Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1394291imm; Fri, 29 Jun 2018 17:54:05 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcyYbm5B95Qz4zj/2YZq2ulo/vxz/UoP4YDJ2W0Pqlc487BvEmQCgMu7sOL/BNTrMAD9MDB X-Received: by 2002:a62:a104:: with SMTP id b4-v6mr16665067pff.159.1530320045497; Fri, 29 Jun 2018 17:54:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530320045; cv=none; d=google.com; s=arc-20160816; b=T09kEGEepFnxZDZEE6TGxQGkjgEZs5zwlCJ2eIMBUuSHKhgSjW8SYJ8lelPof66A6w SFKEGZTbG+1MtTT3dMmNG2HyyYgg6Cjdh2pF/099daR/Iy1zrZvOUd6vxHbF5P2H8m5g ZM6lSEVz3HT7PBUh/Dle1/YuAaxHZLucBTiQ1UiEXtXItaYFopM6yVa2ETANxEKN3IWJ ENnRpZKpyBFXqK4ouirBFF5ak29jBOW9yOAVztiNFmspPU4ZVCZ3Q/IheB+5Zk9KNd+c ih3ASFzWJGhhY8g5XuBclHfYHz0hRHTQLooeQ3c67jaL9h7e3UNFyviz1m08R0jzW9Iu z9Bg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=dK2POHR1ricfCG102wjuH5hBw6+RJPi1efOdEUmLe5c=; b=Y81KLpcFmN0GWKt5eYef+8VJE5kPk7dQBjUUGa7IDegqWKsMCdYQsiLas0DxBNEpLr vfez1jGgC8gMqMhYbM1Zm9Dnz5/KXuS5K81jmtXilUrfvtUAuUctCYYIFxuJvMktPEgV FQhTS2VDNGel97f2OtvDaFW8RU1ElUy1HiLGVsSbyMdaWcU6sypclds9TmsIYrw0otwk scjw4z13slVMa0K1VhI51JWu0nqptMKz5Y1q71Ww6ElMcKumzcuHICXOnWqkply9mGJa eOEwFFnW+CI/sWh8NX8amAYOZY7FTvyhKSxhWh+wLaMGFda49gZHyhOozNNNi9fqg0zm pzcQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z23-v6si9978758pfe.296.2018.06.29.17.53.51; Fri, 29 Jun 2018 17:54:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S936939AbeF2Wls (ORCPT + 99 others); Fri, 29 Jun 2018 18:41:48 -0400 Received: from out30-130.freemail.mail.aliyun.com ([115.124.30.130]:46282 "EHLO out30-130.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934916AbeF2Wlr (ORCPT ); Fri, 29 Jun 2018 18:41:47 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R241e4;CH=green;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01f04455;MF=yang.shi@linux.alibaba.com;NM=1;PH=DS;RN=16;SR=0;TI=SMTPD_---0T3dXmHm_1530312021; Received: from e19h19392.et15sqa.tbsite.net(mailfrom:yang.shi@linux.alibaba.com fp:SMTPD_---0T3dXmHm_1530312021) by smtp.aliyun-inc.com(127.0.0.1); Sat, 30 Jun 2018 06:40:30 +0800 From: Yang Shi To: mhocko@kernel.org, willy@infradead.org, ldufour@linux.vnet.ibm.com, akpm@linux-foundation.org, peterz@infradead.org, mingo@redhat.com, acme@kernel.org, alexander.shishkin@linux.intel.com, jolsa@redhat.com, namhyung@kernel.org, tglx@linutronix.de, hpa@zytor.com Cc: yang.shi@linux.alibaba.com, linux-mm@kvack.org, x86@kernel.org, linux-kernel@vger.kernel.org Subject: [RFC v3 PATCH 5/5] x86: check VM_DEAD flag in page fault Date: Sat, 30 Jun 2018 06:39:45 +0800 Message-Id: <1530311985-31251-6-git-send-email-yang.shi@linux.alibaba.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1530311985-31251-1-git-send-email-yang.shi@linux.alibaba.com> References: <1530311985-31251-1-git-send-email-yang.shi@linux.alibaba.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Check VM_DEAD flag of vma in page fault handler, if it is set, trigger SIGSEGV. Cc: Michal Hocko Cc: Thomas Gleixner Cc: Ingo Molnar Cc: "H. Peter Anvin" Signed-off-by: Yang Shi --- arch/x86/mm/fault.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c index 9a84a0d..3fd2da5 100644 --- a/arch/x86/mm/fault.c +++ b/arch/x86/mm/fault.c @@ -1357,6 +1357,10 @@ static inline bool smap_violation(int error_code, struct pt_regs *regs) bad_area(regs, error_code, address); return; } + if (unlikely(vma->vm_flags & VM_DEAD)) { + bad_area(regs, error_code, address); + return; + } if (error_code & X86_PF_USER) { /* * Accessing the stack below %sp is always a bug. -- 1.8.3.1