linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: William Kucharski <william.kucharski@oracle.com>
To: Matthew Wilcox <matthew.wilcox@oracle.com>
Cc: Andrew Morton <akpm@linux-foundation.org>,
	xiaosong.ma <Xiaosong.Ma@unisoc.com>,
	Alexander Viro <viro@zeniv.linux.org.uk>,
	Linux-MM <linux-mm@kvack.org>,
	LKML <linux-kernel@vger.kernel.org>,
	Zhaoyang Huang <huangzhaoyang@gmail.com>,
	"yuming.han@unisoc.com" <yuming.han@unisoc.com>,
	"ke.wang@unisoc.com" <ke.wang@unisoc.com>
Subject: Re: [PATCH V2] perform the check when page without mapping but page->mapping contains junk or random bitscribble
Date: Thu, 13 Apr 2023 07:50:36 +0000	[thread overview]
Message-ID: <B79DF95E-BECC-40DE-A84F-3B732DCEE74B@oracle.com> (raw)
In-Reply-To: <ZDbK0Wr2uerk/7C5@casper.infradead.org>

Just looking at this and the backtrace:

> On Apr 12, 2023, at 09:14, Matthew Wilcox <willy@infradead.org> wrote:
> 
> On Tue, Apr 11, 2023 at 05:15:36PM -0700, Andrew Morton wrote:
>> On Tue, 11 Apr 2023 13:16:18 +0100 Matthew Wilcox <willy@infradead.org> wrote:
>> 
>>> On Mon, Apr 10, 2023 at 09:45:02AM +0800, xiaosong.ma wrote:
>>>> perform the check in dump_mapping() to print warning info and avoid crash with invalid non-NULL page->mapping.
>>>> For example, a panic with following backtraces show dump_page will show wrong info and panic when the bad page
>>>> is non-NULL mapping and page->mapping is 0x80000000000.
>>>> 
>>>>    crash_arm64> bt
>>>>    PID: 232    TASK: ffffff80e8c2c340  CPU: 0   COMMAND: "Binder:232_2"
>>>>     #0 [ffffffc013e5b080] sysdump_panic_event$b2bce43a479f4f7762201bfee02d7889 at ffffffc0108d7c2c
>>>>     #1 [ffffffc013e5b0c0] atomic_notifier_call_chain at ffffffc010300228
>>>>     #2 [ffffffc013e5b2c0] panic at ffffffc0102c926c
>>>>     #3 [ffffffc013e5b370] die at ffffffc010267670
>>>>     #4 [ffffffc013e5b3a0] die_kernel_fault at ffffffc0102808a4
>>>>     #5 [ffffffc013e5b3d0] __do_kernel_fault at ffffffc010280820
>>>>     #6 [ffffffc013e5b410] do_bad_area at ffffffc01028059c
>>>>     #7 [ffffffc013e5b440] do_translation_fault$4df5decbea5d08a63349aa36f07426b2 at ffffffc0111149c8
>>>>     #8 [ffffffc013e5b470] do_mem_abort at ffffffc0100a4488
>>>>     #9 [ffffffc013e5b5e0] el1_ia at ffffffc0100a6c00
>>>>     #10 [ffffffc013e5b5f0] __dump_page at ffffffc0104beecc
>>> 
>>> This doesn't show a crash in dump_mapping(), it shows a crash in
>>> __dump_page().
>> 
>> um, yes.
>> 
>> But if page->mapping is corrupted, where does __dump_page() dereference it?
> 
> I don't see anywhere that it does, so I'm suspicious that we have the
> correct diagnosis here.

I agree; since dump_mapping() is an actual function rather than a macro or
inline, if a bad dereference were happening within dump_mapping() I would think
we SHOULD see the call to dump_mapping() on the stack unless I'm missing
something obvious here.

Instead I'd like to know which instruction the faulting address in __dump_page()
maps to for the kernel experiencing this.

>> The initial patch
>> (https://lkml.kernel.org/r/1680587425-4683-1-git-send-email-Xiaosong.Ma@unisoc.com)
>> prevented __dump_page() from calling dump_mapping() if page->mapping is
>> bad, and that presumably fixed things.
> 
> Right, but doesn't the _existing_ get_kernel_nofault(host, &mapping->host)
> already prevent us from blindly dereferencing a bad mapping pointer?

I would think it would, but given the traceback, is the fault occurring
within dump_mapping(), or have we perhaps completed dump_mapping() and some
subtle corruption occurred such that the fault occurs on the return to
__dump_page()?

Certainly dump_mapping() looks to do the right thing to avoid using a bad
passed "mapping" as it's not dereferenced anywhere without checks, just
used for pointer math to create an address for calls to get_kernel_notfault().

>> So confusion reigns.  I think making dump_mapping() tolerant of a wild
>> mapping pointer makes sense, but I don't think we actually know why the
>> reporter's kernel crashed.
> 
> In my mind dump_mapping() is already tolerant of a wild page->mapping
> pointer.  I think the problem is something entirely different.

Again, I agree.

As posited above, could it be that something occurs within dump_mapping()
such that when the code returns to __dump_page() it is at THAT point that
the fault occurs? That would explain the backtrace and why it shows the
fault as occurring within __dump_page(), but upon first glance the
mechanism by which this could be occurring eludes me.

The original patch doesn't mention whether any pr_warn() messages were
printed as a result of the call to dump_mapping(), and the suggested fix
would fix the issue whether the fault were occurring within dump_mapping() or
in the return from calling dump_mapping().

    -- Bill



      reply	other threads:[~2023-04-13  7:50 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-04-10  1:45 [PATCH V2] fs: " xiaosong.ma
2023-04-11 12:16 ` Matthew Wilcox
2023-04-12  0:15   ` Andrew Morton
2023-04-12 15:14     ` Matthew Wilcox
2023-04-13  7:50       ` William Kucharski [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=B79DF95E-BECC-40DE-A84F-3B732DCEE74B@oracle.com \
    --to=william.kucharski@oracle.com \
    --cc=Xiaosong.Ma@unisoc.com \
    --cc=akpm@linux-foundation.org \
    --cc=huangzhaoyang@gmail.com \
    --cc=ke.wang@unisoc.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=matthew.wilcox@oracle.com \
    --cc=viro@zeniv.linux.org.uk \
    --cc=yuming.han@unisoc.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox