From: David Hildenbrand <david@redhat.com>
To: Charan Teja Kalla <quic_charante@quicinc.com>,
akpm@linux-foundation.org, shikemeng@huaweicloud.com,
kasong@tencent.com, nphamcs@gmail.com, bhe@redhat.com,
baohua@kernel.org, chrisl@kernel.org
Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org,
"Liam R. Howlett" <Liam.Howlett@Oracle.com>,
Lorenzo Stoakes <lorenzo.stoakes@oracle.com>
Subject: Re: [PATCH] mm: swap: check for xa_zero_entry() on vma in swapoff path
Date: Fri, 8 Aug 2025 14:04:08 +0200 [thread overview]
Message-ID: <f008107a-2741-476d-9e32-ae9fc0f81838@redhat.com> (raw)
In-Reply-To: <dedf7436-9afa-47f6-b676-88f2dd8b638b@redhat.com>
On 08.08.25 14:01, David Hildenbrand wrote:
> On 08.08.25 11:21, Charan Teja Kalla wrote:
>> It is possible to hit a zero entry while traversing the vmas in
>> unuse_mm(), called from the swapoff path. Not checking the zero entry
>> can result into operating on it as vma which leads into oops.
>>
>> The issue is manifested from the below race between the fork() on a
>> process and swapoff:
>> fork(dup_mmap()) swapoff(unuse_mm)
>> --------------- -----------------
>> 1) Identical mtree is built using
>> __mt_dup().
>>
>> 2) copy_pte_range()-->
>> copy_nonpresent_pte():
>> The dst mm is added into the
>> mmlist to be visible to the
>> swapoff operation.
>>
>> 3) Fatal signal is sent to the parent
>> process(which is the current during the
>> fork) thus skip the duplication of the
>> vmas and mark the vma range with
>> XA_ZERO_ENTRY as a marker for this process
>> that helps during exit_mmap().
>>
>> 4) swapoff is tried on the
>> 'mm' added to the 'mmlist' as
>> part of the 2.
>>
>> 5) unuse_mm(), that iterates
>> through the vma's of this 'mm'
>> will hit the non-NULL zero entry
>> and operating on this zero entry
>> as a vma is resulting into the
>> oops.
>>
>
> That looks like something Liam or Lorenzo could help with reviewing.
> I suspect a proper fix would be around not exposing this
> partially-valid tree to others when droping the mmap lock ...
>
> While we dup the mm, the new process MM is write-locked -- see
> dup_mmap() -- and unuse_mm() will read-lock the mmap_lock. So
> in that period everything is fine.
>
> I guess the culprit is in dup_mmap() when we do on error:
>
> } else {
>
> /*
> * The entire maple tree has already been duplicated. If the
> * mmap duplication fails, mark the failure point with
> * XA_ZERO_ENTRY. In exit_mmap(), if this marker is encountered,
> * stop releasing VMAs that have not been duplicated after this
> * point.
> */
> if (mpnt) {
> mas_set_range(&vmi.mas, mpnt->vm_start, mpnt->vm_end - 1);
> mas_store(&vmi.mas, XA_ZERO_ENTRY);
> /* Avoid OOM iterating a broken tree */
> set_bit(MMF_OOM_SKIP, &mm->flags);
> }
> /*
> * The mm_struct is going to exit, but the locks will be dropped
> * first. Set the mm_struct as unstable is advisable as it is
> * not fully initialised.
> */
> set_bit(MMF_UNSTABLE, &mm->flags);
> }
>
> Shouldn't we just remove anything from the tree here that was not copied
> immediately?
Another fix would be to just check MMF_UNSTABLE in unuse_mm(). But
having these MMF_UNSTABLE checks all over the place feels a bit like
whack-a-mole.
Is there anything preventing us from just leaving a proper tree that
reflects reality in place before we drop the write lock?
--
Cheers,
David / dhildenb
next prev parent reply other threads:[~2025-08-08 12:04 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-08-08 9:21 Charan Teja Kalla
2025-08-08 12:01 ` David Hildenbrand
2025-08-08 12:04 ` David Hildenbrand [this message]
2025-08-11 9:43 ` Charan Teja Kalla
2025-08-11 12:14 ` Lorenzo Stoakes
2025-08-11 13:03 ` David Hildenbrand
2025-08-11 13:08 ` Lorenzo Stoakes
2025-08-11 13:19 ` David Hildenbrand
2025-08-11 13:22 ` Lorenzo Stoakes
2025-08-11 15:17 ` Liam R. Howlett
2025-08-11 15:39 ` David Hildenbrand
2025-08-11 15:48 ` Lorenzo Stoakes
2025-08-11 15:51 ` David Hildenbrand
2025-08-11 15:48 ` Liam R. Howlett
2025-08-11 12:07 ` Lorenzo Stoakes
2025-08-11 16:29 ` Charan Teja Kalla
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=f008107a-2741-476d-9e32-ae9fc0f81838@redhat.com \
--to=david@redhat.com \
--cc=Liam.Howlett@Oracle.com \
--cc=akpm@linux-foundation.org \
--cc=baohua@kernel.org \
--cc=bhe@redhat.com \
--cc=chrisl@kernel.org \
--cc=kasong@tencent.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=lorenzo.stoakes@oracle.com \
--cc=nphamcs@gmail.com \
--cc=quic_charante@quicinc.com \
--cc=shikemeng@huaweicloud.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox