Received: by 2002:a05:6512:3d0e:0:0:0:0 with SMTP id d14csp37904lfv; Tue, 12 Apr 2022 16:18:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz44s0clTFfx3gHZkwogl4gBNEJyOdGLO2TOujuAHlKyQ/08ShsdbJF6ouVku8rlB0QA7CG X-Received: by 2002:a17:902:a70a:b0:157:831:fb46 with SMTP id w10-20020a170902a70a00b001570831fb46mr28895566plq.49.1649805534279; Tue, 12 Apr 2022 16:18:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649805534; cv=none; d=google.com; s=arc-20160816; b=dZrISBwYcj7gCbsNifS8qWNhox5CTN0j6NHj7ptqRZNKbXvxQvToii2dUDwstUNpwz N8UsmUgvAZh/btVxRwFgwQA0OqmJYZHhDm9Ndhmto40GheM5iNN7r9Kipdkrj/WkKbo7 SvKJ3uBwqc7BfGOkvXKFgt9c4PiathFbxqnKeTggDuqjB2AqjYL8SMv2CuePtczETva8 uKIkGEoqbqgaNY284FQwuSAgODlTgdkK0K7kzTrHPYw+UuQuLOEfoESU7w+5NwftySw8 AD0KZPgN9ewtsGTZj7E0hZBJPSWeMiB0S3V4F/Ny/dDH70VPda/LyyY8njMlECLbTPO/ Md2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:references:in-reply-to :message-id:date:subject:cc:to:from:dkim-signature; bh=U07zXEF5XKiHrZJWluQBPtBzbqwPfha91C4VetzKe+k=; b=cWgKw5j6tjqfdd5+nbsyKqw5Vj/rLS9VbXsrPMedvOaUf29Cu3jwsHWweSf/62BhCQ +R7Prhw42mgSgjIYZmauUtR5/I3tdbOFSlUfzwOU21uTzrCZQNde+iIzMAjDGV8BpFi6 jUbQNL8fTFY8utgECJtER79FGZKNgOTBXH6Y9OoZa6wZ+5NN1iiJuuEScFdjwej2bOAz 9YbASijH3EvVHWjhX2TxDoq2CljxQUAcY00Bixn2xQf89Q2Kk/45V1RtK/YS7Ws916Da k+JUvSdKFBLAbLE5XH3klwkR7NgdS7sZkyuQxuc+uBPtwqxLIGiMjQW3cmL6lJwfyyOC lrjQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcdkim header.b=MPnKibYp; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id k12-20020a170902ce0c00b00153b974f3aesi13195707plg.427.2022.04.12.16.18.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Apr 2022 16:18:54 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcdkim header.b=MPnKibYp; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 3C5D5220B2E; Tue, 12 Apr 2022 15:03:41 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230246AbiDLU3n (ORCPT + 99 others); Tue, 12 Apr 2022 16:29:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48992 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230092AbiDLU25 (ORCPT ); Tue, 12 Apr 2022 16:28:57 -0400 Received: from alexa-out-sd-02.qualcomm.com (alexa-out-sd-02.qualcomm.com [199.106.114.39]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 398BEA27FE for ; Tue, 12 Apr 2022 13:26:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; i=@quicinc.com; q=dns/txt; s=qcdkim; t=1649795198; x=1681331198; h=from:to:cc:subject:date:message-id; bh=U07zXEF5XKiHrZJWluQBPtBzbqwPfha91C4VetzKe+k=; b=MPnKibYpukiTeiB26W9N+TTrKBB6SQvdgM4+UatuPVtjGBFgHLsrPvL1 Bk25ICjv+CH91oM6zO5bG4o7/NVpEKi1E0B4mXgdOI1DiUwRj0wkZFeBD 02OS564KT8q7HH2ePzoCMKYs8E8DkQhnEYYj7UJn/0eN4+KTHTXx6Zsvq I=; Received: from unknown (HELO ironmsg-SD-alpha.qualcomm.com) ([10.53.140.30]) by alexa-out-sd-02.qualcomm.com with ESMTP; 12 Apr 2022 13:17:03 -0700 X-QCInternal: smtphost Received: from th-lint-014.qualcomm.com ([10.63.177.51]) by ironmsg-SD-alpha.qualcomm.com with ESMTP; 12 Apr 2022 13:17:02 -0700 Received: by th-lint-014.qualcomm.com (Postfix, from userid 455663) id DEC2B139C; Tue, 12 Apr 2022 13:17:02 -0700 (PDT) From: Sudarshan Rajagopalan To: Andrew Morton , linux-mm@kvack.org, linux-kernel@vger.kernel.org Cc: Sudarshan Rajagopalan , Mike Rapoport , Anshuman Khandual , Suren Baghdasaryan Subject: [PATCH] mm, page_alloc: check pfn is valid before moving to freelist Date: Tue, 12 Apr 2022 13:16:23 -0700 Message-Id: X-Mailer: git-send-email 2.7.4 In-Reply-To: References: In-Reply-To: References: X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Check if pfn is valid before or not before moving it to freelist. There are possible scenario where a pageblock can have partial physical hole and partial part of System RAM. This happens when base address in RAM partition table is not aligned to pageblock size. Example: Say we have this