Received: by 10.223.176.5 with SMTP id f5csp1989766wra; Sun, 4 Feb 2018 17:34:33 -0800 (PST) X-Google-Smtp-Source: AH8x226LsmrgMt9B8R0pIh253EjE4vBhhwI4yrosCPMgrHITDhmDty8Ypg09jth766+33S5fGS+U X-Received: by 10.98.16.157 with SMTP id 29mr11570084pfq.60.1517794473174; Sun, 04 Feb 2018 17:34:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517794473; cv=none; d=google.com; s=arc-20160816; b=vFRs3xr81EKZyqlatFd2VQuLkFtdO/Vb8GJRQPdOG6PZrwwLexHOI+qf6CHbAyDW/U o5WMsURmBZO6vdhQeens7L+/m55kBARbp67+dfJFsbjyZJ0G24Z1mH7Wy+SNwZ08u76w z+17YHZOeRNqpFxRW76u7AOe8lOJ0V6IqbTkwIEa3abbZG96ylKbwTMgrA2qe4DlFci+ DjzLOYKKcryWptGQ3lw8CN0cn57O3ZGPjIaRYofqDGvRwVgJ4o5JKwjsDAp8rTv15Lmr T82+HsQqiSmG6NxD1iF2q8xo4oBU1AK0t/JEYLRm9QJNGlAGrH3FuKssSsYVLZ9imNy8 ZwFw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=dIp+bQYwyPSSHMI6JADLorz64MYKy8l2LIldr2nEdxY=; b=SsqxR7kBE1yZ35bc9JyLj5mTWLQirfcoW339T+kQDk4t438FkqbOjUT0P4NNVo+Ibj OcE9aTwfK0GtXtVaIATLUK1E0aNY2Wbbg4y41Kn9C524hB9e4lIy5zqCbABo7TpIwc9j 2w5XWV8o2S9/OUDVOiY4rgMaTuaWOGvMnCceBV4h3lmArAFFGORk/VJnCFtvObOL33R2 +ghgFvixeFkU6zDhM0sfLMmUsVKPLB11nvq9FTqYj1ungTBVx/L+V2Rt6R+ufppP0ASV JZ2o04eOp9vllNEO+IjPo53c/vJ2jyAWJeozhX5SUI2Y4VwptOoo1Maa9OJKn4cj3b0c Jehg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d5-v6si6388281plm.759.2018.02.04.17.34.18; Sun, 04 Feb 2018 17:34:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752318AbeBEBca (ORCPT + 99 others); Sun, 4 Feb 2018 20:32:30 -0500 Received: from out30-131.freemail.mail.aliyun.com ([115.124.30.131]:40099 "EHLO out30-131.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752608AbeBEBbl (ORCPT ); Sun, 4 Feb 2018 20:31:41 -0500 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R101e4;CH=green;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01f04455;MF=zhang.jia@linux.alibaba.com;NM=1;PH=DS;RN=6;SR=0;TI=SMTPD_---0SxhLN0q_1517794295; Received: from ali-6c96cfd98fb5.local(mailfrom:zhang.jia@linux.alibaba.com fp:106.11.34.20) by smtp.aliyun-inc.com(127.0.0.1); Mon, 05 Feb 2018 09:31:36 +0800 Subject: Re: [PATCH 1/2] /proc/kcore: Fix SMAP violation when dumping vsyscall user page To: tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, jolsa@kernel.org Cc: x86@kernel.org, linux-kernel@vger.kernel.org References: <1517294579-117473-1-git-send-email-zhang.jia@linux.alibaba.com> From: Jia Zhang Message-ID: <0d22814f-203c-65d8-6277-e133279e53fd@linux.alibaba.com> Date: Mon, 5 Feb 2018 09:32:12 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <1517294579-117473-1-git-send-email-zhang.jia@linux.alibaba.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Jiri, The maintainers are too busy to review this patchset. You are the author of the commit df04abfd181a. Please help to review this patchset. Thanks, Jia On 2018/1/30 下午2:42, Jia Zhang wrote: > The commit df04abfd181a > ("fs/proc/kcore.c: Add bounce buffer for ktext data") introduces a > bounce buffer to work around CONFIG_HARDENED_USERCOPY=y. However, > accessing vsyscall user page will cause SMAP violation in this way. > > In order to fix this issue, simply replace memcpy() with copy_from_user() > may work, but using a common way to handle this sort of user page may be > useful for future. > > Currently, only vsyscall page requires KCORE_USER. > > Signed-off-by: Jia Zhang > --- > arch/x86/mm/init_64.c | 2 +- > fs/proc/kcore.c | 4 ++++ > include/linux/kcore.h | 1 + > 3 files changed, 6 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/mm/init_64.c b/arch/x86/mm/init_64.c > index 4a83728..dab78f6 100644 > --- a/arch/x86/mm/init_64.c > +++ b/arch/x86/mm/init_64.c > @@ -1187,7 +1187,7 @@ void __init mem_init(void) > > /* Register memory areas for /proc/kcore */ > kclist_add(&kcore_vsyscall, (void *)VSYSCALL_ADDR, > - PAGE_SIZE, KCORE_OTHER); > + PAGE_SIZE, KCORE_USER); > > mem_init_print_info(NULL); > } > diff --git a/fs/proc/kcore.c b/fs/proc/kcore.c > index 4bc85cb..e4b0204 100644 > --- a/fs/proc/kcore.c > +++ b/fs/proc/kcore.c > @@ -510,6 +510,10 @@ static void elf_kcore_store_hdr(char *bufp, int nphdr, int dataoff) > /* we have to zero-fill user buffer even if no read */ > if (copy_to_user(buffer, buf, tsz)) > return -EFAULT; > + } else if (m->type == KCORE_USER) { > + /* user page is handled prior to normal kernel page */ > + if (copy_to_user(buffer, (char *)start, tsz)) > + return -EFAULT; > } else { > if (kern_addr_valid(start)) { > unsigned long n; > diff --git a/include/linux/kcore.h b/include/linux/kcore.h > index 7ff25a8..80db19d 100644 > --- a/include/linux/kcore.h > +++ b/include/linux/kcore.h > @@ -10,6 +10,7 @@ enum kcore_type { > KCORE_VMALLOC, > KCORE_RAM, > KCORE_VMEMMAP, > + KCORE_USER, > KCORE_OTHER, > }; > >