NACK: [PATCH][SRU][BIONIC] mm/vmalloc: Sync unmappings in __purge_vmap_area_lazy()
Colin Ian King
colin.king at canonical.com
Sun Jul 28 13:00:37 UTC 2019
I bodged this up, V2 coming soon.
On 28/07/2019 13:54, Colin Ian King wrote:
> Sorry, actually DISCO and for DISCO HWE kernel. Apology for confusion.
>
> Colin
>
> On 28/07/2019 13:53, Colin King wrote:
>> From: Colin Ian King <colin.king at canonical.com>
>>
>> BugLink: https://bugs.launchpad.net/bugs/1838115
>>
>> On x86-32 with PTI enabled, parts of the kernel page-tables are not shared
>> between processes. This can cause mappings in the vmalloc/ioremap area to
>> persist in some page-tables after the region is unmapped and released.
>>
>> When the region is re-used the processes with the old mappings do not fault
>> in the new mappings but still access the old ones.
>>
>> This causes undefined behavior, in reality often data corruption, kernel
>> oopses and panics and even spontaneous reboots.
>>
>> Fix this problem by activly syncing unmaps in the vmalloc/ioremap area to
>> all page-tables in the system before the regions can be re-used.
>>
>> References: https://bugzilla.suse.com/show_bug.cgi?id=1118689
>> Fixes: 5d72b4fba40ef ('x86, mm: support huge I/O mapping capability I/F')
>> Signed-off-by: Joerg Roedel <jroedel at suse.de>
>> Signed-off-by: Thomas Gleixner <tglx at linutronix.de>
>> Reviewed-by: Dave Hansen <dave.hansen at linux.intel.com>
>> Link: https://lkml.kernel.org/r/20190719184652.11391-4-joro@8bytes.org
>> (backported from commit 3f8fd02b1bf1d7ba964485a56f2f4b53ae88c167)
>> Signed-off-by: Colin Ian King <colin.king at canonical.com>
>> ---
>> arch/x86/mm/fault.c | 13 +++++--------
>> 1 file changed, 5 insertions(+), 8 deletions(-)
>>
>> diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c
>> index 9d5c75f02295..eb246b3df03d 100644
>> --- a/arch/x86/mm/fault.c
>> +++ b/arch/x86/mm/fault.c
>> @@ -193,11 +193,12 @@ static inline pmd_t *vmalloc_sync_one(pgd_t *pgd, unsigned long address)
>>
>> pmd = pmd_offset(pud, address);
>> pmd_k = pmd_offset(pud_k, address);
>> - if (!pmd_present(*pmd_k))
>> - return NULL;
>>
>> - if (!pmd_present(*pmd))
>> + if (pmd_present(*pmd) != pmd_present(*pmd_k))
>> set_pmd(pmd, *pmd_k);
>> +
>> + if (!pmd_present(*pmd_k))
>> + return NULL;
>> else
>> BUG_ON(pmd_page(*pmd) != pmd_page(*pmd_k));
>>
>> @@ -219,17 +220,13 @@ void vmalloc_sync_all(void)
>> spin_lock(&pgd_lock);
>> list_for_each_entry(page, &pgd_list, lru) {
>> spinlock_t *pgt_lock;
>> - pmd_t *ret;
>>
>> /* the pgt_lock only for Xen */
>> pgt_lock = &pgd_page_get_mm(page)->page_table_lock;
>>
>> spin_lock(pgt_lock);
>> - ret = vmalloc_sync_one(page_address(page), address);
>> + vmalloc_sync_one(page_address(page), address);
>> spin_unlock(pgt_lock);
>> -
>> - if (!ret)
>> - break;
>> }
>> spin_unlock(&pgd_lock);
>> }
>>
>
>
More information about the kernel-team
mailing list