On Sat, Nov 22, 2025 at 03:48:08PM +0200, Konstantin Belousov wrote:
> On Sat, Nov 22, 2025 at 01:23:00PM +0100, Michal Meloun wrote:
> > 
> > 
> > On 21.11.2025 21:02, Konstantin Belousov wrote:
> > > On Fri, Nov 21, 2025 at 09:54:23PM +0200, Konstantin Belousov wrote:
> > > > On Fri, Nov 21, 2025 at 08:08:47PM +0100, Michal Meloun wrote:
> > > > > First, many thanks for your efforts, but this check doesn't trigger 
> > > > > when the
> > > > > problem occurs
> > > > > 
> > > > Hm, ok.  This is a data point, in fact.
> > > > 
> > > > > 
> > > > > To be more precise, testing case
> > > > > on fresh kernel(d8bfcacd12aba73188c44a157c707908e275825d)
> > > > > with PMAP_DEBUG defined in pmap-v6.c and with
> > > > > trivial zero check for first page at this place ->
> > > > > https://cgit.freebsd.org/src/tree/contrib/jemalloc/src/pages.c#n281
> > > > > 
> > > > > causes this failure:
> > > > > 
> > > > > __je_pages_map: addr: 0x0, ret: 0x3087b000, size: 4096, alignment: 
> > > > > 4096,
> > > > > prot: 0x00000003, flags: 0x0C001002
> > > > > __je_pages_map: i: 0, p[i]: 0xFFFFFFFF, p: 0x3087b000
> > > > > __je_pages_map: i: 23, p[i]: 0x308E5F94, p: 0x3087b000
> > > > 
> > > > Could you, please, when the failure is detected, spawn 'procstat -v 
> > > > <pid>'
> > > > and dump the memory map of the process?  To be clear, I want to see all
> > > > of this:
> > > > - the address of the mapping returned by mmap
> > > > - its size
> > > > - the location of the first non-zero byte
> > > > - memory map
> > > 
> > > Also, regardless of the output above, please try this as a wild guess:
> > > 
> > > diff --git a/sys/vm/vm_object.c b/sys/vm/vm_object.c
> > > index 5b4517d2bf0c..5c6ed51706bf 100644
> > > --- a/sys/vm/vm_object.c
> > > +++ b/sys/vm/vm_object.c
> > > @@ -2222,7 +2222,7 @@ vm_object_coalesce(vm_object_t prev_object, 
> > > vm_ooffset_t prev_offset,
> > >            * Remove any pages that may still be in the object from a 
> > > previous
> > >            * deallocation.
> > >            */
> > > - if (next_pindex < prev_object->size) {
> > > + if (true || next_pindex < prev_object->size) {
> > >                   vm_object_page_remove(prev_object, next_pindex, 
> > > next_pindex +
> > >                       next_size, 0);
> > >   #if 0
> > > 
> > I finally found the right way to obtain both parts of report in synchronized
> > and straightforward way.
> > The outputs from procstat -v are in the Outputs from procstat -v are in
> > attachments, I hope that the mailing list won't eat them.
> > These are without this patch.
> > 
> > About this patch - this does not solve the problem, but it measurable
> > reduces its likelihood.
> 
> So in both cases you reported below (skipped) the problem indeed appeared
> in the case where we extend existing mapping, potentially causing the
> object to reuse the dandling pages after the object' end.  This must
> explain why the debugging patch did not catched anything.
> 
> It is somewhat strange that the vm_object_coalesce() patch has the
> non-deterministic effect, but lets see.  Below is the big hammer,
> disabling the extension for the anon mappings at all.  Again, I want to
> know if it helps.  This is a debugging aid, not a fix.  It should cause
> large(r) fragmentation of the process map, and possibly much larger
> kernel memory use, but I hope it is usable for test.
> 
> diff --git a/sys/vm/vm_map.c b/sys/vm/vm_map.c
> index 6b09552c5fee..6a1db58d2d13 100644
> --- a/sys/vm/vm_map.c
> +++ b/sys/vm/vm_map.c
> @@ -1732,7 +1732,7 @@ vm_map_insert1(vm_map_t map, vm_object_t object, 
> vm_ooffset_t offset,
>                               vm_object_clear_flag(object, OBJ_ONEMAPPING);
>                       VM_OBJECT_WUNLOCK(object);
>               }
> -     } else if ((prev_entry->eflags & ~MAP_ENTRY_USER_WIRED) ==
> +     } else if (false && (prev_entry->eflags & ~MAP_ENTRY_USER_WIRED) ==
>           protoeflags &&
>           (cow & (MAP_STACK_AREA | MAP_VN_EXEC)) == 0 &&
>           prev_entry->end == start && (prev_entry->cred == cred ||
> 

Independent from the patch above, please test the following enhancement
to the vm_object_coalesce() patch.  There, I have some hope that this
might be a proper fix.

commit 012ea1ce604a59d790661c25656c1c641d33d6ec
Author: Konstantin Belousov <[email protected]>
Date:   Sat Nov 22 16:02:50 2025 +0200

    vm_object_coalesce(): fix logic to detect coalesce possibility, simplify

diff --git a/sys/vm/vm_object.c b/sys/vm/vm_object.c
index 5b4517d2bf0c..d59327cf22ca 100644
--- a/sys/vm/vm_object.c
+++ b/sys/vm/vm_object.c
@@ -2188,9 +2188,14 @@ vm_object_coalesce(vm_object_t prev_object, vm_ooffset_t 
prev_offset,
        prev_size >>= PAGE_SHIFT;
        next_size >>= PAGE_SHIFT;
        next_pindex = OFF_TO_IDX(prev_offset) + prev_size;
+       KASSERT(next_pindex + next_size > prev_object->size,
+           ("vm_object_coalesce: "
+           "obj %p next_pindex %#jx next_size %#jx obj_size %#jx",
+           prev_object, (uintmax_t)next_pindex, (uintmax_t)next_size,
+           (uintmax_t)prev_object->size));
 
-       if (prev_object->ref_count > 1 &&
-           prev_object->size != next_pindex &&
+       if (prev_object->ref_count > 1 ||
+           prev_object->size != next_pindex ||
            (prev_object->flags & OBJ_ONEMAPPING) == 0) {
                VM_OBJECT_WUNLOCK(prev_object);
                return (FALSE);
@@ -2222,26 +2227,13 @@ vm_object_coalesce(vm_object_t prev_object, 
vm_ooffset_t prev_offset,
         * Remove any pages that may still be in the object from a previous
         * deallocation.
         */
-       if (next_pindex < prev_object->size) {
-               vm_object_page_remove(prev_object, next_pindex, next_pindex +
-                   next_size, 0);
-#if 0
-               if (prev_object->cred != NULL) {
-                       KASSERT(prev_object->charge >=
-                           ptoa(prev_object->size - next_pindex),
-                           ("object %p overcharged 1 %jx %jx", prev_object,
-                               (uintmax_t)next_pindex, (uintmax_t)next_size));
-                       prev_object->charge -= ptoa(prev_object->size -
-                           next_pindex);
-               }
-#endif
-       }
+       vm_object_page_remove(prev_object, next_pindex, next_pindex +
+           next_size, 0);
 
        /*
         * Extend the object if necessary.
         */
-       if (next_pindex + next_size > prev_object->size)
-               prev_object->size = next_pindex + next_size;
+       prev_object->size = next_pindex + next_size;
 
        VM_OBJECT_WUNLOCK(prev_object);
        return (TRUE);

Reply via email to