From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 196ACC77B7F for ; Mon, 23 Jun 2025 13:09:50 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 9C5EC6B009C; Mon, 23 Jun 2025 09:09:49 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 9761E6B00A0; Mon, 23 Jun 2025 09:09:49 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 865156B00A2; Mon, 23 Jun 2025 09:09:49 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 734386B009C for ; Mon, 23 Jun 2025 09:09:49 -0400 (EDT) Received: from smtpin09.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id 308341A036F for ; Mon, 23 Jun 2025 13:09:49 +0000 (UTC) X-FDA: 83586697698.09.4ACB210 Received: from nyc.source.kernel.org (nyc.source.kernel.org [147.75.193.91]) by imf03.hostedemail.com (Postfix) with ESMTP id 566122000D for ; Mon, 23 Jun 2025 13:09:47 +0000 (UTC) Authentication-Results: imf03.hostedemail.com; dkim=pass header.d=linuxfoundation.org header.s=korg header.b=P5HulqZu; spf=pass (imf03.hostedemail.com: domain of gregkh@linuxfoundation.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=gregkh@linuxfoundation.org; dmarc=pass (policy=none) header.from=linuxfoundation.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1750684187; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=kziQ6odmo1w8MJamuV9gEScS9093DJQs+aiRph+y9cE=; b=5ZIFd2cExkiknZmGd1lzKUkIefczOlOAhqoR1GU8D/p3zY9eLKze/I5Mdg7V2GMIIipcll 7O6b6/WzKkCWStrOOtTGsqCXKoXH30I6QnnOiyc9OqRkeSpA7hVnR+mK4/g2z+g32If0e0 1GBOZET34Z7BbSCPwqs2y9XpmZoIsSE= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1750684187; a=rsa-sha256; cv=none; b=TUrNcavmG9rFmiLBJbjAwhBOMEtZRlrXrCWadGzlQbtOcUWLvMN98EH3OxEA1yIodNaEOy Drso1vhv9/SxXI9k8YU5ikbhYuFujnG359RulvV9sYHhTvTLRnzB3yrvbZ1sqU87LYkunf uwRfxUcjM6dUUe85zx9Hmz2BDGC3Fmg= ARC-Authentication-Results: i=1; imf03.hostedemail.com; dkim=pass header.d=linuxfoundation.org header.s=korg header.b=P5HulqZu; spf=pass (imf03.hostedemail.com: domain of gregkh@linuxfoundation.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=gregkh@linuxfoundation.org; dmarc=pass (policy=none) header.from=linuxfoundation.org Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by nyc.source.kernel.org (Postfix) with ESMTP id 9CC28A51BCF; Mon, 23 Jun 2025 13:09:46 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1C9D5C4CEF0; Mon, 23 Jun 2025 13:09:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1750684186; bh=xKGizfuFgolosNWRv24GARdLNV+LVClnNi8r3gOsdko=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=P5HulqZu1A7MIWRT3MqwlDc1seAOLpy9lxsXKzPbYVbamk/kAyXG5oWYErLiNrmBq Ux6PeDXgsuk7K2SMX8nHv1z+YX58oMn6JF27CVyY4N5YJk/DwQWZeQpkgLLisa6hTb vmygxa1prRbc4PbsTmaVTfcMcDlkPfYCFEq4QxuU= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Peter Xu , Mark Rutland , Lorenzo Stoakes , "Liam R. Howlett" , "Mike Rapoport (IBM)" , Andrew Morton , linux-mm@kvack.org, Jakub Acs Subject: [PATCH 6.1 001/508] mm/uffd: fix vma operation where start addr cuts part of vma Date: Mon, 23 Jun 2025 15:00:46 +0200 Message-ID: <20250623130645.295748263@linuxfoundation.org> X-Mailer: git-send-email 2.50.0 In-Reply-To: <20250623130645.255320792@linuxfoundation.org> References: <20250623130645.255320792@linuxfoundation.org> User-Agent: quilt/0.68 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Rspamd-Server: rspam02 X-Rspamd-Queue-Id: 566122000D X-Stat-Signature: x1jqpx4gudq8wrjiryk9dtxdaot5yb3o