From patchwork Thu Aug 1 20:47:48 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Hildenbrand X-Patchwork-Id: 13750896 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3D733C3DA4A for ; Thu, 1 Aug 2024 20:48:05 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id BCF066B007B; Thu, 1 Aug 2024 16:48:04 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id B7F696B0082; Thu, 1 Aug 2024 16:48:04 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A46A26B0083; Thu, 1 Aug 2024 16:48:04 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 87DC06B007B for ; Thu, 1 Aug 2024 16:48:04 -0400 (EDT) Received: from smtpin13.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id 2D243120F9B for ; Thu, 1 Aug 2024 20:48:04 +0000 (UTC) X-FDA: 82404863688.13.215CD39 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by imf16.hostedemail.com (Postfix) with ESMTP id 6EC74180013 for ; Thu, 1 Aug 2024 20:48:02 +0000 (UTC) Authentication-Results: imf16.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=cvDsXtTy; spf=pass (imf16.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=none) header.from=redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1722545225; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:references:dkim-signature; bh=Em9QXh7s0f8Gn7XuNBOkOXxpgK+MAGfwo3YiJhSDOFc=; b=FMfE2GLZ3CmVxzMtRP7WSqmOy1l1xMP/NVoFdQKUnakewNbHnIHIIbpE0svMOcaZkG7v/g p9IY/Bn9UumHMGXtN+7QaPYQfP7FeDHD+LvxFj4l+EhRXtbUOdhJlKPKUYJhQrfm8liMl0 u0J9coIXwSYzpZdIyfAjb+hBVcQs4gI= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1722545225; a=rsa-sha256; cv=none; b=p+0nYvKyBIG3Xiv0jMjMwaT44glkRqGK8boUuClFMFTKQFQB2S3wGxC8KywKdcNdcksxsM pOnaiWgUKNAy15sHQ0YyB9e4i8/NsEPwmzg1GfihV7kEYeUEa7iJCa8UXUfUKbTm1/dMDV PjF8n7xtv793G2ml+3V4fNjz36cyi+M= ARC-Authentication-Results: i=1; imf16.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=cvDsXtTy; spf=pass (imf16.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=none) header.from=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1722545281; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=Em9QXh7s0f8Gn7XuNBOkOXxpgK+MAGfwo3YiJhSDOFc=; b=cvDsXtTyZtY44be8dHT3dRVZSGEsOSLa//laOypgKyd2BwY59/Nxr1CgUVseDp3XKCyqZs ovXDdxQUWQuvShVhL1k90e5MzQbVqYEqwstAjZNEQ1IXnnuvLlY1irImDd4qFi9wCPK7Ut CsDWCjgUMSPP2gVhm+nBiAEK7t/hJaE= Received: from mx-prod-mc-02.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-226-B3EKHJcyNv-z5L-25fzwYw-1; Thu, 01 Aug 2024 16:47:55 -0400 X-MC-Unique: B3EKHJcyNv-z5L-25fzwYw-1 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-02.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id DE0C61955D48; Thu, 1 Aug 2024 20:47:53 +0000 (UTC) Received: from t14s.redhat.com (unknown [10.39.192.46]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id D526819560AA; Thu, 1 Aug 2024 20:47:49 +0000 (UTC) From: David Hildenbrand To: linux-kernel@vger.kernel.org Cc: linux-mm@kvack.org, David Hildenbrand , Peter Xu , stable@vger.kernel.org, Oscar Salvador , Muchun Song , Baolin Wang Subject: [PATCH v4] mm/hugetlb: fix hugetlb vs. core-mm PT locking Date: Thu, 1 Aug 2024 22:47:48 +0200 Message-ID: <20240801204748.99107-1-david@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 X-Stat-Signature: 34kga4mmnh8ny6txdutu6u38y8xjt7t9 X-Rspamd-Queue-Id: 6EC74180013 X-Rspam-User: X-Rspamd-Server: rspam08 X-HE-Tag: 1722545282-287941 X-HE-Meta: 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 M+C+lQsS V2gjNHiFGXpBpO8vV/Rv1jiZ9xk50zpL4KJfEhUwkpXRLOiemqFcr8SdxEwdit2efN/p+zEuLLD2swJY2HddQ6lVDTMQsWjAke0dQmZYHvtweVsBnBNfoCqgWIbQLoj8CRrc+h5KnF/7Zs6sQ0O9VqArvoAbP5TBlVi1vEdnQYzBYn+2VyoaLoJbMF2NwbgfSuDSwhsY5hEtwu315uPr4SDLb+zMf6XSJeCtZWKbzL3nhJUx0y7BrtSOznjrrqSdDXLlMSerS9zMnqoIliEcsAsrPrlsPUJkuliuWl1K/f+Qu5ZFchsluMScgHXFUxIPoJOkg6CYihWU8ayHh6gAvKq6JIYfK0LESe6+LG25MXVHYvNdT4XrBVr8Yjzcyucy7hN5o