Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp3792077imm; Mon, 2 Jul 2018 05:47:03 -0700 (PDT) X-Google-Smtp-Source: ADUXVKK8E96iDzy+tp5KBWOg3+01lyOUsFxTDFZG54AQ8YaKRRdIzAg8dXQGD6zlYUexSyBJ4B0/ X-Received: by 2002:a17:902:9a95:: with SMTP id w21-v6mr25801989plp.168.1530535623093; Mon, 02 Jul 2018 05:47:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530535623; cv=none; d=google.com; s=arc-20160816; b=qneAwpGxs95RrhQXn7F7K5QxJvOADrQxchZFuwlsWOC3/v6xBrqse2lRMK4fHJJp/O 19DJTAFApWYavEsaEpqJ55WKH6h8I9KbqVnqyh8ZpuqBbKSMRAqseVztu4XrnJ+8T89X MMG/+o+SJNV/7DMAwqb7YeRTAVKLiKd3I5D1YYDS/EZvpppojh2H8hq8d9UoYADQkwJX sM2BpprWWbqVgghRdjH1HYJqf4uE/EV86+jD6LMRHPIph6PrLG0h3/qpStClUDtfLgBA 6OpYFIMjoPGTMMn/aqI/rqoGEswmZXtJK/MPHR4LdRP18wVfa2gITrHJ1dSoS3zV1/FR wyHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=0mfHqqUs8p4u/x5j8lGDknUNY/Q/ZX79ZbU+7tPMmC8=; b=cJiD+R2m08XqfTGFk23n8UMQVkaIWu802u8jbcV7iB868Lu24CAa0bqm16+CdSzQmZ FD6SGPgolHkfCF1KLorBC0/lBXjas7UA96LWUVwwOd360kTiJV1930WdVKPAiRlxrNsW R+CfjAne1pl46Vrq/mR+XHEh3V9d0OxeuMbva17nJ7I8K1GIVOINIjY78GhpMFK5X+ie bdmFx14fjaGgu+FRmEyJuB13u8NHbJDqgwac6PjJve9MTa5+lCTL+fsn1GyCvSjasPlf Y7js95iYnEdoiJGfA9jDIaVKouDC6DHGqfA+sO4t/a3j+5QTqWYIN40UF+uz0xbzTLmp rIng== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u7-v6si12445332pfb.247.2018.07.02.05.46.48; Mon, 02 Jul 2018 05:47:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752292AbeGBMqE (ORCPT + 99 others); Mon, 2 Jul 2018 08:46:04 -0400 Received: from mx2.suse.de ([195.135.220.15]:34324 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752049AbeGBMqB (ORCPT ); Mon, 2 Jul 2018 08:46:01 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 2A885AD0A; Mon, 2 Jul 2018 12:46:00 +0000 (UTC) Date: Mon, 2 Jul 2018 14:45:58 +0200 From: Michal Hocko To: Laurent Dufour Cc: Yang Shi , willy@infradead.org, akpm@linux-foundation.org, peterz@infradead.org, mingo@redhat.com, acme@kernel.org, alexander.shishkin@linux.intel.com, jolsa@redhat.com, namhyung@kernel.org, tglx@linutronix.de, hpa@zytor.com, linux-mm@kvack.org, x86@kernel.org, linux-kernel@vger.kernel.org Subject: Re: [RFC v3 PATCH 5/5] x86: check VM_DEAD flag in page fault Message-ID: <20180702124558.GP19043@dhcp22.suse.cz> References: <1530311985-31251-1-git-send-email-yang.shi@linux.alibaba.com> <1530311985-31251-6-git-send-email-yang.shi@linux.alibaba.com> <84eba553-2e0b-1a90-d543-6b22c1b3c5f8@linux.vnet.ibm.com> <20180702121528.GM19043@dhcp22.suse.cz> <80406cbd-67f4-ca4c-cd54-aeb305579a72@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <80406cbd-67f4-ca4c-cd54-aeb305579a72@linux.vnet.ibm.com> User-Agent: Mutt/1.10.0 (2018-05-17) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 02-07-18 14:26:09, Laurent Dufour wrote: > On 02/07/2018 14:15, Michal Hocko wrote: > > On Mon 02-07-18 10:45:03, Laurent Dufour wrote: > >> On 30/06/2018 00:39, Yang Shi wrote: > >>> Check VM_DEAD flag of vma in page fault handler, if it is set, trigger > >>> SIGSEGV. > >>> > >>> Cc: Michal Hocko > >>> Cc: Thomas Gleixner > >>> Cc: Ingo Molnar > >>> Cc: "H. Peter Anvin" > >>> Signed-off-by: Yang Shi > >>> --- > >>> arch/x86/mm/fault.c | 4 ++++ > >>> 1 file changed, 4 insertions(+) > >>> > >>> diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c > >>> index 9a84a0d..3fd2da5 100644 > >>> --- a/arch/x86/mm/fault.c > >>> +++ b/arch/x86/mm/fault.c > >>> @@ -1357,6 +1357,10 @@ static inline bool smap_violation(int error_code, struct pt_regs *regs) > >>> bad_area(regs, error_code, address); > >>> return; > >>> } > >>> + if (unlikely(vma->vm_flags & VM_DEAD)) { > >>> + bad_area(regs, error_code, address); > >>> + return; > >>> + } > >> > >> This will have to be done for all the supported architectures, what about doing > >> this check in handle_mm_fault() and return VM_FAULT_SIGSEGV ? > > > > We already do have a model for that. Have a look at MMF_UNSTABLE. > > MMF_UNSTABLE is a mm's flag, here this is a VMA's flag which is checked. Yeah, and we have the VMA ready for all places where we do check the flag. check_stable_address_space can be made to get vma rather than mm. -- Michal Hocko SUSE Labs