Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1275430imm; Wed, 1 Aug 2018 13:05:32 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfQPjYIjsgaipmxrxMQNeC5oxgyH7Ip3+gl/G8eOCHUjdoZYCXhPpJOOylj1xz1vpRE+/wl X-Received: by 2002:a62:1016:: with SMTP id y22-v6mr28439928pfi.109.1533153932146; Wed, 01 Aug 2018 13:05:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1533153932; cv=none; d=google.com; s=arc-20160816; b=UCRj2jYg9EAaejqXhi+27obXJK/YlcsjBW5cEKSbmI7BuV6lqFA2ZMlFveB87d9BK6 ECAQ6z1uUsmKyoQXCd9uU2b7BVMTUy4dx5ChdJ4DC9LT8IxF9sp7zyGLdPMBZMw2TkPM 60eCUcqrgfckwIAlL18p2bPMOInWKxVdCuZh4kiydzlKdhyrsiujZ9h1ZD4YSvs+Vky2 FjCOOVih+zzS4tG0lYF0zFD94R3hnFHXLuxNt6wK9svH/+5jxG0JiOaNgzQAU/t9ceCM jcag1DOw1r66h4YW22sEgkg93l3U/MgtSsDSExPp4vHQjJgENu2Zy8szQAksorbcIua2 bAqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=nwL45KZXQc3dyip/An/8rY2zR22RmCtB6f8mc8vZbW4=; b=cQoxpURCJbfOCHNUqDS+fugzdBbZfmO8G5ODJP4ESvPFlmHGkZOByONq7wfDVmUFUl XdgPRbo4d/+SlQd1vadnKX4BawKgTDOGpbdB/sbUF9sIhSDZW0sa3V11yRFQeewfvG79 lY2nd1oIljiIh6eW8y/H8FCFhqLg9R0P8qMH0+aMvhouryt4CuQFCP3aal6SIJFedwkh 1dNr8YbRVYcVFy6QEdwIHD0S8Bj0lBQ/svQcCMXX3aFm9TO1ij6sMYMyDqLtDUklt1m7 Ix3Seeou9Z64MAb7B7w1KTD5F1eLtNtDBJbNcQ2iZEYpSI9FhJqTpLsvxa5Q0YUM5FXv mJFA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p1-v6si17929868pfb.280.2018.08.01.13.05.17; Wed, 01 Aug 2018 13:05:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387608AbeHAVvt (ORCPT + 99 others); Wed, 1 Aug 2018 17:51:49 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:48674 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731961AbeHAVvt (ORCPT ); Wed, 1 Aug 2018 17:51:49 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 3D0AC1596; Wed, 1 Aug 2018 13:04:23 -0700 (PDT) Received: from beelzebub.austin.arm.com (beelzebub.austin.arm.com [10.118.12.119]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 9717D3F5BA; Wed, 1 Aug 2018 13:04:22 -0700 (PDT) From: Jeremy Linton To: linux-mm@kvack.org Cc: cl@linux.com, penberg@kernel.org, rientjes@google.com, iamjoonsoo.kim@lge.com, akpm@linux-foundation.org, mhocko@suse.com, vbabka@suse.cz, Punit.Agrawal@arm.com, Lorenzo.Pieralisi@arm.com, linux-arm-kernel@lists.infradead.org, bhelgaas@google.com, linux-kernel@vger.kernel.org, Jeremy Linton Subject: [RFC 2/2] mm: harden alloc_pages code paths against bogus nodes Date: Wed, 1 Aug 2018 15:04:18 -0500 Message-Id: <20180801200418.1325826-3-jeremy.linton@arm.com> X-Mailer: git-send-email 2.14.3 In-Reply-To: <20180801200418.1325826-1-jeremy.linton@arm.com> References: <20180801200418.1325826-1-jeremy.linton@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Its possible to crash __alloc_pages_nodemask by passing it bogus node ids. This is caused by NODE_DATA() returning null (hopefully) when the requested node is offline. We can harded against the basic case of a mostly valid node, that isn't online by checking for null and failing prepare_alloc_pages. But this then suggests we should also harden NODE_DATA() like this #define NODE_DATA(nid) ( (nid) < MAX_NUMNODES ? node_data[(nid)] : NULL) eventually this starts to add a bunch of generally uneeded checks in some code paths that are called quite frequently. Signed-off-by: Jeremy Linton --- include/linux/gfp.h | 2 ++ mm/page_alloc.c | 2 ++ 2 files changed, 4 insertions(+) diff --git a/include/linux/gfp.h b/include/linux/gfp.h index a6afcec53795..17d70271c42e 100644 --- a/include/linux/gfp.h +++ b/include/linux/gfp.h @@ -436,6 +436,8 @@ static inline int gfp_zonelist(gfp_t flags) */ static inline struct zonelist *node_zonelist(int nid, gfp_t flags) { + if (unlikely(!NODE_DATA(nid))) //VM_WARN_ON? + return NULL; return NODE_DATA(nid)->node_zonelists + gfp_zonelist(flags); } diff --git a/mm/page_alloc.c b/mm/page_alloc.c index a790ef4be74e..3a3d9ac2662a 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -4306,6 +4306,8 @@ static inline bool prepare_alloc_pages(gfp_t gfp_mask, unsigned int order, { ac->high_zoneidx = gfp_zone(gfp_mask); ac->zonelist = node_zonelist(preferred_nid, gfp_mask); + if (!ac->zonelist) + return false; ac->nodemask = nodemask; ac->migratetype = gfpflags_to_migratetype(gfp_mask); -- 2.14.3