From: Jason Gunthorpe <j...@mellanox.com>

Trying to misuse a range outside its lifetime is a kernel bug. Use poison
bytes to help detect this condition. Double unregister will reliably crash.

Signed-off-by: Jason Gunthorpe <j...@mellanox.com>
Reviewed-by: Jérôme Glisse <jgli...@redhat.com>
Reviewed-by: John Hubbard <jhubb...@nvidia.com>
Acked-by: Souptick Joarder <jrdr.li...@gmail.com>
Reviewed-by: Ralph Campbell <rcampb...@nvidia.com>
Reviewed-by: Ira Weiny <ira.we...@intel.com>
Tested-by: Philip Yang <philip.y...@amd.com>
---
v2
- Keep range start/end valid after unregistration (Jerome)
v3
- Revise some comments (John)
- Remove start/end WARN_ON (Souptick)
---
 mm/hmm.c | 14 ++++++++------
 1 file changed, 8 insertions(+), 6 deletions(-)

diff --git a/mm/hmm.c b/mm/hmm.c
index e3e0a811a3a774..e214668cba3474 100644
--- a/mm/hmm.c
+++ b/mm/hmm.c
@@ -933,19 +933,21 @@ void hmm_range_unregister(struct hmm_range *range)
 {
        struct hmm *hmm = range->hmm;
 
-       /* Sanity check this really should not happen. */
-       if (hmm == NULL || range->end <= range->start)
-               return;
-
        mutex_lock(&hmm->lock);
        list_del_rcu(&range->list);
        mutex_unlock(&hmm->lock);
 
        /* Drop reference taken by hmm_range_register() */
-       range->valid = false;
        mmput(hmm->mm);
        hmm_put(hmm);
-       range->hmm = NULL;
+
+       /*
+        * The range is now invalid and the ref on the hmm is dropped, so
+         * poison the pointer.  Leave other fields in place, for the caller's
+         * use.
+         */
+       range->valid = false;
+       memset(&range->hmm, POISON_INUSE, sizeof(range->hmm));
 }
 EXPORT_SYMBOL(hmm_range_unregister);
 
-- 
2.21.0

_______________________________________________
dri-devel mailing list
dri-devel@lists.freedesktop.org
https://lists.freedesktop.org/mailman/listinfo/dri-devel

Reply via email to