Received: by 10.192.165.148 with SMTP id m20csp308875imm; Wed, 2 May 2018 00:09:33 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrpY/Pitj+TDciFdd7XZMYxXbjwa8i9ujeY7bFMQJAsYKb2biq15zlfpFbPuQweTdLtkh9Y X-Received: by 2002:a63:701d:: with SMTP id l29-v6mr14898509pgc.299.1525244973891; Wed, 02 May 2018 00:09:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525244973; cv=none; d=google.com; s=arc-20160816; b=T1ocbP6jgnCM6eDEkftgotS1GilQg2oHFsVcJjaNcak4cFWjOKG+7l01BMPzW+Cses yVB1paRlKqJNClUM/inA/SvZpR8FOmaGUY6Wgs3geQI3whxBYuwlQTyulL7OSFyeVt7Q w6QysI90ldUQUW/kP5/cidXIXoOT6HKbrMJ5NopQrbtMXnCGryrLJtCk9ZIIbFitdIwl yvTbD1gJ4l5Kxvs7tq931ZDw4/AyzWosw9ZKHiwd0UIYK1o1o+V79UlivY+9LVJRfW5L NZ141nTbWHtXmrvO9amSHbgWv6MsCTBwLGLmlOy1VIv5s64quMDRxl0TS2ti+ZmcmJJO QRcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature:arc-authentication-results; bh=5vnx+8+r8RDQGWtOdhuSvxg/UR+evtvZsBiGRTJiTcM=; b=hWwmgqiYkgULZZ2PG3p4RSEq5IOytjX5C4GOvRVclJ0+3bucO5Yyycpap0X6TnK+nW hTnF7bcUaw6xtK9tozxOgZjIHkY4jgOpSZc5qWOJ7lDl7HiJp6FlG4g0Teoky+8dpON5 2mVZI1tUq5s0ln+OASgKjTi7IsJSnpZtxQnNZtFefqRjw+NOko85lHh2K8JISpCThAt1 TLpXiJS266O5tzrlJaGioAHF/agB24L5gWama7/bRrvj8q8QypJdRNTcEOes3W+RgKge E96uzJGRQhhF9u7nGNaBXR/dPVJgwt+WZJHHUh2xNdtYfoNOpSPyII6SsYVBddBoD36L 9eBg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=mTNnw0hY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k75si10511091pfk.369.2018.05.02.00.09.19; Wed, 02 May 2018 00:09:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=mTNnw0hY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751084AbeEBHIt (ORCPT + 99 others); Wed, 2 May 2018 03:08:49 -0400 Received: from mail-pf0-f193.google.com ([209.85.192.193]:36978 "EHLO mail-pf0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750800AbeEBHIp (ORCPT ); Wed, 2 May 2018 03:08:45 -0400 Received: by mail-pf0-f193.google.com with SMTP id e9so6996877pfi.4 for ; Wed, 02 May 2018 00:08:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id; bh=5vnx+8+r8RDQGWtOdhuSvxg/UR+evtvZsBiGRTJiTcM=; b=mTNnw0hYTuwE7BTB3az97DT/f5I3wmigXWO8ihxcGaPT98ik7q15kiVSJeesnv9REj h/a6tIdWwGiAE/vSfWraAd9ZzBSqJPY6tXEDP+PrWdkLtNdGJ/LW313BqEGDd1nXkRX8 0avuYdYzb5ffJyJadgXWbrq4ohvA5ab3btLALEGVK2KXTjxvjkCAW4y/CiOVENEQlW5t tW3N6ec3gbvmnClWtBS5hG56w5sx+bjncRqjIXeUiQaz2qWp+cMWfaxqHPOZCKRfAPJe Bn4DL+rJABxS23YMnUyeY0630nBBOOm1BMqbFmm4e1KLMqpmx4KvBHlMoDd/yAFAANsj AArw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=5vnx+8+r8RDQGWtOdhuSvxg/UR+evtvZsBiGRTJiTcM=; b=srpeVGYZE2ESyrKGdYhEJg9WhBcjRnTGMLSSxnNHz2rzd+RwgZ/aEt1cen212yDFrF Hk6+wplNGg1ZV0VIY1j44WJRhm5DGOasHzmaI3x4DN+Xnpii3LZ+ZWqD52XzUwbuOa2Y whUcfY7Gyi0ykwg3HKaS9B+0zNyDIpe1d9FDcrV8m3MnwvMnZLqMhnKYebFmf7dJ8TL7 jSSSwSA2Lhnk/pWRK2AFkft9IENDueXLNbpzi+Tdg1a7gTQmszj+SSfTc+9mX6RAge85 +hoyyrSIR/4t55Y7DTiCBDg2UHXoWiIcA5tJV45r4iEG2pwDnf+c7LxTLXpr6YU5ppSy yaZw== X-Gm-Message-State: ALQs6tCAjBJCXwWSPNMh9WvCtzMKGhwMiAv9uX/Xwh3XPsCaFbHK0vPQ tSysd/O3eeDws6nQXdFHtIA= X-Received: by 10.98.174.19 with SMTP id q19mr18277360pff.155.1525244924819; Wed, 02 May 2018 00:08:44 -0700 (PDT) Received: from ct7host.localdomain ([38.106.11.25]) by smtp.gmail.com with ESMTPSA id a76sm24073724pfc.97.2018.05.02.00.08.40 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 02 May 2018 00:08:44 -0700 (PDT) From: Jia He To: Christoffer Dall , Marc Zyngier , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu Cc: linux-kernel@vger.kernel.org, Jia He , li.zhang@hxt-semitech.com Subject: [PATCH] KVM: arm/arm64: fix unaligned hva start and end in handle_hva_to_gpa Date: Wed, 2 May 2018 15:08:31 +0800 Message-Id: <1525244911-5519-1-git-send-email-hejianet@gmail.com> X-Mailer: git-send-email 1.8.3.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jia He In our armv8a server (QDF2400), I noticed a WARN_ON as follows: [ 800.202850] WARNING: CPU: 33 PID: 255 at arch/arm64/kvm/../../../virt/kvm/arm/mmu.c:1670 kvm_age_hva_handler+0xcc/0xd4 [ 800.213535] Modules linked in: vhost_net vhost tap xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter rpcrdma ib_isert iscsi_target_mod ib_iser libiscsi scsi_transport_iscsi ib_srpt target_core_mod ib_srp scsi_transport_srp ib_ipoib rdma_ucm ib_ucm ib_uverbs ib_umad rdma_cm ib_cm vfat fat iw_cm mlx5_ib ib_core dm_mirror dm_region_hash dm_log dm_mod crc32_ce ipmi_ssif sg nfsd [ 800.284115] auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c mlx5_core ixgbe mlxfw devlink mdio ahci_platform libahci_platform qcom_emac libahci hdma hdma_mgmt i2c_qup [ 800.300382] CPU: 33 PID: 255 Comm: khugepaged Tainted: G W 4.14.36+ #6 [ 800.308030] Hardware name: [ 800.318717] task: ffff8017c949c000 task.stack: ffff8017c9498000 [ 800.324629] PC is at kvm_age_hva_handler+0xcc/0xd4 [ 800.329412] LR is at handle_hva_to_gpa+0xec/0x15c [ 800.334109] pc : [] lr : [] pstate: 20400145 [ 800.341496] sp : ffff8017c949b260 [ 800.344804] x29: ffff8017c949b260 x28: ffff801663e25008 [ 800.350110] x27: 0000000000020000 x26: 00000001fb1a0000 [ 800.355416] x25: 0000ffff605b0200 x24: 0000ffff605a0200 [ 800.360722] x23: 0000000000000000 x22: 000000000000ffff [ 800.366028] x21: 00000001fb1a0000 x20: ffff8017c085a000 [ 800.371334] x19: ffff801663e20008 x18: 0000000000000000 [ 800.376641] x17: 0000000000000000 x16: 0000000000000000 [ 800.381947] x15: 0000000000000000 x14: 3d646e655f617668 [ 800.387254] x13: 2c30303230623530 x12: 36666666663d646e [ 800.392560] x11: 652c303032306135 x10: 3036666666663d74 [ 800.397867] x9 : 0000000000003796 x8 : 655f6e66672c3030 [ 800.403173] x7 : ffff00000859434c x6 : ffff8017f9c30cb8 [ 800.408479] x5 : ffff8017f9c30cb8 x4 : ffff0000080b4e60 [ 800.413786] x3 : 0000000000000000 x2 : 0000000000020000 [ 800.419092] x1 : 00000001fb1a0000 x0 : 0000000020000000 [ 800.424398] Call trace: [ 800.426838] Exception stack(0xffff8017c949b120 to 0xffff8017c949b260) [ 800.433272] b120: 0000000020000000 00000001fb1a0000 0000000000020000 0000000000000000 [ 800.441095] b140: ffff0000080b4e60 ffff8017f9c30cb8 ffff8017f9c30cb8 ffff00000859434c [ 800.448918] b160: 655f6e66672c3030 0000000000003796 3036666666663d74 652c303032306135 [ 800.456740] b180: 36666666663d646e 2c30303230623530 3d646e655f617668 0000000000000000 [ 800.464563] b1a0: 0000000000000000 0000000000000000 0000000000000000 ffff801663e20008 [ 800.472385] b1c0: ffff8017c085a000 00000001fb1a0000 000000000000ffff 0000000000000000 [ 800.480208] b1e0: 0000ffff605a0200 0000ffff605b0200 00000001fb1a0000 0000000000020000 [ 800.488030] b200: ffff801663e25008 ffff8017c949b260 ffff0000080b4838 ffff8017c949b260 [ 800.495853] b220: ffff0000080b4f2c 0000000020400145 0000000000000001 ffff8017c949b2a0 [ 800.503676] b240: ffffffffffffffff ffff8017c949b260 ffff8017c949b260 ffff0000080b4f2c [ 800.511498] [] kvm_age_hva_handler+0xcc/0xd4 [ 800.517324] [] handle_hva_to_gpa+0xec/0x15c [ 800.523063] [] kvm_age_hva+0x5c/0xcc [ 800.528194] [] kvm_mmu_notifier_clear_flush_young+0x54/0x90 [ 800.535324] [] __mmu_notifier_clear_flush_young+0x6c/0xa8 [ 800.542279] [] page_referenced_one+0x1e0/0x1fc [ 800.548279] [] rmap_walk_ksm+0x124/0x1a0 [ 800.553759] [] rmap_walk+0x94/0x98 [ 800.558717] [] page_referenced+0x120/0x180 [ 800.564369] [] shrink_active_list+0x218/0x4a4 [ 800.570281] [] shrink_node_memcg+0x58c/0x6fc [ 800.576107] [] shrink_node+0xe4/0x328 [ 800.581325] [] do_try_to_free_pages+0xe4/0x3b8 [ 800.587324] [] try_to_free_pages+0x124/0x234 [ 800.593150] [] __alloc_pages_nodemask+0x564/0xf7c [ 800.599412] [] khugepaged_alloc_page+0x38/0xb8 [ 800.605411] [] collapse_huge_page+0x74/0xd70 [ 800.611238] [] khugepaged_scan_mm_slot+0x654/0xa98 [ 800.617585] [] khugepaged+0x2bc/0x49c [ 800.622803] [] kthread+0x124/0x150 [ 800.627762] [] ret_from_fork+0x10/0x1c [ 800.633066] ---[ end trace 944c130b5252fb01 ]--- ------------------------------------------------------------------------- The root cause might be: we can't guarantee that the parameter start and end in handle_hva_to_gpa is PAGE_SIZE aligned, let alone hva_start and hva_end. This bug is introduced by commit 056aad67f836 ("kvm: arm/arm64: Rework gpa callback handlers") It fixes the bug by use pfn size converted. Fixes: 056aad67f836 ("kvm: arm/arm64: Rework gpa callback handlers") Signed-off-by: jia.he@hxt-semitech.com Signed-off-by: li.zhang@hxt-semitech.com --- virt/kvm/arm/mmu.c | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/virt/kvm/arm/mmu.c b/virt/kvm/arm/mmu.c index 7f6a944..9dd7ae4 100644 --- a/virt/kvm/arm/mmu.c +++ b/virt/kvm/arm/mmu.c @@ -1744,7 +1744,7 @@ static int handle_hva_to_gpa(struct kvm *kvm, /* we only care about the pages that the guest sees */ kvm_for_each_memslot(memslot, slots) { unsigned long hva_start, hva_end; - gfn_t gpa; + gpa_t gpa, gpa_end; hva_start = max(start, memslot->userspace_addr); hva_end = min(end, memslot->userspace_addr + @@ -1753,7 +1753,9 @@ static int handle_hva_to_gpa(struct kvm *kvm, continue; gpa = hva_to_gfn_memslot(hva_start, memslot) << PAGE_SHIFT; - ret |= handler(kvm, gpa, (u64)(hva_end - hva_start), data); + gpa_end = hva_to_gfn_memslot(hva_end + PAGE_SIZE - 1, memslot) + << PAGE_SHIFT; + ret |= handler(kvm, gpa, (u64)(gpa_end - gpa), data); } return ret; @@ -1823,7 +1825,7 @@ static int kvm_age_hva_handler(struct kvm *kvm, gpa_t gpa, u64 size, void *data) pmd_t *pmd; pte_t *pte; - WARN_ON(size != PAGE_SIZE && size != PMD_SIZE); + WARN_ON((size & ~PAGE_MASK) != 0); pmd = stage2_get_pmd(kvm, NULL, gpa); if (!pmd || pmd_none(*pmd)) /* Nothing there */ return 0; @@ -1843,7 +1845,7 @@ static int kvm_test_age_hva_handler(struct kvm *kvm, gpa_t gpa, u64 size, void * pmd_t *pmd; pte_t *pte; - WARN_ON(size != PAGE_SIZE && size != PMD_SIZE); + WARN_ON((size & ~PAGE_MASK) != 0); pmd = stage2_get_pmd(kvm, NULL, gpa); if (!pmd || pmd_none(*pmd)) /* Nothing there */ return 0; -- 1.8.3.1