Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp3869194ybe; Mon, 16 Sep 2019 02:45:13 -0700 (PDT) X-Google-Smtp-Source: APXvYqynzrKpq7u8EctK58nkbSw4EuHzJs+4tH4WtZTlyyOfcYwOi0gQca3R+58J/6xyUCO5UJpt X-Received: by 2002:a17:906:eb86:: with SMTP id mh6mr1840056ejb.171.1568627113455; Mon, 16 Sep 2019 02:45:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568627113; cv=none; d=google.com; s=arc-20160816; b=iWKpQApprbNZZk8Wplp2FFHgNWpxUfvZqZNEb7KOcPFlzCV5xMDI43LUCtoKaP2kWZ +1yBSaJNh/O4sQM1G/4SkZLQ3co5ypUBdGywAESpybisG7cFxwJDl+kugrVs//Q/7Q1m gd5dVNvP4KmZjPCsVX8QD+gnwfQmMJtFId8hgOtGiMA4WsJkKK9DLANF6MFfjCKT5gP6 6Emv5BU5yvxpUfACGGY9fE15mdh/pJaQciYB38iBAzSyBNdNBxFTidJEfVjJRt7XHftK BMigWET92n1D8X4mwe2l17GQwDMQBfaAW9+2oytxevykfvB83y4NOSTkzn56zlBeCBbw V59g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :mime-version:references:in-reply-to:date:subject:cc:to:from; bh=V5STkP2elCcyOlszgyFGG/2CPVIaeHygZJljimicyso=; b=x/z+RW61NQnmt6rv1Ym5D/B5gfj2fh/ABxFZSvger+t1WBY5OZjIE6vfBLChha0tcc burNpvZotkDZiX2BEnu9aKJTI5FKG1+JHwibCN7kU/ZCAbuj1Iy4CgiG18H0huRgZbNS dUE+eOYmEhtwb88n3jgMhP0GrfAHWnySqecoTKbrG9lizIrUi8D4uqrmeuH7w8kvW90J VDK30ENX4GvCmfOEbykxYFvB9yCY0QFbshibw+v+27N7320lil02u6uf65LKJ9v+4qeJ ZaZdcDe9eN6H/yIuSo/Yz9Bsua+wFfomqulHElqqpNl8N9FSbXGbGl1a+z779gv3HPrt 6vrA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o26si18961017ejr.148.2019.09.16.02.44.49; Mon, 16 Sep 2019 02:45:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729636AbfIPGIX (ORCPT + 99 others); Mon, 16 Sep 2019 02:08:23 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:32652 "EHLO mx0b-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729398AbfIPGIW (ORCPT ); Mon, 16 Sep 2019 02:08:22 -0400 Received: from pps.filterd (m0127361.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x8G67htq090655 for ; Mon, 16 Sep 2019 02:08:18 -0400 Received: from e06smtp07.uk.ibm.com (e06smtp07.uk.ibm.com [195.75.94.103]) by mx0a-001b2d01.pphosted.com with ESMTP id 2v0u12q98b-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Mon, 16 Sep 2019 02:08:17 -0400 Received: from localhost by e06smtp07.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 16 Sep 2019 07:08:14 +0100 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp07.uk.ibm.com (192.168.101.137) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Mon, 16 Sep 2019 07:08:09 +0100 Received: from d06av24.portsmouth.uk.ibm.com (mk.ibm.com [9.149.105.60]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x8G688Rs42205210 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 16 Sep 2019 06:08:08 GMT Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 3F23542056; Mon, 16 Sep 2019 06:08:08 +0000 (GMT) Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id DEFA242049; Mon, 16 Sep 2019 06:08:07 +0000 (GMT) Received: from ozlabs.au.ibm.com (unknown [9.192.253.14]) by d06av24.portsmouth.uk.ibm.com (Postfix) with ESMTP; Mon, 16 Sep 2019 06:08:07 +0000 (GMT) Received: from adsilva.ozlabs.ibm.com (haven.au.ibm.com [9.192.254.114]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.au.ibm.com (Postfix) with ESMTPSA id 40AC8A01B5; Mon, 16 Sep 2019 16:08:06 +1000 (AEST) From: "Alastair D'Silva" To: alastair@d-silva.org Cc: Andrew Morton , David Hildenbrand , Oscar Salvador , Michal Hocko , Pavel Tatashin , Dan Williams , Wei Yang , Qian Cai , Jason Gunthorpe , Logan Gunthorpe , Ira Weiny , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 1/2] memory_hotplug: Add a bounds check to check_hotplug_memory_range() Date: Mon, 16 Sep 2019 16:05:39 +1000 X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190916060544.21824-1-alastair@au1.ibm.com> References: <20190916060544.21824-1-alastair@au1.ibm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 19091606-0028-0000-0000-0000039D63F7 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19091606-0029-0000-0000-0000245FD760 Message-Id: <20190916060544.21824-2-alastair@au1.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-09-16_03:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=3 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1909160067 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alastair D'Silva On PowerPC, the address ranges allocated to OpenCAPI LPC memory are allocated from firmware. These address ranges may be higher than what older kernels permit, as we increased the maximum permissable address in commit 4ffe713b7587 ("powerpc/mm: Increase the max addressable memory to 2PB"). It is possible that the addressable range may change again in the future. In this scenario, we end up with a bogus section returned from __section_nr (see the discussion on the thread "mm: Trigger bug on if a section is not found in __section_nr"). Adding a check here means that we fail early and have an opportunity to handle the error gracefully, rather than rumbling on and potentially accessing an incorrect section. Further discussion is also on the thread ("powerpc: Perform a bounds check in arch_add_memory"). Signed-off-by: Alastair D'Silva --- include/linux/memory_hotplug.h | 1 + mm/memory_hotplug.c | 13 ++++++++++++- 2 files changed, 13 insertions(+), 1 deletion(-) diff --git a/include/linux/memory_hotplug.h b/include/linux/memory_hotplug.h index f46ea71b4ffd..bc477e98a310 100644 --- a/include/linux/memory_hotplug.h +++ b/include/linux/memory_hotplug.h @@ -110,6 +110,7 @@ extern void __online_page_increment_counters(struct page *page); extern void __online_page_free(struct page *page); extern int try_online_node(int nid); +int check_hotplug_memory_addressable(u64 start, u64 size); extern int arch_add_memory(int nid, u64 start, u64 size, struct mhp_restrictions *restrictions); diff --git a/mm/memory_hotplug.c b/mm/memory_hotplug.c index c73f09913165..02cb9a74f561 100644 --- a/mm/memory_hotplug.c +++ b/mm/memory_hotplug.c @@ -1030,6 +1030,17 @@ int try_online_node(int nid) return ret; } +int check_hotplug_memory_addressable(u64 start, u64 size) +{ +#ifdef MAX_PHYSMEM_BITS + if ((start + size - 1) >> MAX_PHYSMEM_BITS) + return -E2BIG; +#endif + + return 0; +} +EXPORT_SYMBOL_GPL(check_hotplug_memory_addressable); + static int check_hotplug_memory_range(u64 start, u64 size) { /* memory range must be block size aligned */ @@ -1040,7 +1051,7 @@ static int check_hotplug_memory_range(u64 start, u64 size) return -EINVAL; } - return 0; + return check_hotplug_memory_addressable(start, size); } static int online_memory_block(struct memory_block *mem, void *arg) -- 2.21.0