Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp1019609ybp; Wed, 9 Oct 2019 07:44:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqyomhkiwFWTiB6+5EJDKG/AfOkNp91okb+et7RD3avxszmkBhapKhdHf4nNr1tHEJjlhMSV X-Received: by 2002:a05:6402:13d6:: with SMTP id a22mr3322371edx.165.1570632286511; Wed, 09 Oct 2019 07:44:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570632286; cv=none; d=google.com; s=arc-20160816; b=U9g5xcI2GJD432Yn39sJA75ccixsNKtO9zhpid/Wr09ux0/amRWknLMeMdcwuYIErz oPBbdqBf27Ncyixeux17u0c46ejaE88qER/WWhkcl8GmEALRW6ZcfjzqN1p8PlYqSaPo GDnsoCM4V4hvqe8gQj2l/r+McHcsPgCrAks5qLrYgejGs54kKHAEBial5JYWeULHsxhb jN9vVGiEzL0xQ5uANJ+NShJqJ3goSy1ScDxiEn13s8s3j0L6R68GyFIahtXPuGlLnrB3 kta1Q6r5O8KqPba3gMjCGUhgI+zsjoNKi5Ovce4LAGGAVTgiTip1OxIVgnyNjkmb6KgF jd1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=z/4rIyOYAZMkyB7b3WTrQMzaQkxpxhTgMmrHcmfvmKo=; b=YCBNLMtVzyDuCvplKLDYFq4gilPvrixKM6P/NylUrX7uMv+QLO/RZVgOhYVzQIIjQi 0GHUoicrkAB/AC/m76PuB9ltDitvz4N0u3eXObEh8Y5DXhRGQOlwp9sTgFv8ae4HvQxL y/0pfQmli2XnVh7V5/wi0iJRULJ/5GWoyVO8OnZ4C9+xCb014M+j3lVJq9D0QvX46fph mBa2agza0IYfQrBT5lDv9qRs8xnyQuH/QEebvkl4K33SYSORkawaiZfMYqQ2nBi6Cqsb /jWQZAST0/rtyZZGTpL2T/AgDhoKyyNHoogtyB4221T3ALwolTuIlR7CE0N52CszIn+j x4dw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h12si1307378edq.437.2019.10.09.07.44.21; Wed, 09 Oct 2019 07:44:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731606AbfJIOlm (ORCPT + 99 others); Wed, 9 Oct 2019 10:41:42 -0400 Received: from mx2.suse.de ([195.135.220.15]:33988 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1731597AbfJIOlm (ORCPT ); Wed, 9 Oct 2019 10:41:42 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id EFE1AAD12; Wed, 9 Oct 2019 14:41:38 +0000 (UTC) Date: Wed, 9 Oct 2019 16:41:37 +0200 From: Michal Hocko To: David Hildenbrand Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, Qian Cai , Dan Williams , Alexey Dobriyan , Andrew Morton , Stephen Rothwell , Toshiki Fukasawa , Pankaj gupta , Mike Rapoport , Anthony Yznaga , "Aneesh Kumar K.V" , linux-fsdevel@vger.kernel.org Subject: Re: [PATCH v2 1/2] mm: Don't access uninitialized memmaps in fs/proc/page.c Message-ID: <20191009144137.GG6681@dhcp22.suse.cz> References: <20191009142435.3975-1-david@redhat.com> <20191009142435.3975-2-david@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191009142435.3975-2-david@redhat.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 09-10-19 16:24:34, David Hildenbrand wrote: > There are three places where we access uninitialized memmaps, namely: > - /proc/kpagecount > - /proc/kpageflags > - /proc/kpagecgroup > > We have initialized memmaps either when the section is online or when > the page was initialized to the ZONE_DEVICE. Uninitialized memmaps contain > garbage and in the worst case trigger kernel BUGs, especially with > CONFIG_PAGE_POISONING. > > For example, not onlining a DIMM during boot and calling /proc/kpagecount > with CONFIG_PAGE_POISONING: > :/# cat /proc/kpagecount > tmp.test > [ 95.600592] BUG: unable to handle page fault for address: fffffffffffffffe > [ 95.601238] #PF: supervisor read access in kernel mode > [ 95.601675] #PF: error_code(0x0000) - not-present page > [ 95.602116] PGD 114616067 P4D 114616067 PUD 114618067 PMD 0 > [ 95.602596] Oops: 0000 [#1] SMP NOPTI > [ 95.602920] CPU: 0 PID: 469 Comm: cat Not tainted 5.4.0-rc1-next-20191004+ #11 > [ 95.603547] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.4 > [ 95.604521] RIP: 0010:kpagecount_read+0xce/0x1e0 > [ 95.604917] Code: e8 09 83 e0 3f 48 0f a3 02 73 2d 4c 89 e7 48 c1 e7 06 48 03 3d ab 51 01 01 74 1d 48 8b 57 08 480 > [ 95.606450] RSP: 0018:ffffa14e409b7e78 EFLAGS: 00010202 > [ 95.606904] RAX: fffffffffffffffe RBX: 0000000000020000 RCX: 0000000000000000 > [ 95.607519] RDX: 0000000000000001 RSI: 00007f76b5595000 RDI: fffff35645000000 > [ 95.608128] RBP: 00007f76b5595000 