linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: Baolin Wang <baolin.wang@linux.alibaba.com>
To: Kairui Song <ryncsn@gmail.com>
Cc: linux-mm@kvack.org, Hugh Dickins <hughd@google.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	Kemeng Shi <shikemeng@huaweicloud.com>,
	Nhat Pham <nphamcs@gmail.com>, Chris Li <chrisl@kernel.org>,
	Baoquan He <bhe@redhat.com>, Barry Song <baohua@kernel.org>,
	linux-kernel@vger.kernel.org, stable@vger.kernel.org
Subject: Re: [PATCH] mm/shmem, swap: fix race of truncate and swap entry split
Date: Mon, 12 Jan 2026 16:22:24 +0800	[thread overview]
Message-ID: <1dffe6b1-7a89-4468-8101-35922231f3a6@linux.alibaba.com> (raw)
In-Reply-To: <CAMgjq7ASxBdAakd_3J3O-nPysArLruGO-j4rCHg6OFvvNq7f0g@mail.gmail.com>



On 1/12/26 1:56 PM, Kairui Song wrote:
> On Mon, Jan 12, 2026 at 12:00 PM Baolin Wang
> <baolin.wang@linux.alibaba.com> wrote:
>> On 1/12/26 1:53 AM, Kairui Song wrote:
>>> From: Kairui Song <kasong@tencent.com>
>>>
>>> The helper for shmem swap freeing is not handling the order of swap
>>> entries correctly. It uses xa_cmpxchg_irq to erase the swap entry,
>>> but it gets the entry order before that using xa_get_order
>>> without lock protection. As a result the order could be a stalled value
>>> if the entry is split after the xa_get_order and before the
>>> xa_cmpxchg_irq. In fact that are more way for other races to occur
>>> during the time window.
>>>
>>> To fix that, open code the Xarray cmpxchg and put the order retrivial and
>>> value checking in the same critical section. Also ensure the order won't
>>> exceed the truncate border.
>>>
>>> I observed random swapoff hangs and swap entry leaks when stress
>>> testing ZSWAP with shmem. After applying this patch, the problem is resolved.
>>>
>>> Fixes: 809bc86517cc ("mm: shmem: support large folio swap out")
>>> Cc: stable@vger.kernel.org
>>> Signed-off-by: Kairui Song <kasong@tencent.com>
>>> ---
>>>    mm/shmem.c | 35 +++++++++++++++++++++++------------
>>>    1 file changed, 23 insertions(+), 12 deletions(-)
>>>
>>> diff --git a/mm/shmem.c b/mm/shmem.c
>>> index 0b4c8c70d017..e160da0cd30f 100644
>>> --- a/mm/shmem.c
>>> +++ b/mm/shmem.c
>>> @@ -961,18 +961,28 @@ static void shmem_delete_from_page_cache(struct folio *folio, void *radswap)
>>>     * the number of pages being freed. 0 means entry not found in XArray (0 pages
>>>     * being freed).
>>>     */
>>> -static long shmem_free_swap(struct address_space *mapping,
>>> -                         pgoff_t index, void *radswap)
>>> +static long shmem_free_swap(struct address_space *mapping, pgoff_t index,
>>> +                         unsigned int max_nr, void *radswap)
>>>    {
>>> -     int order = xa_get_order(&mapping->i_pages, index);
>>> -     void *old;
>>> +     XA_STATE(xas, &mapping->i_pages, index);
>>> +     unsigned int nr_pages = 0;
>>> +     void *entry;
>>>
>>> -     old = xa_cmpxchg_irq(&mapping->i_pages, index, radswap, NULL, 0);
>>> -     if (old != radswap)
>>> -             return 0;
>>> -     swap_put_entries_direct(radix_to_swp_entry(radswap), 1 << order);
>>> +     xas_lock_irq(&xas);
>>> +     entry = xas_load(&xas);
>>> +     if (entry == radswap) {
>>> +             nr_pages = 1 << xas_get_order(&xas);
>>> +             if (index == round_down(xas.xa_index, nr_pages) && nr_pages < max_nr)
>>> +                     xas_store(&xas, NULL);
>>> +             else
>>> +                     nr_pages = 0;
>>> +     }
>>> +     xas_unlock_irq(&xas);
>>> +
>>> +     if (nr_pages)
>>> +             swap_put_entries_direct(radix_to_swp_entry(radswap), nr_pages);
>>>
>>> -     return 1 << order;
>>> +     return nr_pages;
>>>    }
>>
>> Thanks for the analysis, and it makes sense to me. Would the following
>> implementation be simpler and also address your issue (we will not
>> release the lock in __xa_cmpxchg() since gfp = 0)?
> 
> Hi Baolin,
> 
>>
>> static long shmem_free_swap(struct address_space *mapping,
>>                               pgoff_t index, void *radswap)
>> {
>>           XA_STATE(xas, &mapping->i_pages, index);
>>           int order;
>>           void *old;
>>
>>           xas_lock_irq(&xas);
>>           order = xas_get_order(&xas);
> 
> Thanks for the suggestion. I did consider implementing it this way,
> but I was worried that the order could grow upwards. For example
> shmem_undo_range is trying to free 0-95 and there is an entry at 64
> with order 5 (64 - 95). Before shmem_free_swap is called, the entry
> was swapped in, then the folio was freed, then an order 6 folio was
> allocated there and swapped out again using the same entry.
> 
> Then here it will free the whole order 6 entry (64 - 127), while
> shmem_undo_range is only supposed to erase (0-96).

Good point. However, this cannot happen during swapoff, because the 
'end' is set to -1 in shmem_evict_inode().

Actually, the real question is how to handle the case where a large swap 
entry happens to cross the 'end' when calling shmem_truncate_range(). If 
the shmem mapping stores a folio, we would split that large folio by 
truncate_inode_partial_folio(). If the shmem mapping stores a large swap 
entry, then as you noted, the truncation range can indeed exceed the 'end'.

But with your change, that large swap entry would not be truncated, and 
I’m not sure whether that might cause other issues. Perhaps the best 
approach is to first split the large swap entry and only truncate the 
swap entries within the 'end' boundary like the 
truncate_inode_partial_folio() does.

Alternatively, this patch could only focus on the race on the order, 
which seems uncontested. As for handling large swap entries that go 
beyond the 'end', should we address that in a follow-up, for example by 
splitting? What do you think?

> That's why I added a max_nr argument to the helper. The GFP == 0 below
> looks not very clean either, that's trivial though.
> 
>>           old = __xa_cmpxchg(xas.xa, index, radswap, NULL, 0);
> 
> Am I overthinking it?



  reply	other threads:[~2026-01-12  8:22 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-01-11 17:53 Kairui Song
2026-01-12  4:00 ` Baolin Wang
2026-01-12  5:56   ` Kairui Song
2026-01-12  8:22     ` Baolin Wang [this message]
2026-01-12  9:55       ` Kairui Song

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1dffe6b1-7a89-4468-8101-35922231f3a6@linux.alibaba.com \
    --to=baolin.wang@linux.alibaba.com \
    --cc=akpm@linux-foundation.org \
    --cc=baohua@kernel.org \
    --cc=bhe@redhat.com \
    --cc=chrisl@kernel.org \
    --cc=hughd@google.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=nphamcs@gmail.com \
    --cc=ryncsn@gmail.com \
    --cc=shikemeng@huaweicloud.com \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox