[PATCH v5] mm: huge-vmap: fail gracefully on unexpected huge vmap mappings

Andrew Morton akpm at linux-foundation.org
Thu Jun 15 15:16:37 PDT 2017


On Fri, 16 Jun 2017 00:11:53 +0200 Ard Biesheuvel <ard.biesheuvel at linaro.org> wrote:

> 
> 
> > On 15 Jun 2017, at 23:24, Andrew Morton <akpm at linux-foundation.org> wrote:
> > 
> >> On Fri,  9 Jun 2017 08:22:26 +0000 Ard Biesheuvel <ard.biesheuvel at linaro.org> wrote:
> >> 
> >> Existing code that uses vmalloc_to_page() may assume that any
> >> address for which is_vmalloc_addr() returns true may be passed
> >> into vmalloc_to_page() to retrieve the associated struct page.
> >> 
> >> This is not un unreasonable assumption to make, but on architectures
> >> that have CONFIG_HAVE_ARCH_HUGE_VMAP=y, it no longer holds, and we
> >> need to ensure that vmalloc_to_page() does not go off into the weeds
> >> trying to dereference huge PUDs or PMDs as table entries.
> >> 
> >> Given that vmalloc() and vmap() themselves never create huge
> >> mappings or deal with compound pages at all, there is no correct
> >> answer in this case, so return NULL instead, and issue a warning.
> > 
> > Is this patch known to fix any current user-visible problem?
> 
> Yes. When reading /proc/kcore on arm64, you will hit an oops as soon as you hit the huge mappings used for the various segments that make up the mapping of vmlinux. With this patch applied, you will no longer hit the oops, but the kcore contents willl be incorrect (these regions will be zeroed out)
> 
> We are fixing this for kcore specifically, so it avoids vread() for  those regions. At least one other problematic user exists, i.e., /dev/kmem, but that is currently broken on arm64 for other reasons.
> 

Do you have any suggestions regarding which kernel version(s) should
get this patch?




More information about the linux-arm-kernel mailing list