first two entries in RAM partition table - Base Addr: 0x0000000080000000 Length: 0x0000000058000000 Base Addr: 0x00000000E3930000 Length: 0x0000000020000000 ... Physical hole: 0xD8000000 - 0xE3930000 On system having 4K as page size and hence pageblock size being 4MB, the base address 0xE3930000 is not aligned to 4MB pageblock size. Now we will have pageblock which has partial physical hole and partial part of System RAM - Pageblock [0xE3800000 - 0xE3C00000] - 0xE3800000 - 0xE3930000 -- physical hole 0xE3930000 - 0xE3C00000 -- System RAM Now doing __alloc_pages say we get a valid page with PFN 0xE3B00 from __rmqueue_fallback, we try to put other pages from the same pageblock as well into freelist by calling steal_suitable_fallback(). We then search for freepages from start of the pageblock due to below code - move_freepages_block(zone, page, migratetype, ...) { pfn = page_to_pfn(page); start_pfn = pfn & ~(pageblock_nr_pages - 1); end_pfn = start_pfn + pageblock_nr_pages - 1; ... } With the pageblock which has partial physical hole at the beginning, we will run into PFNs from the physical hole whose struct page is not initialized and is invalid, and system would crash as we operate on invalid struct page to find out of page is in Buddy or LRU or not [ 107.629453][ T9688] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 [ 107.639214][ T9688] Mem abort info: [ 107.642829][ T9688] ESR = 0x96000006 [ 107.646696][ T9688] EC = 0x25: DABT (current EL), IL = 32 bits [ 107.652878][ T9688] SET = 0, FnV = 0 [ 107.656751][ T9688] EA = 0, S1PTW = 0 [ 107.660705][ T9688] FSC = 0x06: level 2 translation fault [ 107.666455][ T9688] Data abort info: [ 107.670151][ T9688] ISV = 0, ISS = 0x00000006 [ 107.674827][ T9688] CM = 0, WnR = 0 [ 107.678615][ T9688] user pgtable: 4k pages, 39-bit VAs, pgdp=000000098a237000 [ 107.685970][ T9688] [0000000000000000] pgd=0800000987170003, p4d=0800000987170003, pud=0800000987170003, pmd=0000000000000000 [ 107.697582][ T9688] Internal error: Oops: 96000006 [#1] PREEMPT SMP [ 108.209839][ T9688] pc : move_freepages_block+0x174/0x27c [ 108.215407][ T9688] lr : steal_suitable_fallback+0x20c/0x398 [ 108.305908][ T9688] Call trace: [ 108.309151][ T9688] move_freepages_block+0x174/0x27c [PageLRU] [ 108.314359][ T9688] steal_suitable_fallback+0x20c/0x398 [ 108.319826][ T9688] rmqueue_bulk+0x250/0x934 [ 108.324325][ T9688] rmqueue_pcplist+0x178/0x2ac [ 108.329086][ T9688] rmqueue+0x5c/0xc10 [ 108.333048][ T9688] get_page_from_freelist+0x19c/0x430 [ 108.338430][ T9688] __alloc_pages+0x134/0x424 [ 108.343017][ T9688] page_cache_ra_unbounded+0x120/0x324 [ 108.348494][ T9688] do_sync_mmap_readahead+0x1b0/0x234 [ 108.353878][ T9688] filemap_fault+0xe0/0x4c8 [ 108.358375][ T9688] do_fault+0x168/0x6cc [ 108.362518][ T9688] handle_mm_fault+0x5c4/0x848 [ 108.367280][ T9688] do_page_fault+0x3fc/0x5d0 [ 108.371867][ T9688] do_translation_fault+0x6c/0x1b0 [ 108.376985][ T9688] do_mem_abort+0x68/0x10c [ 108.381389][ T9688] el0_ia+0x50/0xbc [ 108.385175][ T9688] el0t_32_sync_handler+0x88/0xbc [ 108.390208][ T9688] el0t_32_sync+0x1b8/0x1bc Hence, avoid operating on invalid pages within the same pageblock by checking if pfn is valid or not. Signed-off-by: Sudarshan Rajagopalan Fixes: 4c7b9896621be ("mm: remove pfn_valid_within() and CONFIG_HOLES_IN_ZONE") Cc: Mike Rapoport Cc: Anshuman Khandual Cc: Suren Baghdasaryan --- mm/page_alloc.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/mm/page_alloc.c b/mm/page_alloc.c index 6e5b448..e87aa053 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -2521,6 +2521,11 @@ static int move_freepages(struct zone *zone, int pages_moved = 0; for (pfn = start_pfn; pfn <= end_pfn;) { + if (!pfn_valid(pfn)) { + pfn++; + continue; + } + page = pfn_to_page(pfn); if (!PageBuddy(page)) { /* -- 2.7.4