lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9316269c-dbc4-45e4-a580-082edcf3a65d@suse.com>
Date: Fri, 31 Jan 2025 07:38:53 +0100
From: Jürgen Groß <jgross@...e.com>
To: Stefano Stabellini <sstabellini@...nel.org>
Cc: Harshvardhan Jha <harshvardhan.j.jha@...cle.com>,
 Greg KH <gregkh@...uxfoundation.org>, Konrad Wilk <konrad.wilk@...cle.com>,
 Boris Ostrovsky <boris.ostrovsky@...cle.com>,
 "xen-devel@...ts.xenproject.org" <xen-devel@...ts.xenproject.org>,
 "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
 Harshit Mogalapalli <harshit.m.mogalapalli@...cle.com>,
 stable@...r.kernel.org
Subject: Re: v5.4.289 failed to boot with error megasas_build_io_fusion 3219
 sge_count (-12) is out of range

On 30.01.25 21:28, Stefano Stabellini wrote:
> On Thu, 30 Jan 2025, Jürgen Groß wrote:
>> Can you try the attached patch, please? I don't have a system at hand
>> showing the problem.
>>
>>  From cff43e997f79a95dc44e02debaeafe5f127f40bb Mon Sep 17 00:00:00 2001
>> From: Juergen Gross <jgross@...e.com>
>> Date: Thu, 30 Jan 2025 09:56:57 +0100
>> Subject: [PATCH] x86/xen: allow larger contiguous memory regions in PV guests
>>
>> Today a PV guest (including dom0) can create 2MB contiguous memory
>> regions for DMA buffers at max. This has led to problems at least
>> with the megaraid_sas driver, which wants to allocate a 2.3MB DMA
>> buffer.
>>
>> The limiting factor is the frame array used to do the hypercall for
>> making the memory contiguous, which has 512 entries and is just a
>> static array in mmu_pv.c.
>>
>> In case a contiguous memory area larger than the initially supported
>> 2MB is requested, allocate a larger buffer for the frame list. Note
>> that such an allocation is tried only after memory management has been
>> initialized properly, which is tested via the early_boot_irqs_disabled
>> flag.
>>
>> Fixes: 9f40ec84a797 ("xen/swiotlb: add alignment check for dma buffers")
>> Signed-off-by: Juergen Gross <jgross@...e.com>
>> ---
>> Note that the "Fixes:" tag is not really correct, as that patch didn't
>> introduce the problem, but rather made it visible. OTOH it is the best
>> indicator we have to identify kernel versions this patch should be
>> backported to.
>> ---
>>   arch/x86/xen/mmu_pv.c | 44 ++++++++++++++++++++++++++++++++++++-------
>>   1 file changed, 37 insertions(+), 7 deletions(-)
>>
>> diff --git a/arch/x86/xen/mmu_pv.c b/arch/x86/xen/mmu_pv.c
>> index 55a4996d0c04..62aec29b8174 100644
>> --- a/arch/x86/xen/mmu_pv.c
>> +++ b/arch/x86/xen/mmu_pv.c
>> @@ -2200,8 +2200,10 @@ void __init xen_init_mmu_ops(void)
>>   }
>>   
>>   /* Protected by xen_reservation_lock. */
>> -#define MAX_CONTIG_ORDER 9 /* 2MB */
>> -static unsigned long discontig_frames[1<<MAX_CONTIG_ORDER];
>> +#define MIN_CONTIG_ORDER 9 /* 2MB */
>> +static unsigned int discontig_frames_order = MIN_CONTIG_ORDER;
>> +static unsigned long discontig_frames_early[1UL << MIN_CONTIG_ORDER];
>> +static unsigned long *discontig_frames = discontig_frames_early;
>>   
>>   #define VOID_PTE (mfn_pte(0, __pgprot(0)))
>>   static void xen_zap_pfn_range(unsigned long vaddr, unsigned int order,
>> @@ -2319,18 +2321,44 @@ int xen_create_contiguous_region(phys_addr_t pstart, unsigned int order,
>>   				 unsigned int address_bits,
>>   				 dma_addr_t *dma_handle)
>>   {
>> -	unsigned long *in_frames = discontig_frames, out_frame;
>> +	unsigned long *in_frames, out_frame;
>> +	unsigned long *new_array, *old_array;
>>   	unsigned long  flags;
>>   	int            success;
>>   	unsigned long vstart = (unsigned long)phys_to_virt(pstart);
>>   
>> -	if (unlikely(order > MAX_CONTIG_ORDER))
>> -		return -ENOMEM;
>> +	if (unlikely(order > discontig_frames_order)) {
>> +		if (early_boot_irqs_disabled)
>> +			return -ENOMEM;
>> +
>> +		new_array = vmalloc(sizeof(unsigned long) * (1UL << order));
>> +
>> +		if (!new_array)
>> +			return -ENOMEM;
>> +
>> +		spin_lock_irqsave(&xen_reservation_lock, flags);
>> +
>> +		if (order > discontig_frames_order) {
> 
> 
> This second if check should not be needed because it is the same as the
> outer if check.

It is needed, as inside the locked region I need to verify that no
concurrent call did already update the buffer, maybe with an even
larger size.


Juergen

Download attachment "OpenPGP_0xB0DE9DD628BF132F.asc" of type "application/pgp-keys" (3684 bytes)

Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (496 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