2008-02-28 12:59:08

by Jan Beulich

[permalink] [raw]
Subject: x86: potential ioremap() issues

Ingo,

with the new ioremap() implementation I see a couple of (potential)
issues:
- When ioremap_page_range() fails, remove_vm_area() is used rather
than vunmap() - I think this will cause a 'struct vm_struct' leak.
- While ioremap() continues to happily map RAM pages (with a bogus
[see below] WARN_ON_ONCE()), cacheability of the memory is not
being restored in iounmap().
- The check for RAM pages (except for the WARN_ON_ONCE())
continues to be applied only to lowmem pages.
- The WARN_ON_ONCE() itself is applied to the pfn after the
preceding loop finished, i.e. to a pfn that doesn't actually participate
in the operation. Shouldn't it be moved inside the loop?

Thanks for any clarification,
Jan


2008-02-28 13:24:31

by Ingo Molnar

[permalink] [raw]
Subject: Re: x86: potential ioremap() issues


* Jan Beulich <[email protected]> wrote:

> Ingo,
>
> with the new ioremap() implementation I see a couple of (potential)
> issues:
> - When ioremap_page_range() fails, remove_vm_area() is used rather
> than vunmap() - I think this will cause a 'struct vm_struct' leak.

indeed, good catch - could you check whether the patch below fixes this?
I also pushed this out into x86.git#testing, which you can pick up via:

http://people.redhat.com/mingo/x86.git/README

> - While ioremap() continues to happily map RAM pages (with a bogus
> [see below] WARN_ON_ONCE()), cacheability of the memory is not
> being restored in iounmap().

correct - these are never supposed to be 'true', generally allocated RAM
pages - or like we do with AGP where the pages are exclusively owned we
restore their cacheability explicitly.

> - The check for RAM pages (except for the WARN_ON_ONCE())
> continues to be applied only to lowmem pages.

yes, the biggest constraint from ioremap comes when it applies to pages
that are mapped by the kernel. But i guess we could extend this to all
things RAM ... the second patch below does this. What do you think? I've
queued this up in x86.git#testing as well.

> - The WARN_ON_ONCE() itself is applied to the pfn after the
> preceding loop finished, i.e. to a pfn that doesn't actually participate
> in the operation. Shouldn't it be moved inside the loop?

i removed the WARN_ON_ONCE() from x86.git a few days ago, it's lined up
for the next push.

Ingo

--------------------->
Subject: x86: fix leak un ioremap_page_range() failure
From: Ingo Molnar <[email protected]>
Date: Thu Feb 28 14:02:08 CET 2008

Jan Beulich noticed that if a driver's ioremap() fails (say due to -ENOMEM)
then we might leak the struct vm_area - free it properly.

Signed-off-by: Ingo Molnar <[email protected]>
---
arch/x86/mm/ioremap.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)

Index: linux-x86.q/arch/x86/mm/ioremap.c
===================================================================
--- linux-x86.q.orig/arch/x86/mm/ioremap.c
+++ linux-x86.q/arch/x86/mm/ioremap.c
@@ -179,7 +179,7 @@ static void __iomem *__ioremap(unsigned
area->phys_addr = phys_addr;
vaddr = (unsigned long) area->addr;
if (ioremap_page_range(vaddr, vaddr + size, phys_addr, prot)) {
- remove_vm_area((void *)(vaddr & PAGE_MASK));
+ free_vm_area(area);
return NULL;
}

------------------->
Subject: x86: ioremap(), extend check to all RAM pages
From: Ingo Molnar <[email protected]>
Date: Thu Feb 28 14:10:49 CET 2008

Signed-off-by: Ingo Molnar <[email protected]>
---
arch/x86/mm/ioremap.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)

