Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp2861103pxb; Mon, 18 Apr 2022 09:45:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx6Bp3QcGD7TvMP/96B/1u9g/UOIaHmWckp2EmAJBweSBfj9lW6Wm2QYlGu+CTBP4HT/chg X-Received: by 2002:a17:906:9743:b0:6d8:632a:a42d with SMTP id o3-20020a170906974300b006d8632aa42dmr10048614ejy.157.1650300347411; Mon, 18 Apr 2022 09:45:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650300347; cv=none; d=google.com; s=arc-20160816; b=h8vLb3gshSUPFtZnjmfb8xp+r5ctG/rX48eCtl/1tg3kpabMQpRNBQbeeCVQEi9Or+ 9nEOskzu6Ag83Ighjn/ju5riHRL51V/SoXWA9L1T0ibnYWaUL7TevNGp6FoeOHWSqgSK OqG0rIWT/ieqysETaz/fLzfpvGNzT/6w/FxZOFqIVD17/f3n9UzxPYozoSG5E/ATwmCl uiyJS8+bNELIhI3wv7tpdMJ5BYSIeA+2qQpizVW38B5fIAkrhoUhlew947JCR8oxkWqG 1K4B8uhCSE7JxqnFVRu9TadZXcXBwLWgEMBIJnV+QA5SiW7OdhWjwQzf8j8rkQV4gFGx U6ew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=5H/5R/NV6B98mssow3wtpRRw8KWr3OfFLfZo/tLGqIc=; b=SGHn1mlVGoJiVsqbkQfU8MoK4ILbJxWjz7OErYrkNL58ydGWNzUjg3tJzjFVjy+YPW 8pBhjmj6vin4TEvkIIXm7WFw5UhMIYCl4X0XQPbLAKjjHlPSt2Hm9tjeYLXhLukDEMgh M+4tH3gDd1fGGPRONCYF7VPnDpdcb2FOwt26lPLQgRUgzRGKFXwOI6HO3cRLxETb2Cgx hARHZpmdiL+8FaZcVCOw2NZ+7ADhjlYPS3WM/O5OUEuoWBKtbAGqLmJI9Bnqbe6qtASx 3SkQZ04ZLBV4EZhFf+ZnDIpUn9tciTwgMKR7tkCSADD9RB+edmw9Zgtz1gY60Z8Hz25u 84QQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=HqebSq32; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b21-20020aa7c915000000b0041d8767f0ffsi6515586edt.246.2022.04.18.09.45.23; Mon, 18 Apr 2022 09:45:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=HqebSq32; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245382AbiDROCv (ORCPT + 99 others); Mon, 18 Apr 2022 10:02:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53666 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244292AbiDRNnz (ORCPT ); Mon, 18 Apr 2022 09:43:55 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0502D31379; Mon, 18 Apr 2022 05:59:51 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 4C3796097A; Mon, 18 Apr 2022 12:59:51 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 35CE0C385A1; Mon, 18 Apr 2022 12:59:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1650286790; bh=TTlhahfyNOmH+2TfRYslkbd4ok5bbYt18/G8W1qAsQQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HqebSq32msj7SGCV/N/eGo+7Q1ns3AAtgIzU6tKXuKB7HL0h/bzFMUEMcWtqKzpSJ 1pETdC+C6VEy8J3A+3p8oKeD8iP/c0ux8NSWjyJX+cvVqlkLf+FqwPjlkLc8gBZdTe zd8WobOuE47XtQgHQ9NbKxdg90rqTJnOMf2/VssI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+6bde52d89cfdf9f61425@syzkaller.appspotmail.com, Paolo Bonzini , Sean Christopherson , Andrew Morton , Linus Torvalds Subject: [PATCH 4.14 245/284] mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) Date: Mon, 18 Apr 2022 14:13:46 +0200 Message-Id: <20220418121219.068070285@linuxfoundation.org> X-Mailer: git-send-email 2.35.3 In-Reply-To: <20220418121210.689577360@linuxfoundation.org> References: <20220418121210.689577360@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Paolo Bonzini commit 01e67e04c28170c47700c2c226d732bbfedb1ad0 upstream. If an mremap() syscall with old_size=0 ends up in move_page_tables(), it will call invalidate_range_start()/invalidate_range_end() unnecessarily, i.e. with an empty range. This causes a WARN in KVM's mmu_notifier. In the past, empty ranges have been diagnosed to be off-by-one bugs, hence the WARNing. Given the low (so far) number of unique reports, the benefits of detecting more buggy callers seem to outweigh the cost of having to fix cases such as this one, where userspace is doing something silly. In this particular case, an early return from move_page_tables() is enough to fix the issue. Link: https://lkml.kernel.org/r/20220329173155.172439-1-pbonzini@redhat.com Reported-by: syzbot+6bde52d89cfdf9f61425@syzkaller.appspotmail.com Signed-off-by: Paolo Bonzini Cc: Sean Christopherson Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- mm/mremap.c | 3 +++ 1 file changed, 3 insertions(+) --- a/mm/mremap.c +++ b/mm/mremap.c @@ -203,6 +203,9 @@ unsigned long move_page_tables(struct vm unsigned long mmun_start; /* For mmu_notifiers */ unsigned long mmun_end; /* For mmu_notifiers */ + if (!len) + return 0; + old_end = old_addr + len; flush_cache_range(vma, old_addr, old_end);