Received: by 10.192.165.148 with SMTP id m20csp539235imm; Wed, 25 Apr 2018 03:57:06 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/M2dexpnq6l+9R1nZwzDjdxVqkBy5EptJSxz41Oa0vVlesLWR3BBOiKXZdTzxTZnqkYu8+ X-Received: by 10.99.156.9 with SMTP id f9mr16780982pge.274.1524653826260; Wed, 25 Apr 2018 03:57:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524653826; cv=none; d=google.com; s=arc-20160816; b=iK6t2sNMIbwLCdQYH23BreIGk8aJQqqF+WsGHVES2GV4a8rtgqgPQPTWE2qhEii6z+ 2jP9AhmRk9Gq0SkEJwS6fUuUath+mQ2B580jfaUWJQSBfkl3ohECnjfHU5zQjMuk6zZY Ys4bUVXxpCV2jeU1LWUTADBvyNqjRJyVtet/l4PZrHHuMqzWoZbZ8YgHFHQamez2KkAC CLUg5yfHyMPjdv1pN62D6kOIY+6os4rpL9J3x5OnHWKcD0YpsGhGJvA/CTmluZVX3RbQ V56hpLO1nuokedY/YgooDmFiHzULwXf5VnSD8rcrB+dniyWMF1Ri0xFiCMvnxK8TKlNK 1J5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=njlWwEyAZWhiuZLrT1BUx8T4BhPrHPz/L4xgUOMUGQ4=; b=aLtz4sw9g4rKiHN/L5Tetmcsv0uIZeHogNxjjzYxoSqws6dyEr/UGCVS+TD8A3ENjJ PCq5A+wBI5JmKFlXG9ua+vVGkkiGcg2/IwptmFGKN3rj8ibXG9/R1ub+MNga1NXi86Cx z5WNPWLUEtY7Fcae8NKPBMkUMVx7BshCcyAtgeE67QUpFXL2Yl1o+LDLB6C9Z9DOS6Nc rjUcPPDv4b0hYc/vYjoaMSet0kxiH5y18u9OAFN2OjuLW7qPHfvgWuphM2iLSYC03IkA 62LyMW+K51I5sxxeRHPObJFmhM8As1S0/UGEhm17/hO8lCuMtE64BYew+lx4MYVxVjsf 2fkQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 1-v6si15844047plw.519.2018.04.25.03.56.52; Wed, 25 Apr 2018 03:57:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753645AbeDYKzh (ORCPT + 99 others); Wed, 25 Apr 2018 06:55:37 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:52950 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754195AbeDYKnT (ORCPT ); Wed, 25 Apr 2018 06:43:19 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 8B0A249F; Wed, 25 Apr 2018 10:43:18 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yisheng Xie , Tan Xiaojun , Vlastimil Babka , Andi Kleen , Chris Salls , Christopher Lameter , David Rientjes , Ingo Molnar , Naoya Horiguchi , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 4.14 111/183] mm/mempolicy: fix the check of nodemask from user Date: Wed, 25 Apr 2018 12:35:31 +0200 Message-Id: <20180425103246.911628954@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180425103242.532713678@linuxfoundation.org> References: <20180425103242.532713678@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Yisheng Xie [ Upstream commit 56521e7a02b7b84a5e72691a1fb15570e6055545 ] As Xiaojun reported the ltp of migrate_pages01 will fail on arm64 system which has 4 nodes[0...3], all have memory and CONFIG_NODES_SHIFT=2: migrate_pages01 0 TINFO : test_invalid_nodes migrate_pages01 14 TFAIL : migrate_pages_common.c:45: unexpected failure - returned value = 0, expected: -1 migrate_pages01 15 TFAIL : migrate_pages_common.c:55: call succeeded unexpectedly In this case the test_invalid_nodes of migrate_pages01 will call: SYSC_migrate_pages as: migrate_pages(0, , {0x0000000000000001}, 64, , {0x0000000000000010}, 64) = 0 The new nodes specifies one or more node IDs that are greater than the maximum supported node ID, however, the errno is not set to EINVAL as expected. As man pages of set_mempolicy[1], mbind[2], and migrate_pages[3] mentioned, when nodemask specifies one or more node IDs that are greater than the maximum supported node ID, the errno should set to EINVAL. However, get_nodes only check whether the part of bits [BITS_PER_LONG*BITS_TO_LONGS(MAX_NUMNODES), maxnode) is zero or not, and remain [MAX_NUMNODES, BITS_PER_LONG*BITS_TO_LONGS(MAX_NUMNODES) unchecked. This patch is to check the bits of [MAX_NUMNODES, maxnode) in get_nodes to let migrate_pages set the errno to EINVAL when nodemask specifies one or more node IDs that are greater than the maximum supported node ID, which follows the manpage's guide. [1] http://man7.org/linux/man-pages/man2/set_mempolicy.2.html [2] http://man7.org/linux/man-pages/man2/mbind.2.html [3] http://man7.org/linux/man-pages/man2/migrate_pages.2.html Link: http://lkml.kernel.org/r/1510882624-44342-3-git-send-email-xieyisheng1@huawei.com Signed-off-by: Yisheng Xie Reported-by: Tan Xiaojun Acked-by: Vlastimil Babka Cc: Andi Kleen Cc: Chris Salls Cc: Christopher Lameter Cc: David Rientjes Cc: Ingo Molnar Cc: Naoya Horiguchi Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- mm/mempolicy.c | 23 ++++++++++++++++++++--- 1 file changed, 20 insertions(+), 3 deletions(-) --- a/mm/mempolicy.c +++ b/mm/mempolicy.c @@ -1262,6 +1262,7 @@ static int get_nodes(nodemask_t *nodes, unsigned long maxnode) { unsigned long k; + unsigned long t; unsigned long nlongs; unsigned long endmask; @@ -1278,13 +1279,19 @@ static int get_nodes(nodemask_t *nodes, else endmask = (1UL << (maxnode % BITS_PER_LONG)) - 1; - /* When the user specified more nodes than supported just check - if the non supported part is all zero. */ + /* + * When the user specified more nodes than supported just check + * if the non supported part is all zero. + * + * If maxnode have more longs than MAX_NUMNODES, check + * the bits in that area first. And then go through to + * check the rest bits which equal or bigger than MAX_NUMNODES. + * Otherwise, just check bits [MAX_NUMNODES, maxnode). + */ if (nlongs > BITS_TO_LONGS(MAX_NUMNODES)) { if (nlongs > PAGE_SIZE/sizeof(long)) return -EINVAL; for (k = BITS_TO_LONGS(MAX_NUMNODES); k < nlongs; k++) { - unsigned long t; if (get_user(t, nmask + k)) return -EFAULT; if (k == nlongs - 1) { @@ -1297,6 +1304,16 @@ static int get_nodes(nodemask_t *nodes, endmask = ~0UL; } + if (maxnode > MAX_NUMNODES && MAX_NUMNODES % BITS_PER_LONG != 0) { + unsigned long valid_mask = endmask; + + valid_mask &= ~((1UL << (MAX_NUMNODES % BITS_PER_LONG)) - 1); + if (get_user(t, nmask + nlongs - 1)) + return -EFAULT; + if (t & valid_mask) + return -EINVAL; + } + if (copy_from_user(nodes_addr(*nodes), nmask, nlongs*sizeof(unsigned long))) return -EFAULT; nodes_addr(*nodes)[nlongs-1] &= endmask;