Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp833705pxb; Tue, 3 Nov 2020 13:53:27 -0800 (PST) X-Google-Smtp-Source: ABdhPJy50X0wWyjZHJQqGBtr2xLJNVRZG+Kv1BenaKdWnzq5sJBGG1xaN2RM0qZSaP/VykPoutQf X-Received: by 2002:a17:906:280a:: with SMTP id r10mr21867969ejc.45.1604440407537; Tue, 03 Nov 2020 13:53:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604440407; cv=none; d=google.com; s=arc-20160816; b=Xp41YRG2zxCWtyVy0V8NPvrSnG/4FOqMXJR6XaulS+QwzliNx7NELszfzlxNtp97NS DZLViI2m7jyXBRJEtrQ+QtmC7K15AtU+KXd8IFVC9uWDnY0LGUWS6EGtDIhXcAp1NqQ4 CkJ0u5bxdYJmzfskTAiZ3vsi5m0l5JsgjBLUCitCBIre56A2tsew0eODzO5IsVGvHm8E JEHWJHN61qZX5drUUjbsyPhD7JCv6YryOjXzI4Vo7p/zT+zRtnTlc8cOi95pQSwz8HNl qbU41GY1Ait71VaEjjl/TbuaX7qW2sToh0vftdR9X/q1wT6XJPiuZNwgGtkYKCDH/uUq rcUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=0PzK4OKMvrNhKeXPBdDgABbhmqpas1BL0JTYgOKS1PI=; b=C7yhpHmD6xyWZkAPAmT4zIErVZNETsAXQ0udAX4/3hU9697UyTtl/rluTyrdnejUq2 G/9Pgxlsi9HwNVney6gZgf/gb0jFDXE2sDihKLTj/JGrgv2450KjG20zOKUH6BbtOQGF wcKkmoSHog+RNo6ptzbcy2dZ911wR8eFNYv9P4Zeof7V3+tKbuid18ht5DFLCxtHbo/X p2teZOKa3Ph2V/g48HvjSWDlT0DwuDRKyFuNKIfIxmib6brrRaR8ekBLqyWx1rg27kK6 EQfigt06Rmu01COqONDXUVIvHjCKNjJmabFexeoIocSb6StfOK8BmCWte+pSZewCEqt/ PtuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=L7CLieNT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h16si83367ejd.579.2020.11.03.13.53.04; Tue, 03 Nov 2020 13:53:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=L7CLieNT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729213AbgKCUsy (ORCPT + 99 others); Tue, 3 Nov 2020 15:48:54 -0500 Received: from mail.kernel.org ([198.145.29.99]:40980 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731657AbgKCUsw (ORCPT ); Tue, 3 Nov 2020 15:48:52 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2CAE722404; Tue, 3 Nov 2020 20:48:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604436530; bh=sOS9JyeR6Rscudf+1ciDITmx5jn9OXADeMeDFYN+gRo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=L7CLieNTUnnPNmC+IRq70wEAlBV/e/RJxAZeK7/0t6+N2iTZK5MriUB8RdfTwxkW4 wBYx/xNDIQwSNT6iswhL+28cnC5zbsY0VTpZtO44y9nih3D1c9Fax7ksr3ZpafjA6f 996/L9gcdqYfFE+MF+xFOavzZd9l/FsOV9hDKf/A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christophe Leroy , "Aneesh Kumar K.V" , Michael Ellerman Subject: [PATCH 5.9 263/391] powerpc: Fix random segfault when freeing hugetlb range Date: Tue, 3 Nov 2020 21:35:14 +0100 Message-Id: <20201103203404.769868838@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201103203348.153465465@linuxfoundation.org> References: <20201103203348.153465465@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Christophe Leroy commit 542db12a9c42d1ce70c45091765e02f74c129f43 upstream. The following random segfault is observed from time to time with map_hugetlb selftest: root@localhost:~# ./map_hugetlb 1 19 524288 kB hugepages Mapping 1 Mbytes Segmentation fault [ 31.219972] map_hugetlb[365]: segfault (11) at 117 nip 77974f8c lr 779a6834 code 1 in ld-2.23.so[77966000+21000] [ 31.220192] map_hugetlb[365]: code: 9421ffc0 480318d1 93410028 90010044 9361002c 93810030 93a10034 93c10038 [ 31.220307] map_hugetlb[365]: code: 93e1003c 93210024 8123007c 81430038 <80e90004> 814a0004 7f443a14 813a0004 [ 31.221911] BUG: Bad rss-counter state mm:(ptrval) type:MM_FILEPAGES val:33 [ 31.229362] BUG: Bad rss-counter state mm:(ptrval) type:MM_ANONPAGES val:5 This fault is due to hugetlb_free_pgd_range() freeing page tables that are also used by regular pages. As explain in the comment at the beginning of hugetlb_free_pgd_range(), the verification done in free_pgd_range() on floor and ceiling is not done here, which means hugetlb_free_pte_range() can free outside the expected range. As the verification cannot be done in hugetlb_free_pgd_range(), it must be done in hugetlb_free_pte_range(). Fixes: b250c8c08c79 ("powerpc/8xx: Manage 512k huge pages as standard pages.") Cc: stable@vger.kernel.org Signed-off-by: Christophe Leroy Reviewed-by: Aneesh Kumar K.V Signed-off-by: Michael Ellerman Link: https://lore.kernel.org/r/f0cb2a5477cd87d1eaadb128042e20aeb2bc2859.1598860677.git.christophe.leroy@csgroup.eu Signed-off-by: Greg Kroah-Hartman --- arch/powerpc/mm/hugetlbpage.c | 18 ++++++++++++++++-- 1 file changed, 16 insertions(+), 2 deletions(-) --- a/arch/powerpc/mm/hugetlbpage.c +++ b/arch/powerpc/mm/hugetlbpage.c @@ -330,10 +330,24 @@ static void free_hugepd_range(struct mmu get_hugepd_cache_index(pdshift - shift)); } -static void hugetlb_free_pte_range(struct mmu_gather *tlb, pmd_t *pmd, unsigned long addr) +static void hugetlb_free_pte_range(struct mmu_gather *tlb, pmd_t *pmd, + unsigned long addr, unsigned long end, + unsigned long floor, unsigned long ceiling) { + unsigned long start = addr; pgtable_t token = pmd_pgtable(*pmd); + start &= PMD_MASK; + if (start < floor) + return; + if (ceiling) { + ceiling &= PMD_MASK; + if (!ceiling) + return; + } + if (end - 1 > ceiling - 1) + return; + pmd_clear(pmd); pte_free_tlb(tlb, token, addr); mm_dec_nr_ptes(tlb->mm); @@ -363,7 +377,7 @@ static void hugetlb_free_pmd_range(struc */ WARN_ON(!IS_ENABLED(CONFIG_PPC_8xx)); - hugetlb_free_pte_range(tlb, pmd, addr); + hugetlb_free_pte_range(tlb, pmd, addr, end, floor, ceiling); continue; }