R08: 0000000000000001 R09: 0000000000000000 > [ 95.608731] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000140000 > [ 95.609327] R13: 0000000000020000 R14: 00007f76b5595000 R15: ffffa14e409b7f08 > [ 95.609924] FS: 00007f76b577d580(0000) GS:ffff8f41bd400000(0000) knlGS:0000000000000000 > [ 95.610599] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [ 95.611083] CR2: fffffffffffffffe CR3: 0000000078960000 CR4: 00000000000006f0 > [ 95.611686] Call Trace: > [ 95.611906] proc_reg_read+0x3c/0x60 > [ 95.612228] vfs_read+0xc5/0x180 > [ 95.612505] ksys_read+0x68/0xe0 > [ 95.612785] do_syscall_64+0x5c/0xa0 > [ 95.613092] entry_SYSCALL_64_after_hwframe+0x49/0xbe > > For now, let's drop support for ZONE_DEVICE from the three pseudo files > in order to fix this. To distinguish offline memory (with garbage memmap) > from ZONE_DEVICE memory with properly initialized memmaps, we would have to > check get_dev_pagemap() and pfn_zone_device_reserved() right now. The usage > of both (especially, special casing devmem) is frowned upon and needs to > be reworked. The fundamental issue we have is: > > if (pfn_to_online_page(pfn)) { > /* memmap initialized */ > } else if (pfn_valid(pfn)) { > /* > * ??? > * a) offline memory. memmap garbage. > * b) devmem: memmap initialized to ZONE_DEVICE. > * c) devmem: reserved for driver. memmap garbage. > * (d) devmem: memmap currently initializing - garbage) > */ > } > > We'll leave the pfn_zone_device_reserved() check in stable_page_flags() > in place as that function is also used from memory failure. We now > no longer dump information about pages that are not in use anymore - > offline. > > Reported-by: Qian Cai > Cc: Dan Williams > Cc: Alexey Dobriyan > Cc: Andrew Morton > Cc: Stephen Rothwell > Cc: Toshiki Fukasawa > Cc: Pankaj gupta > Cc: Mike Rapoport > Cc: Anthony Yznaga > Cc: Michal Hocko > Cc: "Aneesh Kumar K.V" > Cc: linux-fsdevel@vger.kernel.org > Signed-off-by: David Hildenbrand Fixes: f1dd2cd13c4b ("mm, memory_hotplug: do not associate hotadded memory to zones until online") # visible after d0dc12e86b319 usage of pfn_to_online_page is the right way to dereference the pfn here. My understanding of the zone device internals is limited to see whether this fixes it as well. Acked-by: Michal Hocko > --- > fs/proc/page.c | 28 ++++++++++++++++------------ > 1 file changed, 16 insertions(+), 12 deletions(-) > > diff --git a/fs/proc/page.c b/fs/proc/page.c > index decd3fe39674..e40dbfe1168e 100644 > --- a/fs/proc/page.c > +++ b/fs/proc/page.c > @@ -42,10 +42,12 @@ static ssize_t kpagecount_read(struct file *file, char __user *buf, > return -EINVAL; > > while (count > 0) { > - if (pfn_valid(pfn)) > - ppage = pfn_to_page(pfn); > - else > - ppage = NULL; > + /* > + * TODO: ZONE_DEVICE support requires to identify > + * memmaps that were actually initialized. > + */ > + ppage = pfn_to_online_page(pfn); > + > if (!ppage || PageSlab(ppage) || page_has_type(ppage)) > pcount = 0; > else > @@ -218,10 +220,11 @@ static ssize_t kpageflags_read(struct file *file, char __user *buf, > return -EINVAL; > > while (count > 0) { > - if (pfn_valid(pfn)) > - ppage = pfn_to_page(pfn); > - else > - ppage = NULL; > + /* > + * TODO: ZONE_DEVICE support requires to identify > + * memmaps that were actually initialized. > + */ > + ppage = pfn_to_online_page(pfn); > > if (put_user(stable_page_flags(ppage), out)) { > ret = -EFAULT; > @@ -263,10 +266,11 @@ static ssize_t kpagecgroup_read(struct file *file, char __user *buf, > return -EINVAL; > > while (count > 0) { > - if (pfn_valid(pfn)) > - ppage = pfn_to_page(pfn); > - else > - ppage = NULL; > + /* > + * TODO: ZONE_DEVICE support requires to identify > + * memmaps that were actually initialized. > + */ > + ppage = pfn_to_online_page(pfn); > > if (ppage) > ino = page_cgroup_ino(ppage); > -- > 2.21.0 -- Michal Hocko SUSE Labs