From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id E3171FCD0BA for ; Wed, 18 Mar 2026 06:16:47 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 28A046B00DD; Wed, 18 Mar 2026 02:16:47 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 261596B00EF; Wed, 18 Mar 2026 02:16:47 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 19E036B00F0; Wed, 18 Mar 2026 02:16:47 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id 0B77B6B00DD for ; Wed, 18 Mar 2026 02:16:47 -0400 (EDT) Received: from smtpin30.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id 903751D1CB for ; Wed, 18 Mar 2026 06:16:46 +0000 (UTC) X-FDA: 84558175212.30.E493613 Received: from out-177.mta0.migadu.com (out-177.mta0.migadu.com [91.218.175.177]) by imf19.hostedemail.com (Postfix) with ESMTP id A44431A0005 for ; Wed, 18 Mar 2026 06:16:44 +0000 (UTC) Authentication-Results: imf19.hostedemail.com; dkim=pass header.d=linux.dev header.s=key1 header.b=MNhhNDAi; spf=pass (imf19.hostedemail.com: domain of qi.zheng@linux.dev designates 91.218.175.177 as permitted sender) smtp.mailfrom=qi.zheng@linux.dev; dmarc=pass (policy=none) header.from=linux.dev ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1773814605; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=d0RHFhfIi8eQ/zhOmgjp0C3T+zZS/NNRXu1jd6CQgfE=; b=DLYVCC4avQgyeAfBD95nbp6HzjdJ8eDgdVJYElum07UmgGf1StFHslnms7As0WEBndndvu DJeBMWb63l0VnW17ybQduHRkBnfSk45Bmo6fv/47qaDxZNghW23gFFNiX3KqoMx+U2k65P 3oBUn6gV6M/F4zFOIGeyOxtP5q8qNU8= ARC-Authentication-Results: i=1; imf19.hostedemail.com; dkim=pass header.d=linux.dev header.s=key1 header.b=MNhhNDAi; spf=pass (imf19.hostedemail.com: domain of qi.zheng@linux.dev designates 91.218.175.177 as permitted sender) smtp.mailfrom=qi.zheng@linux.dev; dmarc=pass (policy=none) header.from=linux.dev ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1773814605; a=rsa-sha256; cv=none; b=M2Q7qz25t+/wIP6laS2+YXD8+Lg8vTAMfX2qushqV+Gw/RUUaSlEI6awOHJ0AVJ5GbG0LD I+3AXWGwPXDibLIecm1yR8jkXtCvAJ0XqR/e2pytwo5mZitlmQcuiMReUUi8VFVYZ3n6Zz cvhN7I7CIK02pZ+w3ofiaqbrzhfIOCA= Message-ID: <268abf39-9cd6-412e-b3ec-32fb8fea1684@linux.dev> DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1773814602; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=d0RHFhfIi8eQ/zhOmgjp0C3T+zZS/NNRXu1jd6CQgfE=; b=MNhhNDAiders9o4vuBDcAzvePbJoit8K5gvmIIoWdlrp50PwJUf+0ccBSLX2+cpGB8NFP4 q1IE+M08MhKV/wICLwdON7tPKo7DOZuhgUdxjertAyMvibX1pkaVxZJD6ZB0/U/tNF1tC/ S6nRQOHgMwvohBfj+W6iF4mBoPPNYjg= Date: Wed, 18 Mar 2026 14:16:33 +0800 MIME-Version: 1.0 Subject: Re: [PATCH] mm/pagewalk: fix race between concurrent split and refault To: mboone@akamai.com, Andrew Morton , David Hildenbrand , Lorenzo Stoakes , "Liam R. Howlett" , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, stable@vger.kernel.org References: <20260317-pagewalk-check-pmd-refault-v1-1-f699a010f2b3@akamai.com> X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Qi Zheng In-Reply-To: <20260317-pagewalk-check-pmd-refault-v1-1-f699a010f2b3@akamai.