Received: by 2002:ac2:464d:0:0:0:0:0 with SMTP id s13csp3666050lfo; Mon, 23 May 2022 10:47:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzH7gUV5FNYopqkKcqifrsX2baMxR2iAe/R5IK4m+b1+ZoqrXw0QRfJsed61NUXHUgLk2Iu X-Received: by 2002:a17:903:2443:b0:162:223c:c0e9 with SMTP id l3-20020a170903244300b00162223cc0e9mr6414458pls.68.1653328055908; Mon, 23 May 2022 10:47:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653328055; cv=none; d=google.com; s=arc-20160816; b=FOffUiBkoWbRjhwtkEHncbCVGwSHSCs0tWINxL2HQFVBh2cCFEQl40juDU75ntrbR+ 0FvTz5v5FtOT7vh+enr1HCWLGJTJPlqpiBLX2TsEZ9KPtfpN95g8usChwcuUVxjCMboI YE/zu/mzeOfwVWKDWq4UO17s7AJ0pSOMibini5JvGdg1jTZsVyaaFNypaG11zOpvuXcB cO/x8lu2Vads0TsygCEKfDJnGHPyyUzYx6x+WuidNoL6rIjtQzmr9dGaJhmOzm4Q5Cab HSaG7xLXF6WeA76p10v6M7kTIH1V4w0u0Mvehm5Nfn3F/L6UfvAtkQM+ZSIspsK/sOZR HloA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fu9obdGJkhKRgpIUmwQOoJ0XxAHLK1PnyNbtxFK/0Bg=; b=R7nkoKM7/uGkV9TCO8OfMasq9hRhFwstpV0Dc0Pd9nZ1oC5WuR5apwOS80hhp9XZBS 56RMGUApO5yN57ABCE3bzqPoqSLt57iZIi6lfOlEpj+/Qq9OVVqQqqXoCqadqH4U+gt4 iI5ePJ8AJctQeo+FNuE/6XLwtf7XmFgcDiTdlkEGKwEqHy1Ue/izmGyEw1OJ3tWm1JFI BDr6y2zIQrGFqLofNN1bt96v4QXClNK6zNOXKNWXWQzlRsOoNQT5a11VWK9pb9x4SHzr yOCTbDqFty4rGLfCMuoY4MthMX+FTrYV2PF/5gR9vOKFgEfxe+f42pYRKqcDnr+dRjw7 n2KQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=H+9axquI; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id l70-20020a638849000000b003fa0de11095si7804789pgd.219.2022.05.23.10.47.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 May 2022 10:47:35 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=H+9axquI; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from out1.vger.email (out1.vger.email [IPv6:2620:137:e000::1:20]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 51D87BE13; Mon, 23 May 2022 10:46:00 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243944AbiEWRic (ORCPT + 99 others); Mon, 23 May 2022 13:38:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42082 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241780AbiEWR1G (ORCPT ); Mon, 23 May 2022 13:27:06 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 21AFD76296; Mon, 23 May 2022 10:22:17 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 1935460B35; Mon, 23 May 2022 17:17:11 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1A795C385AA; Mon, 23 May 2022 17:17:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1653326230; bh=JZDfGwicm4UzRJBNTauQ/RxXh66EuHlgvHU7cppd+uk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=H+9axquIQgY9W56KiK46UIKaj1nw/3JJbm9NUGN+E9G6vT7qHCe6OY5D5KTIGoWp6 JF/O6m9yticTfa+8aeDF2oyfZfcJ+H3b5wSt/Sz+FwB8b8DxLxnPv8lUpr2as1YlPo dpxDuxIPLjRCRdO9qvGSAq8MyiT6ZKh9mkJve+xg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Hyeonggon Yoo <42.hyeyoo@gmail.com>, Marco Elver , Muchun Song , Alexander Potapenko , Dmitry Vyukov , Andrew Morton Subject: [PATCH 5.15 017/132] mm/kfence: reset PG_slab and memcg_data before freeing __kfence_pool Date: Mon, 23 May 2022 19:03:46 +0200 Message-Id: <20220523165826.446123536@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220523165823.492309987@linuxfoundation.org> References: <20220523165823.492309987@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Hyeonggon Yoo <42.hyeyoo@gmail.com> commit 2839b0999c20c9f6bf353849c69370e121e2fa1a upstream. When kfence fails to initialize kfence pool, it frees the pool. But it does not reset memcg_data and PG_slab flag. Below is a BUG because of this. Let's fix it by resetting memcg_data and PG_slab flag before free. [ 0.089149] BUG: Bad page state in process swapper/0 pfn:3d8e06 [ 0.089149] page:ffffea46cf638180 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3d8e06 [ 0.089150] memcg:ffffffff94a475d1 [ 0.089150] flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) [ 0.089151] raw: 0017ffffc0000200 ffffea46cf638188 ffffea46cf638188 0000000000000000 [ 0.089152] raw: 0000000000000000 0000000000000000 00000000ffffffff ffffffff94a475d1 [ 0.089152] page dumped because: page still charged to cgroup [ 0.089153] Modules linked in: [ 0.089153] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G B W 5.18.0-rc1+ #965 [ 0.089154] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014 [ 0.089154] Call Trace: [ 0.089155] [ 0.089155] dump_stack_lvl+0x49/0x5f [ 0.089157] dump_stack+0x10/0x12 [ 0.089158] bad_page.cold+0x63/0x94 [ 0.089159] check_free_page_bad+0x66/0x70 [ 0.089160] __free_pages_ok+0x423/0x530 [ 0.089161] __free_pages_core+0x8e/0xa0 [ 0.089162] memblock_free_pages+0x10/0x12 [ 0.089164] memblock_free_late+0x8f/0xb9 [ 0.089165] kfence_init+0x68/0x92 [ 0.089166] start_kernel+0x789/0x992 [ 0.089167] x86_64_start_reservations+0x24/0x26 [ 0.089168] x86_64_start_kernel+0xa9/0xaf [ 0.089170] secondary_startup_64_no_verify+0xd5/0xdb [ 0.089171] Link: https://lkml.kernel.org/r/YnPG3pQrqfcgOlVa@hyeyoo Fixes: 0ce20dd84089 ("mm: add Kernel Electric-Fence infrastructure") Fixes: 8f0b36497303 ("mm: kfence: fix objcgs vector allocation") Signed-off-by: Hyeonggon Yoo <42.hyeyoo@gmail.com> Reviewed-by: Marco Elver Reviewed-by: Muchun Song Cc: Alexander Potapenko Cc: Dmitry Vyukov Signed-off-by: Andrew Morton [42.hyeyoo@gmail.com: backport - use struct page] Signed-off-by: Hyeonggon Yoo <42.hyeyoo@gmail.com> Signed-off-by: Greg Kroah-Hartman --- mm/kfence/core.c | 11 +++++++++++ 1 file changed, 11 insertions(+) --- a/mm/kfence/core.c +++ b/mm/kfence/core.c @@ -510,6 +510,7 @@ static bool __init kfence_init_pool(void unsigned long addr = (unsigned long)__kfence_pool; struct page *pages; int i; + char *p; if (!__kfence_pool) return false; @@ -592,6 +593,16 @@ err: * fails for the first page, and therefore expect addr==__kfence_pool in * most failure cases. */ + for (p = (char *)addr; p < __kfence_pool + KFENCE_POOL_SIZE; p += PAGE_SIZE) { + struct page *page = virt_to_page(p); + + if (!PageSlab(page)) + continue; +#ifdef CONFIG_MEMCG + page->memcg_data = 0; +#endif + __ClearPageSlab(page); + } memblock_free_late(__pa(addr), KFENCE_POOL_SIZE - (addr - (unsigned long)__kfence_pool)); __kfence_pool = NULL; return false;