* [PATCH 1/4] hwpoison: prevent /dev/kmem from accessing hwpoison pages
[not found] <20100130092509.793222613@intel.com>
@ 2010-01-30 9:25 ` Wu Fengguang
2010-01-30 9:25 ` [PATCH 4/4] hwpoison: avoid "still referenced by -1 users" warning Wu Fengguang
1 sibling, 0 replies; 2+ messages in thread
From: Wu Fengguang @ 2010-01-30 9:25 UTC (permalink / raw)
To: Andrew Morton, Andi Kleen
Cc: KAMEZAWA Hiroyuki, Greg KH, Benjamin Herrenschmidt,
Christoph Lameter, Ingo Molnar, Tejun Heo, Nick Piggin,
Wu Fengguang, LKML, Linux Memory Management List
[-- Attachment #1: hwpoison-dev-kmem.patch --]
[-- Type: text/plain, Size: 3232 bytes --]
When /dev/kmem read()/write() encounters hwpoison page, stop it
and return the amount of work done till now, or return -EIO if
nothing have been copied.
For simplicity, hwpoison pages accessed by vmalloc address are
siliently skipped, instead of returning -EIO.
CC: Greg KH <greg@kroah.com>
CC: Andi Kleen <andi@firstfloor.org>
CC: Benjamin Herrenschmidt <benh@kernel.crashing.org>
CC: Christoph Lameter <cl@linux-foundation.org>
CC: Ingo Molnar <mingo@elte.hu>
CC: Tejun Heo <tj@kernel.org>
CC: Nick Piggin <npiggin@suse.de>
CC: KAMEZAWA Hiroyuki <kamezawa.hiroyu@jp.fujitsu.com>
Signed-off-by: Wu Fengguang <fengguang.wu@intel.com>
---
drivers/char/mem.c | 18 ++++++++++++++----
mm/vmalloc.c | 4 ++--
2 files changed, 16 insertions(+), 6 deletions(-)
--- linux-mm.orig/drivers/char/mem.c 2010-01-30 17:14:12.000000000 +0800
+++ linux-mm/drivers/char/mem.c 2010-01-30 17:20:18.000000000 +0800
@@ -426,6 +426,9 @@ static ssize_t read_kmem(struct file *fi
*/
kbuf = xlate_dev_kmem_ptr((char *)p);
+ if (unlikely(virt_addr_valid(kbuf) &&
+ PageHWPoison(virt_to_page(kbuf))))
+ return -EIO;
if (copy_to_user(buf, kbuf, sz))
return -EFAULT;
buf += sz;
@@ -471,6 +474,7 @@ do_write_kmem(unsigned long p, const cha
{
ssize_t written, sz;
unsigned long copied;
+ int err = 0;
written = 0;
#ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED
@@ -497,13 +501,19 @@ do_write_kmem(unsigned long p, const cha
*/
ptr = xlate_dev_kmem_ptr((char *)p);
+ if (unlikely(virt_addr_valid(ptr) &&
+ PageHWPoison(virt_to_page(ptr)))) {
+ err = -EIO;
+ break;
+ }
+
copied = copy_from_user(ptr, buf, sz);
if (copied) {
written += sz - copied;
- if (written)
- break;
- return -EFAULT;
+ err = -EFAULT;
+ break;
}
+
buf += sz;
p += sz;
count -= sz;
@@ -511,7 +521,7 @@ do_write_kmem(unsigned long p, const cha
}
*ppos += written;
- return written;
+ return written ? written : err;
}
--- linux-mm.orig/mm/vmalloc.c 2010-01-30 17:14:15.000000000 +0800
+++ linux-mm/mm/vmalloc.c 2010-01-30 17:20:18.000000000 +0800
@@ -1669,7 +1669,7 @@ static int aligned_vread(char *buf, char
* interface, rarely used. Instead of that, we'll use
* kmap() and get small overhead in this access function.
*/
- if (p) {
+ if (p && !PageHWPoison(p)) {
/*
* we can expect USER0 is not used (see vread/vwrite's
* function description)
@@ -1708,7 +1708,7 @@ static int aligned_vwrite(char *buf, cha
* interface, rarely used. Instead of that, we'll use
* kmap() and get small overhead in this access function.
*/
- if (p) {
+ if (p && !PageHWPoison(p)) {
/*
* we can expect USER0 is not used (see vread/vwrite's
* function description)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
^ permalink raw reply [flat|nested] 2+ messages in thread
* [PATCH 4/4] hwpoison: avoid "still referenced by -1 users" warning
[not found] <20100130092509.793222613@intel.com>
2010-01-30 9:25 ` [PATCH 1/4] hwpoison: prevent /dev/kmem from accessing hwpoison pages Wu Fengguang
@ 2010-01-30 9:25 ` Wu Fengguang
1 sibling, 0 replies; 2+ messages in thread
From: Wu Fengguang @ 2010-01-30 9:25 UTC (permalink / raw)
To: Andrew Morton, Andi Kleen
Cc: KAMEZAWA Hiroyuki, Wu Fengguang, Nick Piggin, LKML,
Linux Memory Management List
[-- Attachment #1: hwpoison-no-warn-unknown.patch --]
[-- Type: text/plain, Size: 1383 bytes --]
Get rid of the amusing last line, emitted for slab/reserved kernel pages:
[ 328.396842] MCE 0x1ff00: Unknown page state
[ 328.399058] MCE 0x1ff00: dirty unknown page state page recovery: Failed
[ 328.402465] MCE 0x1ff00: unknown page state page still referenced by -1 users
CC: Andi Kleen <andi@firstfloor.org>
Signed-off-by: Wu Fengguang <fengguang.wu@intel.com>
---
mm/memory-failure.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- linux-mm.orig/mm/memory-failure.c 2010-01-22 11:20:28.000000000 +0800
+++ linux-mm/mm/memory-failure.c 2010-01-30 17:23:40.000000000 +0800
@@ -803,7 +803,7 @@ static int page_action(struct page_state
count = page_count(p) - 1;
if (ps->action == me_swapcache_dirty && result == DELAYED)
count--;
- if (count != 0) {
+ if (count > 0) {
printk(KERN_ERR
"MCE %#lx: %s page still referenced by %d users\n",
pfn, ps->msg, count);
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2010-09-13 12:33 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <20100130092509.793222613@intel.com>
2010-01-30 9:25 ` [PATCH 1/4] hwpoison: prevent /dev/kmem from accessing hwpoison pages Wu Fengguang
2010-01-30 9:25 ` [PATCH 4/4] hwpoison: avoid "still referenced by -1 users" warning Wu Fengguang
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).