Index: linux-x86.q/arch/x86/mm/ioremap.c
===================================================================
--- linux-x86.q.orig/arch/x86/mm/ioremap.c
+++ linux-x86.q/arch/x86/mm/ioremap.c
@@ -146,8 +146,9 @@ static void __iomem *__ioremap(unsigned
/*
* Don't allow anybody to remap normal RAM that we're using..
*/
- for (pfn = phys_addr >> PAGE_SHIFT; pfn < max_pfn_mapped &&
- (pfn << PAGE_SHIFT) < last_addr; pfn++) {
+ for (pfn = phys_addr >> PAGE_SHIFT;
+ (pfn << PAGE_SHIFT) < last_addr; pfn++) {
+
if (page_is_ram(pfn) && pfn_valid(pfn) &&
!PageReserved(pfn_to_page(pfn)))
return NULL;

2008-02-28 14:29:53

by Jan Beulich

[permalink] [raw]
Subject: Re: x86: potential ioremap() issues

>> - When ioremap_page_range() fails, remove_vm_area() is used rather
>> than vunmap() - I think this will cause a 'struct vm_struct' leak.
>
>indeed, good catch - could you check whether the patch below fixes this?

Yes, it certainly does. You using it rather than vunmap() makes me notice
other inconsistencies (but harmless in nature): The ioremap_change_attr()
failure case should use the same function, and iounmap() could be
simplified using it, too.

Acked-by: Jan Beulich <[email protected]>

>> - While ioremap() continues to happily map RAM pages (with a bogus
>> [see below] WARN_ON_ONCE()), cacheability of the memory is not
>> being restored in iounmap().
>
>correct - these are never supposed to be 'true', generally allocated RAM
>pages - or like we do with AGP where the pages are exclusively owned we
>restore their cacheability explicitly.

Never supposed to be doesn't mean they really aren't. I think as long as
one permits it, the other should undo its effects. Further more, it would
seem to me that you could easily ioremap() a hot-pluggable (but
unpopulated) memory range, and get into inconsistencies once that
range gets actually populated. Or am I not seeing a safeguard
preventing this?

>> - The check for RAM pages (except for the WARN_ON_ONCE())
>> continues to be applied only to lowmem pages.
>
>yes, the biggest constraint from ioremap comes when it applies to pages
>that are mapped by the kernel. But i guess we could extend this to all
>things RAM ... the second patch below does this. What do you think? I've
>queued this up in x86.git#testing as well.

Yes, that's exactly what I would have thought it should look like.

Acked-by: Jan Beulich <[email protected]>

>> - The WARN_ON_ONCE() itself is applied to the pfn after the
>> preceding loop finished, i.e. to a pfn that doesn't actually participate
>> in the operation. Shouldn't it be moved inside the loop?
>
>i removed the WARN_ON_ONCE() from x86.git a few days ago, it's lined up
>for the next push.

Great, thanks!

