[PATCH][SRU][BIONIC] mm/vmalloc: Sync unmappings in __purge_vmap_area_lazy()
Colin Ian King
colin.king at canonical.com
Sun Jul 28 12:54:39 UTC 2019
Sorry, actually DISCO and for DISCO HWE kernel. Apology for confusion.
Colin
On 28/07/2019 13:53, Colin King wrote:
> From: Colin Ian King <colin.king at canonical.com>
>
> BugLink: https://bugs.launchpad.net/bugs/1838115
>
> On x86-32 with PTI enabled, parts of the kernel page-tables are not shared
> between processes. This can cause mappings in the vmalloc/ioremap area to
> persist in some page-tables after the region is unmapped and released.
>
> When the region is re-used the processes with the old mappings do not fault
> in the new mappings but still access the old ones.
>
> This causes undefined behavior, in reality often data corruption, kernel
> oopses and panics and even spontaneous reboots.
>
> Fix this problem by activly syncing unmaps in the vmalloc/ioremap area to
> all page-tables in the system before the regions can be re-used.
>
> References: https://bugzilla.suse.com/show_bug.cgi?id=1118689
> Fixes: 5d72b4fba40ef ('x86, mm: support huge I/O mapping capability I/F')
> Signed-off-by: Joerg Roedel <jroedel at suse.de>
> Signed-off-by: Thomas Gleixner <tglx at linutronix.de>
> Reviewed-by: Dave Hansen <dave.hansen at linux.intel.com>
> Link: https://lkml.kernel.org/r/20190719184652.11391-4-joro@8bytes.org
> (backported from commit 3f8fd02b1bf1d7ba964485a56f2f4b53ae88c167)
> Signed-off-by: Colin Ian King <colin.king at canonical.com>
> ---
> arch/x86/mm/fault.c | 13 +++++--------
> 1 file changed, 5 insertions(+), 8 deletions(-)
>
> diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c
> index 9d5c75f02295..eb246b3df03d 100644
> --- a/arch/x86/mm/fault.c
> +++ b/arch/x86/mm/fault.c
> @@ -193,11 +193,12 @@ static inline pmd_t *vmalloc_sync_one(pgd_t *pgd, unsigned long address)
>
> pmd = pmd_offset(pud, address);
> pmd_k = pmd_offset(pud_k, address);
> - if (!pmd_present(*pmd_k))
> - return NULL;
>
> - if (!pmd_present(*pmd))
> + if (pmd_present(*pmd) != pmd_present(*pmd_k))
> set_pmd(pmd, *pmd_k);
> +
> + if (!pmd_present(*pmd_k))
> + return NULL;
> else
> BUG_ON(pmd_page(*pmd) != pmd_page(*pmd_k));
>
> @@ -219,17 +220,13 @@ void vmalloc_sync_all(void)
> spin_lock(&pgd_lock);
> list_for_each_entry(page, &pgd_list, lru) {
> spinlock_t *pgt_lock;
> - pmd_t *ret;
>
> /* the pgt_lock only for Xen */
> pgt_lock = &pgd_page_get_mm(page)->page_table_lock;
>
> spin_lock(pgt_lock);
> - ret = vmalloc_sync_one(page_address(page), address);
> + vmalloc_sync_one(page_address(page), address);
> spin_unlock(pgt_lock);
> -
> - if (!ret)
> - break;
> }
> spin_unlock(&pgd_lock);
> }
>
More information about the kernel-team
mailing list