Received: by 10.192.165.148 with SMTP id m20csp616606imm; Fri, 20 Apr 2018 12:15:15 -0700 (PDT) X-Google-Smtp-Source: AIpwx48MgrofYXCbfWKgcD45koHFoJrdENHMtzESWxB7yaYH+jWW7HOyGuec9BOfkFtsvXvosNjL X-Received: by 10.98.102.79 with SMTP id a76mr10754006pfc.162.1524251715612; Fri, 20 Apr 2018 12:15:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524251715; cv=none; d=google.com; s=arc-20160816; b=mB2RFKmG2PAUUKbwiVRdPn4XuHuRHk9tTS/LzU19i+8NOVy06hJra3WSjEVx6NRQWA 6iunjQnKjwpvFbHJhk0B0dj6F6RZasdk306C/pLoyvga9Sjlj7nToO0QaumSx36/g7Vq OFivcu8oikov2w86L64AdiKiptW3etykBosWPcw4c0TgJE7UPkDnBGlTTuhLOFRVQUlc 7FDKfXXtF6B3LVNxFuWm/q8jIB9VMn9mycofjSkUiKV4o0MXT7pVWFYwQaBDSU1mgycJ IncHHwAPm5NjrMuGBkrIO+tQSKGpp/zXriLTAnzCUrZjOQvYNVvP4spUnoqYdW99Nusb HUEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:to:from :dkim-signature:arc-authentication-results; bh=G/j3nzu4kpWaSGXAm92NMjl8wyx33/lxJQbqsan76is=; b=sNM3ipGM2v+/ZV9s7Sf4+ePQ/SbfqRc6OhG2O6cjNSR+gN7Xy/KrxWYPcQP9wj7qsW vPXPjl8iLsZHq/Fa7GFNTz/ioy3Oe9/GjAt7axFYijb1x+zyrY8rhSel0lzLynfZ0IeG lENyPH6cPsNKCnDLD3biistlYKuEVOtxGJ5E7FUAIXSOYs+NfberQZ4H6GYQgY2UH00p WYWj0DGkdNGru3cMANuSbySXgOAZ8YxteqAbRbou19QKmngMLJ6jOdV+IRLH2NFfJJuz 9uJtsAPYTv9ZetG/Lr0CpfxkXU6YSUUDPKQJLGLbvApvFzKDgoA/uZ4Y+xZNTlRh8dW+ 15eA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=h9xZ5q9S; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i2-v6si5403560pll.186.2018.04.20.12.14.37; Fri, 20 Apr 2018 12:15:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=h9xZ5q9S; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752160AbeDTTLf (ORCPT + 99 others); Fri, 20 Apr 2018 15:11:35 -0400 Received: from userp2120.oracle.com ([156.151.31.85]:37570 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750858AbeDTTLe (ORCPT ); Fri, 20 Apr 2018 15:11:34 -0400 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w3KJ5t42024397; Fri, 20 Apr 2018 19:10:51 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : subject : date : message-id; s=corp-2017-10-26; bh=G/j3nzu4kpWaSGXAm92NMjl8wyx33/lxJQbqsan76is=; b=h9xZ5q9S+N4nmkzSQdiRf0gdpGcTA+jt0e2RVVFqhROeUPKrKLYdJHraeuJ1Ezs5MFGb 7DW+Zz2LR0J2V/Kxs8dOdXyTswnikL5w7tHuikAs1zZMti6z4cc21dVEJIPDasZ5wyrv YT2h/PGgbpEOdU4WIQIV35VtaKcQzpo9jxoXfqISYTmEwScNlYtY2nAiP81ENl7O37Ne ze50P4QGjgRNBHMaAXjcxSHdgkca7ZNMfDlxUecT45t6ptt8tslqE9NiKtP8VFdfbepH votomGDh41F4AlkxbCWbSa6gD4CrQK+/m9hfcLHVsdP1ZaZ0uYWpVK9z/hLdVIHIhMAP gw== Received: from aserv0021.oracle.com (aserv0021.oracle.com [141.146.126.233]) by userp2120.oracle.com with ESMTP id 2hdrxpe1s6-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 20 Apr 2018 19:10:51 +0000 Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by aserv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w3KJAnbc031936 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 20 Apr 2018 19:10:49 GMT Received: from abhmp0011.oracle.com (abhmp0011.oracle.com [141.146.116.17]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w3KJAlln009896; Fri, 20 Apr 2018 19:10:47 GMT Received: from localhost.localdomain (/98.216.35.41) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 20 Apr 2018 12:10:47 -0700 From: Pavel Tatashin To: steven.sistare@oracle.com, daniel.m.jordan@oracle.com, akpm@linux-foundation.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, mhocko@suse.com, linux-mm@kvack.org, mgorman@techsingularity.net, mingo@kernel.org, peterz@infradead.org, rostedt@goodmis.org, fengguang.wu@intel.com, dennisszhou@gmail.com Subject: [v1] mm: access to uninitialized struct page Date: Fri, 20 Apr 2018 15:10:42 -0400 Message-Id: <20180420191042.23452-1-pasha.tatashin@oracle.com> X-Mailer: git-send-email 2.17.0 X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8869 signatures=668698 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=1 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1804200192 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following