X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: We recently made GUP's common page table walking code to also walk hugetlb VMAs without most hugetlb special-casing, preparing for the future of having less hugetlb-specific page table walking code in the codebase. Turns out that we missed one page table locking detail: page table locking for hugetlb folios that are not mapped using a single PMD/PUD. Assume we have hugetlb folio that spans multiple PTEs (e.g., 64 KiB hugetlb folios on arm64 with 4 KiB base page size). GUP, as it walks the page tables, will perform a pte_offset_map_lock() to grab the PTE table lock. However, hugetlb that concurrently modifies these page tables would actually grab the mm->page_table_lock: with USE_SPLIT_PTE_PTLOCKS, the locks would differ. Something similar can happen right now with hugetlb folios that span multiple PMDs when USE_SPLIT_PMD_PTLOCKS. This issue can be reproduced [1], for example triggering: [ 3105.936100] ------------[ cut here ]------------ [ 3105.939323] WARNING: CPU: 31 PID: 2732 at mm/gup.c:142 try_grab_folio+0x11c/0x188 [ 3105.944634] Modules linked in: [...] [ 3105.974841] CPU: 31 PID: 2732 Comm: reproducer Not tainted 6.10.0-64.eln141.aarch64 #1 [ 3105.980406] Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-4.fc40 05/24/2024 [ 3105.986185] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 3105.991108] pc : try_grab_folio+0x11c/0x188 [ 3105.994013] lr : follow_page_pte+0xd8/0x430 [ 3105.996986] sp : ffff80008eafb8f0 [ 3105.999346] x29: ffff80008eafb900 x28: ffffffe8d481f380 x27: 00f80001207cff43 [ 3106.004414] x26: 0000000000000001 x25: 0000000000000000 x24: ffff80008eafba48 [ 3106.009520] x23: 0000ffff9372f000 x22: ffff7a54459e2000 x21: ffff7a546c1aa978 [ 3106.014529] x20: ffffffe8d481f3c0 x19: 0000000000610041 x18: 0000000000000001 [ 3106.019506] x17: 0000000000000001 x16: ffffffffffffffff x15: 0000000000000000 [ 3106.024494] x14: ffffb85477fdfe08 x13: 0000ffff9372ffff x12: 0000000000000000 [ 3106.029469] x11: 1fffef4a88a96be1 x10: ffff7a54454b5f0c x9 : ffffb854771b12f0 [ 3106.034324] x8 : 0008000000000000 x7 : ffff7a546c1aa980 x6 : 0008000000000080 [ 3106.038902] x5 : 00000000001207cf x4 : 0000ffff9372f000 x3 : ffffffe8d481f000 [ 3106.043420] x2 : 0000000000610041 x1 : 0000000000000001 x0 : 0000000000000000 [ 3106.047957] Call trace: [ 3106.049522] try_grab_folio+0x11c/0x188 [ 3106.051996] follow_pmd_mask.constprop.0.isra.0+0x150/0x2e0 [ 3106.055527] follow_page_mask+0x1a0/0x2b8 [ 3106.058118] __get_user_pages+0xf0/0x348 [ 3106.060647] faultin_page_range+0xb0/0x360 [ 3106.063651] do_madvise+0x340/0x598 Let's make huge_pte_lockptr() effectively use the same PT locks as any core-mm page table walker would. Add ptep_lockptr() to obtain the PTE page table lock using a pte pointer -- unfortunately we cannot convert pte_lockptr() because virt_to_page() doesn't work with kmap'ed page tables we can have with CONFIG_HIGHPTE. Handle CONFIG_PGTABLE_LEVELS correctly by checking in reverse order, such that when e.g., CONFIG_PGTABLE_LEVELS==2 with PGDIR_SIZE==P4D_SIZE==PUD_SIZE==PMD_SIZE will work as expected. Document why that works. There is one ugly case: powerpc 8xx, whereby we have an 8 MiB hugetlb folio being mapped using two PTE page tables. While hugetlb wants to take the PMD table lock, core-mm would grab the PTE table lock of one of both PTE page tables. In such corner cases, we have to make sure that both locks match, which is (fortunately!) currently guaranteed for 8xx as it does not support SMP and consequently doesn't use split PT locks. [1] https://lore.kernel.org/all/1bbfcc7f-f222-45a5-ac44-c5a1381c596d@redhat.com/ Fixes: 9cb28da54643 ("mm/gup: handle hugetlb in the generic follow_page_mask code") Acked-by: Peter Xu Cc: Cc: Peter Xu Cc: Oscar Salvador