Jan

2008-02-29 22:05:16

by Oliver Pinter

[permalink] [raw]
Subject: Re: x86: potential ioremap() issues

Hi Ingo!
this patch is needed for 2.6.22 kernel? I see, this code inarch/x86_64/mm/ioremap.c
/* a k?rd?s az, hogy ezt a patchet backportoljam 2.6.22 al? vagy ne?x86_64 alatt megtal?ltam a cser?lend? k?dr?szt... * k?sz?n?m a v?laszt */On 2/28/08, Ingo Molnar <[email protected]> wrote:>> * Jan Beulich <[email protected]> wrote:>> > Ingo,> >> > with the new ioremap() implementation I see a couple of (potential)> > issues:> > - When ioremap_page_range() fails, remove_vm_area() is used rather> > than vunmap() - I think this will cause a 'struct vm_struct' leak.>> indeed, good catch - could you check whether the patch below fixes this?> I also pushed this out into x86.git#testing, which you can pick up via:>> http://people.redhat.com/mingo/x86.git/README>> > - While ioremap() continues to happily map RAM pages (with a bogus> > [see below] WARN_ON_ONCE()), cacheability of the memory is not> > being restored in iounmap().>> correct - these are never supposed to be 'true', generally allocated RAM> pages - or like we do with AGP where the pages are exclusively owned we> restore their cacheability explicitly.>> > - The check for RAM pages (except for the WARN_ON_ONCE())> > continues to be applied only to lowmem pages.>> yes, the biggest constraint from ioremap comes when it applies to pages> that are mapped by the kernel. But i guess we could extend this to all> things RAM ... the second patch below does this. What do you think? I've> queued this up in x86.git#testing as well.>> > - The WARN_ON_ONCE() itself is applied to the pfn after the> > preceding loop finished, i.e. to a pfn that doesn't actually participate> > in the operation. Shouldn't it be moved inside the loop?>> i removed the WARN_ON_ONCE() from x86.git a few days ago, it's lined up> for the next push.>> Ingo>> --------------------->> Subject: x86: fix leak un ioremap_page_range() failure> From: Ingo Molnar <[email protected]>> Date: Thu Feb 28 14:02:08 CET 2008>> Jan Beulich noticed that if a driver's ioremap() fails (say due to -ENOMEM)> then we might leak the struct vm_area - free it properly.>> Signed-off-by: Ingo Molnar <[email protected]>> ---> arch/x86/mm/ioremap.c | 2 +-> 1 file changed, 1 insertion(+), 1 deletion(-)>> Index: linux-x86.q/arch/x86/mm/ioremap.c> ===================================================================> --- linux-x86.q.orig/arch/x86/mm/ioremap.c> +++ linux-x86.q/arch/x86/mm/ioremap.c> @@ -179,7 +179,7 @@ static void __iomem *__ioremap(unsigned> area->phys_addr = phys_addr;> vaddr = (unsigned long) area->addr;> if (ioremap_page_range(vaddr, vaddr + size, phys_addr, prot)) {> - remove_vm_area((void *)(vaddr & PAGE_MASK));> + free_vm_area(area);> return NULL;> }>> ------------------->> Subject: x86: ioremap(), extend check to all RAM pages> From: Ingo Molnar <[email protected]>> Date: Thu Feb 28 14:10:49 CET 2008>> Signed-off-by: Ingo Molnar <[email protected]>> ---> arch/x86/mm/ioremap.c | 5 +++--> 1 file changed, 3 insertions(+), 2 deletions(-)>> Index: linux-x86.q/arch/x86/mm/ioremap.c> ===================================================================> --- linux-x86.q.orig/arch/x86/mm/ioremap.c> +++ linux-x86.q/arch/x86/mm/ioremap.c> @@ -146,8 +146,9 @@ static void __iomem *__ioremap(unsigned> /*> * Don't allow anybody to remap normal RAM that we're using..> */> - for (pfn = phys_addr >> PAGE_SHIFT; pfn < max_pfn_mapped &&> - (pfn << PAGE_SHIFT) < last_addr; pfn++) {> + for (pfn = phys_addr >> PAGE_SHIFT;> + (pfn << PAGE_SHIFT) < last_addr; pfn++) {> +> if (page_is_ram(pfn) && pfn_valid(pfn) &&> !PageReserved(pfn_to_page(pfn)))> return NULL;> --> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in> the body of a message to [email protected]> More majordomo info at http://vger.kernel.org/majordomo-info.html> Please read the FAQ at http://www.tux.org/lkml/>--Thanks,Oliver????{.n?+???????+%?????ݶ??w??{.n?+????{??G?????{ay?ʇڙ?,j??f???h?????????z_??(?階?ݢj"???m??????G????????????&???~???iO???z??v?^?m???? ????????I?

2008-03-03 10:44:35

by Ingo Molnar

[permalink] [raw]
Subject: Re: x86: potential ioremap() issues


* Oliver Pinter <[email protected]> wrote:

> Hi Ingo!
>
> this patch is needed for 2.6.22 kernel? I see, this code in
> arch/x86_64/mm/ioremap.c

no, should not be needed - these are extra warnings in .25.

Ingo

2008-03-03 15:20:07

by Oliver Pinter

[permalink] [raw]
Subject: Re: x86: potential ioremap() issues

thanks

On 3/3/08, Ingo Molnar <[email protected]> wrote:
>
> * Oliver Pinter <[email protected]> wrote:
>
> > Hi Ingo!
> >
> > this patch is needed for 2.6.22 kernel? I see, this code in
> > arch/x86_64/mm/ioremap.c
>
> no, should not be needed - these are extra warnings in .25.
>
> Ingo
>


--
Thanks,
Oliver