two bugs were reported by Fengguang Wu: kernel reboot-without-warning in early-boot stage, last printk: early console in setup code https://lkml.org/lkml/2018/4/18/797 And, also: [per_cpu_ptr_to_phys] PANIC: early exception 0x0d IP 10:ffffffffa892f15f error 0 cr2 0xffff88001fbff000 https://lkml.org/lkml/2018/4/18/387 Both of the problems are due to accessing uninitialized struct page from trap_init(). We must first do mm_init() in order to initialize allocated struct pages, and than we can access fields of any struct page that belongs to memory that's been allocated. Below is explanation of the root cause. The issue arises in this stack: start_kernel() trap_init() setup_cpu_entry_areas() setup_cpu_entry_area(cpu) get_cpu_gdt_paddr(cpu) per_cpu_ptr_to_phys(addr) pcpu_addr_to_page(addr) virt_to_page(addr) pfn_to_page(__pa(addr) >> PAGE_SHIFT) The returned "struct page" is sometimes uninitialized, and thus failing later when used. It turns out sometimes is because it depends on KASLR. When boot is failing we have this when pfn_to_page() is called: kasrl: 0x000000000d600000 addr: ffffffff83e0d000 pa: 1040d000 pfn: 1040d page: ffff88001f113340 page->flags ffffffffffffffff <- Uninitialized! When boot is successful: kaslr: 0x000000000a800000 addr: ffffffff83e0d000 pa: d60d000 pfn: d60d page: ffff88001f05b340 page->flags 280000000000 <- Initialized! Here are physical addresses that BIOS provided to us: e820: BIOS-provided physical RAM map: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved BIOS-e820: [mem 0x0000000000100000-0x000000001ffdffff] usable BIOS-e820: [mem 0x000000001ffe0000-0x000000001fffffff] reserved BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved In both cases, working and non-working the real physical address is the same: pa - kasrl = 0x2E0D000 The only thing that is different is PFN. We initialize struct pages in four places: 1. Early in boot a small set of struct pages is initialized to fill the first section, and lower zones. 2. During mm_init() we initialize "struct pages" for all the memory that is allocated, i.e reserved in memblock. 3. Using on-demand logic when pages are allocated after mm_init call 4. After smp_init() when the rest free deferred pages are initialized. The above path happens before deferred memory is initialized, and thus it must be covered either by 1, 2 or 3. So, lets check what PFNs are initialized after (1). memmap_init_zone() is called for pfn ranges: 1 - 1000, and 1000 - 1ffe0, but it quits after reaching pfn 0x10000, as it leaves the rest to be initialized as deferred pages. In the working scenario pfn ended up being below 1000, but in the failing scenario it is above. Hence, we must initialize this page in (2). But trap_init() is called before mm_init(). The bug was introduced by "mm: initialize pages on demand during boot" because we lowered amount of pages that is initialized in the step (1). But, it still could happen, because the number of initialized pages was a guessing. The current fix moves trap_init() to be called after mm_init, but as alternative, we could increase pgdat->static_init_pgcnt: In free_area_init_node we can increase: pgdat->static_init_pgcnt = min_t(unsigned long, PAGES_PER_SECTION, pgdat->node_spanned_pages); Instead of one PAGES_PER_SECTION, set several, so the text is covered for all KASLR offsets. But, this would still be guessing. Therefore, I prefer the current fix. Fixes: c9e97a1997fb ("mm: initialize pages on demand during boot") Signed-off-by: Pavel Tatashin --- init/main.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/init/main.c b/init/main.c index b795aa341a3a..870f75581cea 100644 --- a/init/main.c +++ b/init/main.c @@ -585,8 +585,8 @@ asmlinkage __visible void __init start_kernel(void) setup_log_buf(0); vfs_caches_init_early(); sort_main_extable(); - trap_init(); mm_init(); + trap_init(); ftrace_init(); -- 2.17.0