From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754728AbZIPBwG (ORCPT ); Tue, 15 Sep 2009 21:52:06 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1754556AbZIPBvt (ORCPT ); Tue, 15 Sep 2009 21:51:49 -0400 Received: from mga14.intel.com ([143.182.124.37]:14785 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753128AbZIPBvg (ORCPT ); Tue, 15 Sep 2009 21:51:36 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="4.44,394,1249282800"; d="scan'208";a="188088270" Message-Id: <20090916014958.969524517@intel.com> References: <20090916013939.656308742@intel.com> User-Agent: quilt/0.46-1 Date: Wed, 16 Sep 2009 09:39:42 +0800 From: Wu Fengguang To: Andrew Morton To: KAMEZAWA Hiroyuki CC: Benjamin Herrenschmidt , Greg KH , Andi Kleen , Christoph Lameter , Ingo Molnar , Tejun Heo , Nick Piggin , Wu Fengguang Cc: LKML , linux-mm@kvack.org Subject: [PATCH 3/3] HWPOISON: prevent /dev/kmem users from accessing hwpoison pages Content-Disposition: inline; filename=kmem-dev-kmem.patch Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When /dev/kmem read()/write() encounters hwpoison page, stop it and return the amount of work done till now. Vmalloc pages are not checked for now, to avoid conflicts with ongoing vread/vwrite works. CC: Greg KH CC: Andi Kleen CC: Benjamin Herrenschmidt CC: Christoph Lameter CC: Ingo Molnar CC: Tejun Heo CC: Nick Piggin Reviewed-by: KAMEZAWA Hiroyuki Signed-off-by: Wu Fengguang --- drivers/char/mem.c | 18 ++++++++++++++---- 1 file changed, 14 insertions(+), 4 deletions(-) --- linux-mm.orig/drivers/char/mem.c 2009-09-16 09:25:34.000000000 +0800 +++ linux-mm/drivers/char/mem.c 2009-09-16 09:25:43.000000000 +0800 @@ -427,6 +427,9 @@ static ssize_t read_kmem(struct file *fi */ kbuf = xlate_dev_kmem_ptr((char *)p); + if (unlikely(virt_addr_valid(kbuf) && + PageHWPoison(virt_to_page(kbuf)))) + return -EIO; if (copy_to_user(buf, kbuf, sz)) return -EFAULT; buf += sz; @@ -472,6 +475,7 @@ do_write_kmem(unsigned long p, const cha { ssize_t written, sz; unsigned long copied; + int err = 0; written = 0; #ifdef __ARCH_HAS_NO_PAGE_ZERO_MAPPED @@ -498,13 +502,19 @@ do_write_kmem(unsigned long p, const cha */ ptr = xlate_dev_kmem_ptr((char *)p); + if (unlikely(virt_addr_valid(ptr) && + PageHWPoison(virt_to_page(ptr)))) { + err = -EIO; + break; + } + copied = copy_from_user(ptr, buf, sz); if (copied) { written += sz - copied; - if (written) - break; - return -EFAULT; + err = -EFAULT; + break; } + buf += sz; p += sz; count -= sz; @@ -512,7 +522,7 @@ do_write_kmem(unsigned long p, const cha } *ppos += written; - return written; + return written ? written : err; } --