Cc: Muchun Song Cc: Baolin Wang Signed-off-by: David Hildenbrand Reviewed-by: Baolin Wang Tested-by: Baolin Wang --- @James, I dropped your RB. Retested on arm64 and x86-64. Cross-compiled on a bunch of others. v3 -> v4: * Replace PTE pointer alignment by BUILD_BUG_ON() * Simplify lock lookup by looking up in reverse * Adjust comment and patch description v2 -> v3: * Handle CONFIG_PGTABLE_LEVELS oddities as good as possible. It's a mess. Remove the size >= P4D_SIZE check and simply default to the &mm->page_table_lock. * Align the PTE pointer to the start of the page table to handle PTE page tables bigger than a single page (unclear if this could currently trigger). * Extend patch description v1 -> 2: * Extend patch description * Drop "mm: let pte_lockptr() consume a pte_t pointer" * Introduce ptep_lockptr() in this patch --- include/linux/hugetlb.h | 33 ++++++++++++++++++++++++++++++--- include/linux/mm.h | 11 +++++++++++ 2 files changed, 41 insertions(+), 3 deletions(-) diff --git a/include/linux/hugetlb.h b/include/linux/hugetlb.h index 8e462205400d..ac3ea8596f93 100644 --- a/include/linux/hugetlb.h +++ b/include/linux/hugetlb.h @@ -938,10 +938,37 @@ static inline bool htlb_allow_alloc_fallback(int reason) static inline spinlock_t *huge_pte_lockptr(struct hstate *h, struct mm_struct *mm, pte_t *pte) { - if (huge_page_size(h) == PMD_SIZE) + const unsigned long size = huge_page_size(h); + + VM_WARN_ON(size == PAGE_SIZE); + + /* + * hugetlb must use the exact same PT locks as core-mm page table + * walkers would. When modifying a PTE table, hugetlb must take the + * PTE PT lock, when modifying a PMD table, hugetlb must take the PMD + * PT lock etc. + * + * The expectation is that any hugetlb folio smaller than a PMD is + * always mapped into a single PTE table and that any hugetlb folio + * smaller than a PUD (but at least as big as a PMD) is always mapped + * into a single PMD table. + * + * If that does not hold for an architecture, then that architecture + * must disable split PT locks such that all *_lockptr() functions + * will give us the same result: the per-MM PT lock. + * + * Note that with e.g., CONFIG_PGTABLE_LEVELS=2 where + * PGDIR_SIZE==P4D_SIZE==PUD_SIZE==PMD_SIZE, we'd use pud_lockptr() + * and core-mm would use pmd_lockptr(). However, in such configurations + * split PMD locks are disabled -- they don't make sense on a single + * PGDIR page table -- and the end result is the same. + */ + if (size >= PUD_SIZE) + return pud_lockptr(mm, (pud_t *) pte); + else if (size >= PMD_SIZE || IS_ENABLED(CONFIG_HIGHPTE)) return pmd_lockptr(mm, (pmd_t *) pte); - VM_BUG_ON(huge_page_size(h) == PAGE_SIZE); - return &mm->page_table_lock; + /* pte_alloc_huge() only applies with !CONFIG_HIGHPTE */ + return ptep_lockptr(mm, pte); } #ifndef hugepages_supported diff --git a/include/linux/mm.h b/include/linux/mm.h index a890a1731c14..bd219ac9c026 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -2869,6 +2869,13 @@ static inline spinlock_t *pte_lockptr(struct mm_struct *mm, pmd_t *pmd) return ptlock_ptr(page_ptdesc(pmd_page(*pmd))); } +static inline spinlock_t *ptep_lockptr(struct mm_struct *mm, pte_t *pte) +{ + BUILD_BUG_ON(IS_ENABLED(CONFIG_HIGHPTE)); + BUILD_BUG_ON(MAX_PTRS_PER_PTE * sizeof(pte_t) > PAGE_SIZE); + return ptlock_ptr(virt_to_ptdesc(pte)); +} + static inline bool ptlock_init(struct ptdesc *ptdesc) { /* @@ -2893,6 +2900,10 @@ static inline spinlock_t *pte_lockptr(struct mm_struct *mm, pmd_t *pmd) { return &mm->page_table_lock; } +static inline spinlock_t *ptep_lockptr(struct mm_struct *mm, pte_t *pte) +{ + return &mm->page_table_lock; +} static inline void ptlock_cache_init(void) {} static inline bool ptlock_init(struct ptdesc *ptdesc) { return true; } static inline void ptlock_free(struct ptdesc *ptdesc) {}