to handle PTE page tables bigger than a single page (unclear if this could currently trigger). * Extend patch description v1 -> 2: * Extend patch description * Drop "mm: let pte_lockptr() consume a pte_t pointer" * Introduce ptep_lockptr() in this patch --- include/linux/hugetlb.h | 27 +++++++++++++++++++++++++-- include/linux/mm.h | 22 ++++++++++++++++++++++ 2 files changed, 47 insertions(+), 2 deletions(-) diff --git a/include/linux/hugetlb.h b/include/linux/hugetlb.h index c9bf68c239a01..e6437a06e2346 100644 --- a/include/linux/hugetlb.h +++ b/include/linux/hugetlb.h @@ -944,9 +944,32 @@ static inline bool htlb_allow_alloc_fallback(int reason) static inline spinlock_t *huge_pte_lockptr(struct hstate *h, struct mm_struct *mm, pte_t *pte) { - if (huge_page_size(h) == PMD_SIZE) + unsigned long size = huge_page_size(h); + + VM_WARN_ON(size == PAGE_SIZE); + + /* + * hugetlb must use the exact same PT locks as core-mm page table + * walkers would. When modifying a PTE table, hugetlb must take the + * PTE PT lock, when modifying a PMD table, hugetlb must take the PMD + * PT lock etc. + * + * The expectation is that any hugetlb folio smaller than a PMD is + * always mapped into a single PTE table and that any hugetlb folio + * smaller than a PUD (but at least as big as a PMD) is always mapped + * into a single PMD table. + * + * If that does not hold for an architecture, then that architecture + * must disable split PT locks such that all *_lockptr() functions + * will give us the same result: the per-MM PT lock. + */ + if (size < PMD_SIZE && !IS_ENABLED(CONFIG_HIGHPTE)) + /* pte_alloc_huge() only applies with !CONFIG_HIGHPTE */ + return ptep_lockptr(mm, pte); + else if (size < PUD_SIZE || CONFIG_PGTABLE_LEVELS == 2) return pmd_lockptr(mm, (pmd_t *) pte); - VM_BUG_ON(huge_page_size(h) == PAGE_SIZE); + else if (size < P4D_SIZE || CONFIG_PGTABLE_LEVELS == 3) + return pud_lockptr(mm, (pud_t *) pte); return &mm->page_table_lock; } diff --git a/include/linux/mm.h b/include/linux/mm.h index b100df8cb5857..f6c7fe8f5746f 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -2926,6 +2926,24 @@ static inline spinlock_t *pte_lockptr(struct mm_struct *mm, pmd_t *pmd) return ptlock_ptr(page_ptdesc(pmd_page(*pmd))); } +static inline struct page *ptep_pgtable_page(pte_t *pte) +{ + unsigned long mask = ~(PTRS_PER_PTE * sizeof(pte_t) - 1); + + BUILD_BUG_ON(IS_ENABLED(CONFIG_HIGHPTE)); + return virt_to_page((void *)((unsigned long)pte & mask)); +} + +static inline struct ptdesc *ptep_ptdesc(pte_t *pte) +{ + return page_ptdesc(ptep_pgtable_page(pte)); +} + +static inline spinlock_t *ptep_lockptr(struct mm_struct *mm, pte_t *pte) +{ + return ptlock_ptr(ptep_ptdesc(pte)); +} + static inline bool ptlock_init(struct ptdesc *ptdesc) { /* @@ -2950,6 +2968,10 @@ static inline spinlock_t *pte_lockptr(struct mm_struct *mm, pmd_t *pmd) { return &mm->page_table_lock; } +static inline spinlock_t *ptep_lockptr(struct mm_struct *mm, pte_t *pte) +{ + return &mm->page_table_lock; +} static inline void ptlock_cache_init(void) {} static inline bool ptlock_init(struct ptdesc *ptdesc) { return true; } static inline void ptlock_free(struct ptdesc *ptdesc) {}