X-Rspam-User: X-HE-Tag: 1750684187-241380 X-HE-Meta: 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 gBSPKjrR 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: 6.1-stable review patch. If anyone has any objections, please let me know. ------------------ From: Peter Xu commit 270aa010620697fb27b8f892cc4e194bc2b7d134 upstream. Patch series "mm/uffd: Fix vma merge/split", v2. This series contains two patches that fix vma merge/split for userfaultfd on two separate issues. Patch 1 fixes a regression since 6.1+ due to something we overlooked when converting to maple tree apis. The plan is we use patch 1 to replace the commit "2f628010799e (mm: userfaultfd: avoid passing an invalid range to vma_merge())" in mm-hostfixes-unstable tree if possible, so as to bring uffd vma operations back aligned with the rest code again. Patch 2 fixes a long standing issue that vma can be left unmerged even if we can for either uffd register or unregister. Many thanks to Lorenzo on either noticing this issue from the assert movement patch, looking at this problem, and also provided a reproducer on the unmerged vma issue [1]. [1] https://gist.github.com/lorenzo-stoakes/a11a10f5f479e7a977fc456331266e0e This patch (of 2): It seems vma merging with uffd paths is broken with either register/unregister, where right now we can feed wrong parameters to vma_merge() and it's found by recent patch which moved asserts upwards in vma_merge() by Lorenzo Stoakes: https://lore.kernel.org/all/ZFunF7DmMdK05MoF@FVFF77S0Q05N.cambridge.arm.com/ It's possible that "start" is contained within vma but not clamped to its start. We need to convert this into either "cannot merge" case or "can merge" case 4 which permits subdivision of prev by assigning vma to prev. As we loop, each subsequent VMA will be clamped to the start. This patch will eliminate the report and make sure vma_merge() calls will become legal again. One thing to mention is that the "Fixes: 29417d292bd0" below is there only to help explain where the warning can start to trigger, the real commit to fix should be 69dbe6daf104. Commit 29417d292bd0 helps us to identify the issue, but unfortunately we may want to keep it in Fixes too just to ease kernel backporters for easier tracking. Link: https://lkml.kernel.org/r/20230517190916.3429499-1-peterx@redhat.com Link: https://lkml.kernel.org/r/20230517190916.3429499-2-peterx@redhat.com Fixes: 69dbe6daf104 ("userfaultfd: use maple tree iterator to iterate VMAs") Signed-off-by: Peter Xu Reported-by: Mark Rutland Reviewed-by: Lorenzo Stoakes Reviewed-by: Liam R. Howlett Closes: https://lore.kernel.org/all/ZFunF7DmMdK05MoF@FVFF77S0Q05N.cambridge.arm.com/ Cc: Lorenzo Stoakes Cc: Mike Rapoport (IBM) Cc: Liam R. Howlett Cc: Signed-off-by: Andrew Morton [acsjakub: contextual change - keep call to mas_next()] Cc: Signed-off-by: Jakub Acs Signed-off-by: Greg Kroah-Hartman --- fs/userfaultfd.c | 6 ++++++ 1 file changed, 6 insertions(+) --- a/fs/userfaultfd.c +++ b/fs/userfaultfd.c @@ -1426,6 +1426,9 @@ static int userfaultfd_register(struct u if (prev != vma) mas_next(&mas, ULONG_MAX); + if (vma->vm_start < start) + prev = vma; + ret = 0; do { cond_resched(); @@ -1603,6 +1606,9 @@ static int userfaultfd_unregister(struct if (prev != vma) mas_next(&mas, ULONG_MAX); + if (vma->vm_start < start) + prev = vma; + ret = 0; do { cond_resched();