Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2535392imu; Thu, 29 Nov 2018 06:32:36 -0800 (PST) X-Google-Smtp-Source: AFSGD/XkpM0qsJt5P/rxLuMumgI6Hej7ICvhEpwKGnBkYpGJyBz28iMYxmGBqmtEDaZqfRkPLR3M X-Received: by 2002:a63:bd1a:: with SMTP id a26mr1415482pgf.121.1543501956308; Thu, 29 Nov 2018 06:32:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543501956; cv=none; d=google.com; s=arc-20160816; b=LPqueTSqUp3sB/RD2bJt4PTzqQGR6VPLb/Wbj+BgWKge0KBKX+o/mGi9YFZX1GV0hK 6k6CBb5TlKBBOUWlvUIg7riO/i9+TEW4tID/UiUOK3PHlX2kAP8Ok85/V9WJEEFGHCVC RaOrN+idGxZ9gTzp6F66iIqBd6Qf8XoVOgl6iwhx8podap6V6Fvmme1mzWi/GRtIc6B2 5cX3ND24vd9yausf8MKhEBvNX2kQAa2IcMvUpKDSoH9S+HM5h9U3K6NoqU5RGx/BIMf+ 3VI0ZTFswLqQ8RJpSyIykbBFyB1/h4g9wB8tAjP7QNM1Zg88LJRRUoXzsX8KHc18EhLB qJDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=51ohtFNZ6F08SlAXf1O0bIVAal82laKEzncgcRQlYmw=; b=OmDaZW2iMI11ruwUQnXFsTFtQiBcqhjq4eYgTfoTsZV9CRmeomaTpFVTIYx+Y8GP7s DFtqJO64xLytMqTcjjLnKdMvcg0qxkq8GBtL8NlPxVGX1fC7wxsnbPtwb+vsJ1MXWvGU /qN1M9uO36XVKq2kzU+niZDgPD4wCdmdLTyw1/VXwraHjpf90PyjxwIZOJqjsZllsyjK yMPUBG1VBdgEpi+Kj+qupcYekCyd5/kgHVeP9zVkLLWscX7tKwGpN0HNau3v60W7uul4 KVEuz+zUXHuuvJ6SmZL+8ZTsycpYcibKKjEr8YuWoXSuSaUd44QFZ48np24MaHM+fDBo TdIw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gZ3YuUUL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s73si2161258pfs.54.2018.11.29.06.32.05; Thu, 29 Nov 2018 06:32:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gZ3YuUUL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388525AbeK3BfQ (ORCPT + 99 others); Thu, 29 Nov 2018 20:35:16 -0500 Received: from mail.kernel.org ([198.145.29.99]:36986 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732084AbeK3BfP (ORCPT ); Thu, 29 Nov 2018 20:35:15 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5043E213A2; Thu, 29 Nov 2018 14:29:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543501781; bh=DPNQt4b2xnF/ZcTxtD0p0W5Ao6uYzH2Wd/MmOawZTcs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gZ3YuUULoNopZc8R74dhsQ9j+FoU4ZFd5kbASZGqc4Ozbqym19KG2eHRtuZCjkRNv 8cZRzdN+5dF2JPZThYtzS45WYONx7P+4z8xbEmaA5zFYCmB8WJ7FcXZM3pUweJJdbW qQMad5xG0NtbUQEDy8es+BH+0IsocnbCyEnXEwAY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Aneesh Kumar K.V" , "Kirill A. Shutemov" , Willem de Bruijn , Eric Dumazet , Ido Schimmel , Andrew Morton , Linus Torvalds Subject: [PATCH 4.19 038/110] mm/memory.c: recheck page table entry with page table lock held Date: Thu, 29 Nov 2018 15:12:09 +0100 Message-Id: <20181129135922.805189806@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181129135921.231283053@linuxfoundation.org> References: <20181129135921.231283053@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Aneesh Kumar K.V commit ff09d7ec9786be4ad7589aa987d7dc66e2dd9160 upstream. We clear the pte temporarily during read/modify/write update of the pte. If we take a page fault while the pte is cleared, the application can get SIGBUS. One such case is with remap_pfn_range without a backing vm_ops->fault callback. do_fault will return SIGBUS in that case. cpu 0 cpu1 mprotect() ptep_modify_prot_start()/pte cleared. . . page fault. . . prep_modify_prot_commit() Fix this by taking page table lock and rechecking for pte_none. [aneesh.kumar@linux.ibm.com: fix crash observed with syzkaller run] Link: http://lkml.kernel.org/r/87va6bwlfg.fsf@linux.ibm.com Link: http://lkml.kernel.org/r/20180926031858.9692-1-aneesh.kumar@linux.ibm.com Signed-off-by: Aneesh Kumar K.V Acked-by: Kirill A. Shutemov Cc: Willem de Bruijn Cc: Eric Dumazet Cc: Ido Schimmel Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- mm/memory.c | 34 ++++++++++++++++++++++++++++++---- 1 file changed, 30 insertions(+), 4 deletions(-) --- a/mm/memory.c +++ b/mm/memory.c @@ -3745,10 +3745,36 @@ static vm_fault_t do_fault(struct vm_fau struct vm_area_struct *vma = vmf->vma; vm_fault_t ret; - /* The VMA was not fully populated on mmap() or missing VM_DONTEXPAND */ - if (!vma->vm_ops->fault) - ret = VM_FAULT_SIGBUS; - else if (!(vmf->flags & FAULT_FLAG_WRITE)) + /* + * The VMA was not fully populated on mmap() or missing VM_DONTEXPAND + */ + if (!vma->vm_ops->fault) { + /* + * If we find a migration pmd entry or a none pmd entry, which + * should never happen, return SIGBUS + */ + if (unlikely(!pmd_present(*vmf->pmd))) + ret = VM_FAULT_SIGBUS; + else { + vmf->pte = pte_offset_map_lock(vmf->vma->vm_mm, + vmf->pmd, + vmf->address, + &vmf->ptl); + /* + * Make sure this is not a temporary clearing of pte + * by holding ptl and checking again. A R/M/W update + * of pte involves: take ptl, clearing the pte so that + * we don't have concurrent modification by hardware + * followed by an update. + */ + if (unlikely(pte_none(*vmf->pte))) + ret = VM_FAULT_SIGBUS; + else + ret = VM_FAULT_NOPAGE; + + pte_unmap_unlock(vmf->pte, vmf->ptl); + } + } else if (!(vmf->flags & FAULT_FLAG_WRITE)) ret = do_read_fault(vmf); else if (!(vma->vm_flags & VM_SHARED)) ret = do_cow_fault(vmf);