]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
4.14-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 18 Jun 2020 16:03:07 +0000 (18:03 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 18 Jun 2020 16:03:07 +0000 (18:03 +0200)
added patches:
mm-thp-make-the-thp-mapcount-atomic-against-__split_huge_pmd_locked.patch

queue-4.14/mm-thp-make-the-thp-mapcount-atomic-against-__split_huge_pmd_locked.patch [new file with mode: 0644]
queue-4.14/series

diff --git a/queue-4.14/mm-thp-make-the-thp-mapcount-atomic-against-__split_huge_pmd_locked.patch b/queue-4.14/mm-thp-make-the-thp-mapcount-atomic-against-__split_huge_pmd_locked.patch
new file mode 100644 (file)
index 0000000..a631d9f
--- /dev/null
@@ -0,0 +1,102 @@
+From c444eb564fb16645c172d550359cb3d75fe8a040 Mon Sep 17 00:00:00 2001
+From: Andrea Arcangeli <aarcange@redhat.com>
+Date: Wed, 27 May 2020 19:06:24 -0400
+Subject: mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()
+
+From: Andrea Arcangeli <aarcange@redhat.com>
+
+commit c444eb564fb16645c172d550359cb3d75fe8a040 upstream.
+
+Write protect anon page faults require an accurate mapcount to decide
+if to break the COW or not. This is implemented in the THP path with
+reuse_swap_page() ->
+page_trans_huge_map_swapcount()/page_trans_huge_mapcount().
+
+If the COW triggers while the other processes sharing the page are
+under a huge pmd split, to do an accurate reading, we must ensure the
+mapcount isn't computed while it's being transferred from the head
+page to the tail pages.
+
+reuse_swap_cache() already runs serialized by the page lock, so it's
+enough to add the page lock around __split_huge_pmd_locked too, in
+order to add the missing serialization.
+
+Note: the commit in "Fixes" is just to facilitate the backporting,
+because the code before such commit didn't try to do an accurate THP
+mapcount calculation and it instead used the page_count() to decide if
+to COW or not. Both the page_count and the pin_count are THP-wide
+refcounts, so they're inaccurate if used in
+reuse_swap_page(). Reverting such commit (besides the unrelated fix to
+the local anon_vma assignment) would have also opened the window for
+memory corruption side effects to certain workloads as documented in
+such commit header.
+
+Signed-off-by: Andrea Arcangeli <aarcange@redhat.com>
+Suggested-by: Jann Horn <jannh@google.com>
+Reported-by: Jann Horn <jannh@google.com>
+Acked-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
+Fixes: 6d0a07edd17c ("mm: thp: calculate the mapcount correctly for THP pages during WP faults")
+Cc: stable@vger.kernel.org
+Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ mm/huge_memory.c |   31 ++++++++++++++++++++++++++++---
+ 1 file changed, 28 insertions(+), 3 deletions(-)
+
+--- a/mm/huge_memory.c
++++ b/mm/huge_memory.c
+@@ -2193,6 +2193,8 @@ void __split_huge_pmd(struct vm_area_str
+       spinlock_t *ptl;
+       struct mm_struct *mm = vma->vm_mm;
+       unsigned long haddr = address & HPAGE_PMD_MASK;
++      bool was_locked = false;
++      pmd_t _pmd;
+       mmu_notifier_invalidate_range_start(mm, haddr, haddr + HPAGE_PMD_SIZE);
+       ptl = pmd_lock(mm, pmd);
+@@ -2202,11 +2204,32 @@ void __split_huge_pmd(struct vm_area_str
+        * pmd against. Otherwise we can end up replacing wrong page.
+        */
+       VM_BUG_ON(freeze && !page);
+-      if (page && page != pmd_page(*pmd))
+-              goto out;
++      if (page) {
++              VM_WARN_ON_ONCE(!PageLocked(page));
++              was_locked = true;
++              if (page != pmd_page(*pmd))
++                      goto out;
++      }
++repeat:
+       if (pmd_trans_huge(*pmd)) {
+-              page = pmd_page(*pmd);
++              if (!page) {
++                      page = pmd_page(*pmd);
++                      if (unlikely(!trylock_page(page))) {
++                              get_page(page);
++                              _pmd = *pmd;
++                              spin_unlock(ptl);
++                              lock_page(page);
++                              spin_lock(ptl);
++                              if (unlikely(!pmd_same(*pmd, _pmd))) {
++                                      unlock_page(page);
++                                      put_page(page);
++                                      page = NULL;
++                                      goto repeat;
++                              }
++                              put_page(page);
++                      }
++              }
+               if (PageMlocked(page))
+                       clear_page_mlock(page);
+       } else if (!(pmd_devmap(*pmd) || is_pmd_migration_entry(*pmd)))
+@@ -2214,6 +2237,8 @@ void __split_huge_pmd(struct vm_area_str
+       __split_huge_pmd_locked(vma, pmd, haddr, freeze);
+ out:
+       spin_unlock(ptl);
++      if (!was_locked && page)
++              unlock_page(page);
+       mmu_notifier_invalidate_range_end(mm, haddr, haddr + HPAGE_PMD_SIZE);
+ }
index 8a1596256e7892a0ce564f2b59ee03d40ddad0ca..998ca6bb25c2d49775972d6e2430c980a1f5c86a 100644 (file)
@@ -138,3 +138,4 @@ cpuidle-fix-three-reference-count-leaks.patch
 platform-x86-hp-wmi-convert-simple_strtoul-to-kstrto.patch
 string.h-fix-incompatibility-between-fortify_source-.patch
 btrfs-send-emit-file-capabilities-after-chown.patch
+mm-thp-make-the-thp-mapcount-atomic-against-__split_huge_pmd_locked.patch