Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2311709imc; Tue, 12 Mar 2019 11:08:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqzmkTSZazhKO89zxJxH9EL4TpqIeAbK4cXFY1N4uF0BTnIT3Vl+PvrDJGb1qsxAAiTbdHE2 X-Received: by 2002:a62:8c:: with SMTP id 134mr39373223pfa.27.1552414107161; Tue, 12 Mar 2019 11:08:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552414107; cv=none; d=google.com; s=arc-20160816; b=ZyQVEV8Lo45EdsuXM8p/cDG7EuKihmkbBkkacJlbVHx0eUXg2dy6zOMl5EK00Q1CVf UsYt8IZyp7IQF7gMDWmdVg9pWnV5ziU6ivDCq8G5UdsbONmXIgwKga/fHZN+mXf7dW+0 oVfoelXUkOBF0v/7zJ/mySfm4jyKNFfFrrZ+iaHSdPEu4zdKXTp/HYd9auSoWhxPmMAc trQqZxVpEZ55ue3sp8syDiz+FLOFjehWmE4fV4YhU8LnELFq9urT6H4qyxcQgXEAuUXk d5vZjouY2v7yuXX3Q51Z2CYh4RSYnLvCOpFlpkXTpIIP+h862aRrd3YhSQ05aEf5ttSq iggw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=VBQ2h/eF9pbkVtpAdDj885Z0W+THg92x9hMLOhBqCug=; b=gJ+gldzizjjD+Llz0STZA3lfWf90ANOj9hfeq4/67XWpgX65sWsICYX4q/q/Uwu00o 2NpzkfUBXr0HGajDm9qkeYG1P0133VsPlST6T4Guj7jJUmQmgvzdPeAgqdF4mKoCb/z0 2SkCBKwtmVOWElJZDwMxp8H8bGHBmbOMOqNscifpLHemxC5kPYj5fr4kqxVWZ53fHWGL XPwUAZIjCcNl0Tm/Hr23GObVnvNsmpMGnNO+NrvLWvEqnI7kc3UDkalV8jD15k/IEYXB evUfFwB25OOTlSd500p2b4dsS4CE26gTXIyWmebFGxCW29AHQW8V9LtpIsAPx2c/2DOQ 82uA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qKfOboGd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d24si8765643plr.311.2019.03.12.11.08.09; Tue, 12 Mar 2019 11:08:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qKfOboGd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728074AbfCLSFq (ORCPT + 99 others); Tue, 12 Mar 2019 14:05:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:48044 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727324AbfCLRMf (ORCPT ); Tue, 12 Mar 2019 13:12:35 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B5EDD217F5; Tue, 12 Mar 2019 17:12:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552410753; bh=JcZC2tVXX6IeUet10kinkIdGVsV/WoOhZb6X/BKPong=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qKfOboGdGcMtnRrZ3yY2ziaPWV8vJRRLThKUHx+OLlr9Q3xxTK4UNM03P+5OeleAT hUQAB0dHLeSuYKouuBAK7H4GlrZPYOVt8v7KqsqBetZLJL3TlOuyRhbdbSXH9HyeNj fKPOM3P4R596drN6b8UgDNn1F3uqJx0v0/5YE0/E= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Michal Hocko , Mikhail Zaslonko , Gerald Schaefer , Mikhail Gavrilov , Oscar Salvador , Pavel Tatashin , Heiko Carstens , Martin Schwidefsky , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 4.20 063/171] mm, memory_hotplug: is_mem_section_removable do not pass the end of a zone Date: Tue, 12 Mar 2019 10:07:23 -0700 Message-Id: <20190312170353.644012693@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312170347.868927101@linuxfoundation.org> References: <20190312170347.868927101@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit efad4e475c312456edb3c789d0996d12ed744c13 ] Patch series "mm, memory_hotplug: fix uninitialized pages fallouts", v2. Mikhail Zaslonko has posted fixes for the two bugs quite some time ago [1]. I have pushed back on those fixes because I believed that it is much better to plug the problem at the initialization time rather than play whack-a-mole all over the hotplug code and find all the places which expect the full memory section to be initialized. We have ended up with commit 2830bf6f05fb ("mm, memory_hotplug: initialize struct pages for the full memory section") merged and cause a regression [2][3]. The reason is that there might be memory layouts when two NUMA nodes share the same memory section so the merged fix is simply incorrect. In order to plug this hole we really have to be zone range aware in those handlers. I have split up the original patch into two. One is unchanged (patch 2) and I took a different approach for `removable' crash. [1] http://lkml.kernel.org/r/20181105150401.97287-2-zaslonko@linux.ibm.com [2] https://bugzilla.redhat.com/show_bug.cgi?id=1666948 [3] http://lkml.kernel.org/r/20190125163938.GA20411@dhcp22.suse.cz This patch (of 2): Mikhail has reported the following VM_BUG_ON triggered when reading sysfs removable state of a memory block: page:000003d08300c000 is uninitialized and poisoned page dumped because: VM_BUG_ON_PAGE(PagePoisoned(p)) Call Trace: is_mem_section_removable+0xb4/0x190 show_mem_removable+0x9a/0xd8 dev_attr_show+0x34/0x70 sysfs_kf_seq_show+0xc8/0x148 seq_read+0x204/0x480 __vfs_read+0x32/0x178 vfs_read+0x82/0x138 ksys_read+0x5a/0xb0 system_call+0xdc/0x2d8 Last Breaking-Event-Address: is_mem_section_removable+0xb4/0x190 Kernel panic - not syncing: Fatal exception: panic_on_oops The reason is that the memory block spans the zone boundary and we are stumbling over an unitialized struct page. Fix this by enforcing zone range in is_mem_section_removable so that we never run away from a zone. Link: http://lkml.kernel.org/r/20190128144506.15603-2-mhocko@kernel.org Signed-off-by: Michal Hocko Reported-by: Mikhail Zaslonko Debugged-by: Mikhail Zaslonko Tested-by: Gerald Schaefer Tested-by: Mikhail Gavrilov Reviewed-by: Oscar Salvador Cc: Pavel Tatashin Cc: Heiko Carstens Cc: Martin Schwidefsky Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- mm/memory_hotplug.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/mm/memory_hotplug.c b/mm/memory_hotplug.c index 21d94b5677e8..5ce0d929ff48 100644 --- a/mm/memory_hotplug.c +++ b/mm/memory_hotplug.c @@ -1234,7 +1234,8 @@ static bool is_pageblock_removable_nolock(struct page *page) bool is_mem_section_removable(unsigned long start_pfn, unsigned long nr_pages) { struct page *page = pfn_to_page(start_pfn); - struct page *end_page = page + nr_pages; + unsigned long end_pfn = min(start_pfn + nr_pages, zone_end_pfn(page_zone(page))); + struct page *end_page = pfn_to_page(end_pfn); /* Check the starting page of each pageblock within the range */ for (; page < end_page; page = next_active_pageblock(page)) { -- 2.19.1