From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 024B61465B4 for ; Mon, 16 Feb 2026 16:52:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771260753; cv=none; b=UnRJjbxISHCdw7KBskxZczdKo5ojid+m6mtM9L40aAb8WQ1fCkyJoPJYz0/E6Y+OYoEikCARwrG3SRy12JGt0v1EqrFHRhj4tMDFvB3bkHCeqQ7L7VqbbzE2NYa3IhAytwakH2fnMrXFB0ETcc4rLWvS+5SvJ2FVYxNEpgEFG/A= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771260753; c=relaxed/simple; bh=kejIfNQ/ArilacxtEjOCeQdaTtHOfmJzImXbfcp1khM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Cokgf+geqS4XdnPBD/bAXVjh/YNoK1YJRGv0x/GQsnBXWd0iu3g7fyw/7XBEpDm7CYuHcCWkgdm34+oXgi4QmfT0q7BEYqxThoT4bUNLJwG7UsChsM5iavi7bgfi5DqfnHk6vZCUhoQ6jGpowPAjWy5yUkabsaDwRN6AwJqWa98= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=sYAnf8e9; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="sYAnf8e9" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 99AD5C19423; Mon, 16 Feb 2026 16:52:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1771260752; bh=kejIfNQ/ArilacxtEjOCeQdaTtHOfmJzImXbfcp1khM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=sYAnf8e9gi0MCHGhEvC7L4deAyYCpDNK+TWzljUoX4dL576nQ4EJTHCbo65M0l9Vn CgZ8btEOqXu46ut0Sgrlbm/sEY368LdKBDhAHm9uaCLEM6rkfuWH2THSqj7rZ8/TQS 59D1JZBhNo1rEwRuef5fqDH4YG2bbNxDimT6AF2Kbi4hmjdSknoNcLHYOJTKvQ6kaL egLm+FQNaL4gxfRLpM37QcDrQI3xSW40E4WRu2a7PlijXwo7HyApBcIt3Jm+GDHevr MzPA46yqwzcF6QILWtAjXS8ID3iOU+ubYBjAndGQutsEt1aaTxzNZSg6Bur75DOIux voyjb+3qIg03Q== From: "David Hildenbrand (Arm)" To: stable@vger.kernel.org Cc: Jane Chu , Harry Yoo , Oscar Salvador , David Hildenbrand , Jann Horn , Liu Shixin , Muchun Song , Andrew Morton , David Hildenbrand Subject: [PATCH 6.12.y 1/4] mm/hugetlb: fix copy_hugetlb_page_range() to use ->pt_share_count Date: Mon, 16 Feb 2026 17:52:09 +0100 Message-ID: <20260216165213.225922-2-david@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260216165213.225922-1-david@kernel.org> References: <2026012600-amusable-mutilator-97ce@gregkh> <20260216165213.225922-1-david@kernel.org> Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: Jane Chu commit 59d9094df3d79 ("mm: hugetlb: independent PMD page table shared count") introduced ->pt_share_count dedicated to hugetlb PMD share count tracking, but omitted fixing copy_hugetlb_page_range(), leaving the function relying on page_count() for tracking that no longer works. When lazy page table copy for hugetlb is disabled, that is, revert commit bcd51a3c679d ("hugetlb: lazy page table copies in fork()") fork()'ing with hugetlb PMD sharing quickly lockup - [ 239.446559] watchdog: BUG: soft lockup - CPU#75 stuck for 27s! [ 239.446611] RIP: 0010:native_queued_spin_lock_slowpath+0x7e/0x2e0 [ 239.446631] Call Trace: [ 239.446633] [ 239.446636] _raw_spin_lock+0x3f/0x60 [ 239.446639] copy_hugetlb_page_range+0x258/0xb50 [ 239.446645] copy_page_range+0x22b/0x2c0 [ 239.446651] dup_mmap+0x3e2/0x770 [ 239.446654] dup_mm.constprop.0+0x5e/0x230 [ 239.446657] copy_process+0xd17/0x1760 [ 239.446660] kernel_clone+0xc0/0x3e0 [ 239.446661] __do_sys_clone+0x65/0xa0 [ 239.446664] do_syscall_64+0x82/0x930 [ 239.446668] ? count_memcg_events+0xd2/0x190 [ 239.446671] ? syscall_trace_enter+0x14e/0x1f0 [ 239.446676] ? syscall_exit_work+0x118/0x150 [ 239.446677] ? arch_exit_to_user_mode_prepare.constprop.0+0x9/0xb0 [ 239.446681] ? clear_bhb_loop+0x30/0x80 [ 239.446684] ? clear_bhb_loop+0x30/0x80 [ 239.446686] entry_SYSCALL_64_after_hwframe+0x76/0x7e There are two options to resolve the potential latent issue: 1. warn against PMD sharing in copy_hugetlb_page_range(), 2. fix it. This patch opts for the second option. While at it, simplify the comment, the details are not actually relevant anymore. Link: https://lkml.kernel.org/r/20250916004520.1604530-1-jane.chu@oracle.com Fixes: 59d9094df3d7 ("mm: hugetlb: independent PMD page table shared count") Signed-off-by: Jane Chu Reviewed-by: Harry Yoo Acked-by: Oscar Salvador Acked-by: David Hildenbrand Cc: Jann Horn Cc: Liu Shixin Cc: Muchun Song Signed-off-by: Andrew Morton (cherry picked from commit 14967a9c7d247841b0312c48dcf8cd29e55a4cc8) Signed-off-by: David Hildenbrand (Arm) --- include/linux/mm_types.h | 5 +++++ mm/hugetlb.c | 15 +++++---------- 2 files changed, 10 insertions(+), 10 deletions(-) diff --git a/include/linux/mm_types.h b/include/linux/mm_types.h index 6894de506b36..23602259259d 100644 --- a/include/linux/mm_types.h +++ b/include/linux/mm_types.h @@ -540,6 +540,11 @@ static inline int ptdesc_pmd_pts_count(struct ptdesc *ptdesc) { return atomic_read(&ptdesc->pt_share_count); } + +static inline bool ptdesc_pmd_is_shared(struct ptdesc *ptdesc) +{ + return !!ptdesc_pmd_pts_count(ptdesc); +} #else static inline void ptdesc_pmd_pts_init(struct ptdesc *ptdesc) { diff --git a/mm/hugetlb.c b/mm/hugetlb.c index d404532ae41e..7014e622980d 100644 --- a/mm/hugetlb.c +++ b/mm/hugetlb.c @@ -5258,18 +5258,13 @@ int copy_hugetlb_page_range(struct mm_struct *dst, struct mm_struct *src, break; } - /* - * If the pagetables are shared don't copy or take references. - * - * dst_pte == src_pte is the common case of src/dest sharing. - * However, src could have 'unshared' and dst shares with - * another vma. So page_count of ptep page is checked instead - * to reliably determine whether pte is shared. - */ - if (page_count(virt_to_page(dst_pte)) > 1) { +#ifdef CONFIG_HUGETLB_PMD_PAGE_TABLE_SHARING + /* If the pagetables are shared, there is nothing to do */ + if (ptdesc_pmd_is_shared(virt_to_ptdesc(dst_pte))) { addr |= last_addr_mask; continue; } +#endif dst_ptl = huge_pte_lock(h, dst, dst_pte); src_ptl = huge_pte_lockptr(h, src, src_pte); @@ -7270,7 +7265,7 @@ int huge_pmd_unshare(struct mm_struct *mm, struct vm_area_struct *vma, hugetlb_vma_assert_locked(vma); if (sz != PMD_SIZE) return 0; - if (!ptdesc_pmd_pts_count(virt_to_ptdesc(ptep))) + if (!ptdesc_pmd_is_shared(virt_to_ptdesc(ptep))) return 0; pud_clear(pud); -- 2.43.0