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Migadu-Flow: FLOW_OUT X-Rspamd-Queue-Id: A44431A0005 X-Stat-Signature: 34wa4og9gqdg4kjxjho9g4c6ctnshuca X-Rspam-User: X-Rspamd-Server: rspam06 X-HE-Tag: 1773814604-343267 X-HE-Meta: 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 eYZZwhwI sw8g7SxRHU8OtDiH9V7t5wy6Gl+nehBFQ+vPIHa3I2X7pkUgKx3eJgCNag9PwbbTyVjbiiarp7ZpZ2GTNiyFV372vsAAtOlx6SLo+0bw2ILBm8a3ASrh1RJA3IactMVBIRwMpQohXY012t4nBS4GY+bOVuoni7HJQuDwk4Nrpsipk3z+VwIFFWeJp1i5XHi/2loULYI9gjAhftzgaMChpqb0Hkhj5vudi6SNiPpuKY5E6gBOHPyaE1rL3eiDgtd6sg84K Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Max, On 3/17/26 10:03 PM, Max Boone via B4 Relay wrote: > From: Max Boone > > The splitting of a PUD entry in walk_pud_range() can race with > a concurrent thread refaulting the PUD leaf entry causing it to > try walking a PMD range that has disappeared. > > An example and reproduction of this is to try reading numa_maps of > a process while VFIO-PCI is setting up DMA (specifically the > vfio_pin_pages_remote call) on a large BAR for that process. > > This will trigger a kernel BUG: > vfio-pci 0000:03:00.0: enabling device (0000 -> 0002) > BUG: unable to handle page fault for address: ffffa23980000000 > PGD 0 P4D 0 > Oops: Oops: 0000 [#1] SMP NOPTI > ... > RIP: 0010:walk_pgd_range+0x3b5/0x7a0 > Code: 8d 43 ff 48 89 44 24 28 4d 89 ce 4d 8d a7 00 00 20 00 48 8b 4c 24 > 28 49 81 e4 00 00 e0 ff 49 8d 44 24 ff 48 39 c8 4c 0f 43 e3 <49> f7 06 > 9f ff ff ff 75 3b 48 8b 44 24 20 48 8b 40 28 48 85 c0 74 > RSP: 0018:ffffac23e1ecf808 EFLAGS: 00010287 > RAX: 00007f44c01fffff RBX: 00007f4500000000 RCX: 00007f44ffffffff > RDX: 0000000000000000 RSI: 000ffffffffff000 RDI: ffffffff93378fe0 > RBP: ffffac23e1ecf918 R08: 0000000000000004 R09: ffffa23980000000 > R10: 0000000000000020 R11: 0000000000000004 R12: 00007f44c0200000 > R13: 00007f44c0000000 R14: ffffa23980000000 R15: 00007f44c0000000 > FS: 00007fe884739580(0000) GS:ffff9b7d7a9c0000(0000) > knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: ffffa23980000000 CR3: 000000c0650e2005 CR4: 0000000000770ef0 > PKRU: 55555554 > Call Trace: > > __walk_page_range+0x195/0x1b0 > walk_page_vma+0x62/0xc0 > show_numa_map+0x12b/0x3b0 > seq_read_iter+0x297/0x440 > seq_read+0x11d/0x140 > vfs_read+0xc2/0x340 > ksys_read+0x5f/0xe0 > do_syscall_64+0x68/0x130 > ? get_page_from_freelist+0x5c2/0x17e0 > ? mas_store_prealloc+0x17e/0x360 > ? vma_set_page_prot+0x4c/0xa0 > ? __alloc_pages_noprof+0x14e/0x2d0 > ? __mod_memcg_lruvec_state+0x8d/0x140 > ? __lruvec_stat_mod_folio+0x76/0xb0 > ? __folio_mod_stat+0x26/0x80 > ? do_anonymous_page+0x705/0x900 > ? __handle_mm_fault+0xa8d/0x1000 > ? __count_memcg_events+0x53/0xf0 > ? handle_mm_fault+0xa5/0x360 > ? do_user_addr_fault+0x342/0x640 > ? arch_exit_to_user_mode_prepare.constprop.0+0x16/0xa0 > ? irqentry_exit_to_user_mode+0x24/0x100 > entry_SYSCALL_64_after_hwframe+0x76/0x7e > RIP: 0033:0x7fe88464f47e > Code: c0 e9 b6 fe ff ff 50 48 8d 3d be 07 0b 00 e8 69 01 02 00 66 0f 1f > 84 00 00 00 00 00 64 8b 04 25 18 00 00 00 85 c0 75 14 0f 05 <48> 3d 00 > f0 ff ff 77 5a c3 66 0f 1f 84 00 00 00 00 00 48 83 ec 28 > RSP: 002b:00007ffe6cd9a9b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 > RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007fe88464f47e > RDX: 0000000000020000 RSI: 00007fe884543000 RDI: 0000000000000003 > RBP: 00007fe884543000 R08: 00007fe884542010 R09: 0000000000000000 > R10: fffffffffffffbc5 R11: 0000000000000246 R12: 0000000000000000 > R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000 > > > Fix this by validating the PUD entry in walk_pmd_range() using a stable > snapshot (pudp_get()). If the PUD is not present or is a leaf, retry the > walk via ACTION_AGAIN instead of descending further. This mirrors the > retry logic in walk_pmd_range(). > > Fixes: a00cc7d9dd93 ("mm, x86: add support for PUD-sized transparent hugepages") > Cc: stable@vger.kernel.org > Co-developed-by: David Hildenbrand (Arm) > Signed-off-by: David Hildenbrand (Arm) > Signed-off-by: Max Boone > --- > mm/pagewalk.c | 20 +++++++++++++++++--- > 1 file changed, 17 insertions(+), 3 deletions(-) > > diff --git a/mm/pagewalk.c b/mm/pagewalk.c > index a94c401ab..c74b4d800 100644 > --- a/mm/pagewalk.c > +++ b/mm/pagewalk.c > @@ -97,6 +97,7 @@ static int walk_pte_range(pmd_t *pmd, unsigned long addr, unsigned long end, > static int walk_pmd_range(pud_t *pud, unsigned long addr, unsigned long end, > struct mm_walk *walk) > { > + pud_t pudval = pudp_get(pud); > pmd_t *pmd; > unsigned long next; > const struct mm_walk_ops *ops = walk->ops; > @@ -105,6 +106,18 @@ static int walk_pmd_range(pud_t *pud, unsigned long addr, unsigned long end, > int err = 0; > int depth = real_depth(3); > > + /* > + * For PTE handling, pte_offset_map_lock() takes care of checking > + * whether there actually is a page table. But it also has to be > + * very careful about concurrent page table reclaim. If we spot a PMD > + * table, it cannot go away, so we can just walk it. However, if we find > + * something else, we have to retry. > + */ > + if (!pud_present(pudval) || pud_leaf(pudval)) { > + walk->action = ACTION_AGAIN; > + return 0; > + } > + > pmd = pmd_offset(pud, addr); > do { > again: > @@ -218,12 +231,13 @@ static int walk_pud_range(p4d_t *p4d, unsigned long addr, unsigned long end, > else if (pud_leaf(*pud) || !pud_present(*pud)) > continue; /* Nothing to do. */ Why not check pudval directly here? Like the following: if (pud_leaf(*pud) || !pud_present(*pud)) goto again; > > - if (pud_none(*pud)) > - goto again; > - > err = walk_pmd_range(pud, addr, next, walk); > if (err) > break; > + > + if (walk->action == ACTION_AGAIN) > + goto again; > + > } while (pud++, addr = next, addr != end); > > return err; > > --- > base-commit: b4f0dd314b39ea154f62f3bd3115ed0470f9f71e > change-id: 20260317-pagewalk-check-pmd-refault-de8f14fbe6a5 > > Best regards,