Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp17044ybl; Tue, 7 Jan 2020 13:12:19 -0800 (PST) X-Google-Smtp-Source: APXvYqyK0a4ZaOWnkGR0sAoG25jqOjGkLavSR7vXkVh3nAs6bFcxBo523OoPkRmCazEYjLcARYvX X-Received: by 2002:a9d:6045:: with SMTP id v5mr1614399otj.252.1578431539711; Tue, 07 Jan 2020 13:12:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578431539; cv=none; d=google.com; s=arc-20160816; b=EbtBbtEH4vKiQ9rRWZUaU6X125PDyRNNKXUz+OGUke/FZjBWb+X7OcrBj4EOMCivru GoyknHwyJVMoNdXYB6DPwPgE4knZqVBdEvmZa864nAQiBk5QpqHC4ngQSIbTfiVJxy7t kuR71wEHRD50iyVDoGtkJmKvqphvgVSOVlRQN97aiRtlpWdsz0iLBRD6dd2ixPNPtstR QwnOpTBMV8g1DV16uXy1hwlLJ32Kl1KcVFWu8cGN39NENHwIajcR4J8m8+HPaMQagZbt kDY5bQEnbMWnY7+fDP9n/VvPv5ixKEpSjuGIW6gWduETb233Q+l5zGD1dwcd/X/JL1VX gCMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=a5YKJd0W9owhA4JccwGgAl9VN65gDt1cvsrsZwMvpag=; b=t/8xVmzBCEpWcW4sLxbiSKnzUME8K0fCZ4lwE9o15gynyipyr7CPHKzKy/0oaLdPVF 0ow4STe+Cf6wcRQCIYChVJ4zIGGuZDNu0s7J83mn0k0qorOw18Z0j6VQezJUr1/W5vem vFva42q0TMFnjny9eON20q9Wy280Y4Sa3iS+fkiKph58WAXjQltrpsEtyUWP9erTB6i4 ZtmM/H9LyclJjJvqLtYTshVrMpGwQ5aQ/i0HpweyyTF/eb5sXBbiw877PVP5C4o5Uq9R vcaIlgtRqJlNDH8zy/DeftWfkHeJdMe6O/2DUKKoZR//3s7vgKcppEdPpvxXeKecquVT VSrw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SNk8p4Ma; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j13si520478otq.146.2020.01.07.13.12.07; Tue, 07 Jan 2020 13:12:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SNk8p4Ma; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730090AbgAGVLW (ORCPT + 99 others); Tue, 7 Jan 2020 16:11:22 -0500 Received: from mail.kernel.org ([198.145.29.99]:39460 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728061AbgAGVLT (ORCPT ); Tue, 7 Jan 2020 16:11:19 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 03EB92077B; Tue, 7 Jan 2020 21:11:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578431478; bh=fEofdPQLdo3o+UTKlPauo6nULx3FWB7k5nBorR9fbVE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SNk8p4MaFsyWbwiMXCGy5QV2Gfs+uCtvbEr7RMYsNPah/r/n7iRX3bOxeN+ePwMPr IeUbQOJkYHxj1wmPSWUgjln/FDidjLUQ/8MsCuaok+7lE6exx9tPmLhKAJK/KH+ZKW 6lrCgV7cFGt1yjqvMtdFsg6QoRfHYJcczS8We+xo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexander Shishkin , "Peter Zijlstra (Intel)" , Jiri Olsa , Vince Weaver , Ingo Molnar , Arnaldo Carvalho de Melo , Sasha Levin Subject: [PATCH 4.14 74/74] perf/x86/intel/bts: Fix the use of page_private() Date: Tue, 7 Jan 2020 21:55:39 +0100 Message-Id: <20200107205237.020338795@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200107205135.369001641@linuxfoundation.org> References: <20200107205135.369001641@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexander Shishkin [ Upstream commit ff61541cc6c1962957758ba433c574b76f588d23 ] Commit 8062382c8dbe2 ("perf/x86/intel/bts: Add BTS PMU driver") brought in a warning with the BTS buffer initialization that is easily tripped with (assuming KPTI is disabled): instantly throwing: > ------------[ cut here ]------------ > WARNING: CPU: 2 PID: 326 at arch/x86/events/intel/bts.c:86 bts_buffer_setup_aux+0x117/0x3d0 > Modules linked in: > CPU: 2 PID: 326 Comm: perf Not tainted 5.4.0-rc8-00291-gceb9e77324fa #904 > RIP: 0010:bts_buffer_setup_aux+0x117/0x3d0 > Call Trace: > rb_alloc_aux+0x339/0x550 > perf_mmap+0x607/0xc70 > mmap_region+0x76b/0xbd0 ... It appears to assume (for lost raisins) that PagePrivate() is set, while later it actually tests for PagePrivate() before using page_private(). Make it consistent and always check PagePrivate() before using page_private(). Fixes: 8062382c8dbe2 ("perf/x86/intel/bts: Add BTS PMU driver") Signed-off-by: Alexander Shishkin Signed-off-by: Peter Zijlstra (Intel) Cc: Jiri Olsa Cc: Vince Weaver Cc: Ingo Molnar Cc: Arnaldo Carvalho de Melo Link: https://lkml.kernel.org/r/20191205142853.28894-2-alexander.shishkin@linux.intel.com Signed-off-by: Sasha Levin --- arch/x86/events/intel/bts.c | 16 +++++++++++----- 1 file changed, 11 insertions(+), 5 deletions(-) diff --git a/arch/x86/events/intel/bts.c b/arch/x86/events/intel/bts.c index 24ffa1e88cf9..4d3399405d06 100644 --- a/arch/x86/events/intel/bts.c +++ b/arch/x86/events/intel/bts.c @@ -71,9 +71,17 @@ struct bts_buffer { static struct pmu bts_pmu; +static int buf_nr_pages(struct page *page) +{ + if (!PagePrivate(page)) + return 1; + + return 1 << page_private(page); +} + static size_t buf_size(struct page *page) { - return 1 << (PAGE_SHIFT + page_private(page)); + return buf_nr_pages(page) * PAGE_SIZE; } static void * @@ -89,9 +97,7 @@ bts_buffer_setup_aux(int cpu, void **pages, int nr_pages, bool overwrite) /* count all the high order buffers */ for (pg = 0, nbuf = 0; pg < nr_pages;) { page = virt_to_page(pages[pg]); - if (WARN_ON_ONCE(!PagePrivate(page) && nr_pages > 1)) - return NULL; - pg += 1 << page_private(page); + pg += buf_nr_pages(page); nbuf++; } @@ -115,7 +121,7 @@ bts_buffer_setup_aux(int cpu, void **pages, int nr_pages, bool overwrite) unsigned int __nr_pages; page = virt_to_page(pages[pg]); - __nr_pages = PagePrivate(page) ? 1 << page_private(page) : 1; + __nr_pages = buf_nr_pages(page); buf->buf[nbuf].page = page; buf->buf[nbuf].offset = offset; buf->buf[nbuf].displacement = (pad ? BTS_RECORD_SIZE - pad : 0); -- 2.20.1