Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp3130186pxu; Mon, 19 Oct 2020 04:57:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyuxBRMCJX+XzzvuBq12BS8Emcp2rVnnfrveq1+JpC7QKmZYTnoa0Yj+LYuVH982yvlhB+H X-Received: by 2002:a17:906:6409:: with SMTP id d9mr16734174ejm.344.1603108662084; Mon, 19 Oct 2020 04:57:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603108662; cv=none; d=google.com; s=arc-20160816; b=tkK/DxdnvXp3E2A5IE9RSXTKT7rOAi08HQMUaXw4qUJ8UIrjuSNM/ZlDQR8U4Nf8ID ShR/vZ7Yuv4UFhgwdULmkCle7/c7ruGaUYT+uD51o3nR5zi3WxbC/1agaHw0ROIqjtvy K8VYR22puGn1eB9oAXve0UVl4hIRia5SB4eiMRiVy0cuXlDTJNCDzsIbWOWqvQAY3/8o exY2YbOLZmoWrQZkE7rcadV48hxttc4ezoukjHyhVvZ1y+ZpfdymANPb7EsBpwS9XLBj 3CwiY8Af8qUEH90zGCBfFoaMtgsckk4fINS6OyyaZ452CChN1trK3piweKl1N9iBFF48 fkpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=dvULZg4AeKJjYxg9g9jVt+W6saMphhmth4XQTkKQjd8=; b=g0HbThxvXPO/EeG/MwOVQaR+4rfC+TArD+Peemo3vf8121zOhUHpkcuRgQTQpO36rM lEmRJqgzbBYJULUHAg27UIVuuFfvQTezsoA8hJBuq569RTbv8wov8yVyO7LfMp6MUyZK OtkHBYAznscHzt/W0by+ldBcSr57L0+/9VGVJf+o+2eI74JDIRZGmyKoy+qxh+3pvdDU 4GjoROXkR2pRI0Xa0UMsNgoGH/WL1o7AYSEgSZZ4bJuTOD18+QjT65q0+ZhCrYV4kM/d MqYGbR0iYR0bO6ltIrmWwaLJ0BpaMZoqSE5CUgDpddy3ybebWZD/5L/YkGwtAF71jawo Tn2w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=h4IZtlhS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p18si7871121edm.174.2020.10.19.04.57.20; Mon, 19 Oct 2020 04:57:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=h4IZtlhS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727843AbgJSLc1 (ORCPT + 99 others); Mon, 19 Oct 2020 07:32:27 -0400 Received: from mx2.suse.de ([195.135.220.15]:39384 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725799AbgJSLc1 (ORCPT ); Mon, 19 Oct 2020 07:32:27 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1603107146; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=dvULZg4AeKJjYxg9g9jVt+W6saMphhmth4XQTkKQjd8=; b=h4IZtlhSh/78EtJvOyS2N4H//4eFnA+cMEYbE50pbZKptm1tzRraBX4dfvIRvTNo4bhAxv t9gN+5gFrIx1juHpiFPlwtMIb7r8hYccTn9yDNm820pAo4UZMptDWqPDyvG2zkWAQOGvW6 ++VQfCbsSteKoSJScQNTy1kcSyVmVaI= Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 0F191ABA2; Mon, 19 Oct 2020 11:32:26 +0000 (UTC) Date: Mon, 19 Oct 2020 13:32:24 +0200 From: Michal Hocko To: Oscar Salvador Cc: Shijie Luo , akpm@linux-foundation.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, linmiaohe@huawei.com, linfeilong@huawei.com Subject: Re: [PATCH] mm: mempolicy: fix potential pte_unmap_unlock pte error Message-ID: <20201019113224.GD27114@dhcp22.suse.cz> References: <20201019074853.50856-1-luoshijie1@huawei.com> <20201019105029.GA18953@linux> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201019105029.GA18953@linux> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 19-10-20 12:50:34, Oscar Salvador wrote: > On Mon, Oct 19, 2020 at 03:48:53AM -0400, Shijie Luo wrote: > > When flags in queue_pages_pte_range don't have MPOL_MF_MOVE or MPOL_MF_MOVE_ALL > > bits, code breaks and passing origin pte - 1 to pte_unmap_unlock seems like > > not a good idea. > > I think the above is already explained below? Yes > > queue_pages_pte_range can run in MPOL_MF_MOVE_ALL mode which doesn't migrate > > misplaced pages but returns with EIO when encountering such a page. Since > > commit a7f40cfe3b7a ("mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT > > is specified") and early break on the first pte in the range results in > > pte_unmap_unlock on an underflow pte. This can lead to lockups later on when > > somebody tries to lock the pte resp. page_table_lock again.. > > > > Fixes: a7f40cfe3b7a ("mm: mempolicy: make mbind() return -EIO when > > MPOL_MF_STRICT is specified") Cc: stable is due as well. There are even security concerns and I wouldn't be surprised if this gained a CVE. > > Signed-off-by: Shijie Luo > > Signed-off-by: Miaohe Lin > > Anyway, LGTM: > > Reviewed-by: Oscar Salvador Acked-by: Michal Hocko -- Michal Hocko SUSE Labs