Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp4789258imm; Tue, 21 Aug 2018 00:39:41 -0700 (PDT) X-Google-Smtp-Source: AA+uWPwkbN3kmDqvSLWQeP4q66ZkjUpNl0DCzHbfuW6e6tDuko18lyoxEn/kCT7S/ZL+fzFTcflp X-Received: by 2002:a17:902:683:: with SMTP id 3-v6mr26464788plh.52.1534837181626; Tue, 21 Aug 2018 00:39:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534837181; cv=none; d=google.com; s=arc-20160816; b=b0j0Ydhh8qnRWGI2mcPAmj3ApfdXAtmxXqSNEkD9goZJfluT4d0nVRWks+bayhFfTR 4lQd0nKDf8Ie65gpJd/039NXfQDIhxJ2WRGkE7fKzM1JbmjRu0xsS+kfiEj7h0VxQmho Bu3z+xMmA81M5RzXDZutp7Iw3T1XvGUdBoQd/UqiYkoEY++2fHumSNBaCeRmTYpI4QHI vyWcR0WhZwSQibVmZplBclI+pVYiRV74mGiWu/cKrLG+eku4iLrpSbhLTcJYu9WFaV/t Yb4NgECHWsn6L4YTktHbqlndHHn2hQVbVTbudFYUb70NQxDYsqSJRuDntBHDvx7P/v5E FUNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:arc-authentication-results; bh=/GVhazRo1+Zxx//3yQd3IjnvKZlbJXf4PVnHg+h1xyA=; b=Ldrz14Uety/LZ+t9AyLu/wxJkVQNA1/G6wdNINxOcbxWDPykIgg0LdQrhyRmPfN2Ve UZL471IjXx1IMuegnfi6EE0H4A9APYBm+4QaRy25IYltDqHLwxpXHHbIBAkqw2/TMbQH lO75s9f8bWhIgszFp7gI3X9IkB6mpgifPz3G5218m/KTSqB94z4beDPop1xPKR/DMPx1 Zea5re+cqjjGPnCv8GqDd+E4YTDhredsdkpxi0ZpF2zDx1yg8d/ZshyVBbYTFaHdjnlw FCyM03tOKzgsNc1P/fblATLtSZ4qCtq5OULruDjh58oAGU2cDBFED6i5f45YG9yr2wq5 aY3g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l185-v6si12442021pfl.134.2018.08.21.00.39.25; Tue, 21 Aug 2018 00:39:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726637AbeHUK5V (ORCPT + 99 others); Tue, 21 Aug 2018 06:57:21 -0400 Received: from mga07.intel.com ([134.134.136.100]:55769 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726253AbeHUK5U (ORCPT ); Tue, 21 Aug 2018 06:57:20 -0400 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 Aug 2018 00:38:18 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.53,268,1531810800"; d="scan'208";a="83550667" Received: from linux.intel.com ([10.54.29.200]) by orsmga001.jf.intel.com with ESMTP; 21 Aug 2018 00:38:05 -0700 Received: from tiger-server (unknown [10.239.48.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by linux.intel.com (Postfix) with ESMTPS id 063A05802C8; Tue, 21 Aug 2018 00:38:04 -0700 (PDT) Date: Wed, 22 Aug 2018 00:16:57 +0800 From: Yi Zhang To: Dave Jiang Cc: "Verma, Vishal L" , "Zhang, Yu C" , "linux-kernel@vger.kernel.org" , "Williams, Dan J" , "linux-nvdimm@lists.01.org" , "zwisler@kernel.org" , "jack@suse.cz" , "Zhang, Yi Z" Subject: Re: [PATCH V2 1/1] device-dax: check for vma range while dax_mmap. Message-ID: <20180821161657.GA22028@tiger-server> Mail-Followup-To: Dave Jiang , "Verma, Vishal L" , "Zhang, Yu C" , "linux-kernel@vger.kernel.org" , "Williams, Dan J" , "linux-nvdimm@lists.01.org" , "zwisler@kernel.org" , "jack@suse.cz" , "Zhang, Yi Z" References: <46441800c43f029757c70d8386e3112701081503.1534160958.git.yi.z.zhang@linux.intel.com> <1534787638.13739.52.camel@intel.com> <89e7bd54-4afa-614d-ec54-49af7928d6c7@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <89e7bd54-4afa-614d-ec54-49af7928d6c7@intel.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018-08-20 at 12:50:31 -0700, Dave Jiang wrote: > > > On 08/20/2018 10:53 AM, Verma, Vishal L wrote: > > > > On Mon, 2018-08-13 at 20:02 +0800, Zhang Yi wrote: > >> This patch prevents a user mapping an illegal vma range that is larger > >> than a dax device physical resource. > >> > >> When qemu maps the dax device for virtual nvdimm's backend device, the > >> v-nvdimm label area is defined at the end of mapped range. By using an > >> illegal size that exceeds the range of the device dax, it will trigger a > >> fault with qemu. > >> > >> Signed-off-by: Zhang Yi > >> --- > >> drivers/dax/device.c | 29 +++++++++++++++++++++++++++++ > >> 1 file changed, 29 insertions(+) > >> > > > > Looks good to me: > > Reviewed-by: Vishal Verma > > Applied. Thanks Dava and Vishal's kindly review. Thank you. > > > > >> diff --git a/drivers/dax/device.c b/drivers/dax/device.c > >> index 108c37f..6fe8c30 100644 > >> --- a/drivers/dax/device.c > >> +++ b/drivers/dax/device.c > >> @@ -177,6 +177,33 @@ static const struct attribute_group *dax_attribute_groups[] = { > >> NULL, > >> }; > >> > >> +static int check_vma_range(struct dev_dax *dev_dax, struct vm_area_struct *vma, > >> + const char *func) > >> +{ > >> + struct device *dev = &dev_dax->dev; > >> + struct resource *res; > >> + unsigned long size; > >> + int ret, i; > >> + > >> + if (!dax_alive(dev_dax->dax_dev)) > >> + return -ENXIO; > >> + > >> + size = vma->vm_end - vma->vm_start + (vma->vm_pgoff << PAGE_SHIFT); > >> + ret = -EINVAL; > >> + for (i = 0; i < dev_dax->num_resources; i++) { > >> + res = &dev_dax->res[i]; > >> + if (size > resource_size(res)) { > >> + dev_info_ratelimited(dev, > >> + "%s: %s: fail, vma range overflow\n", > >> + current->comm, func); > >> + ret = -EINVAL; > >> + continue; > >> + } else > >> + return 0; > >> + } > >> + return ret; > >> +} > >> + > >> static int check_vma(struct dev_dax *dev_dax, struct vm_area_struct *vma, > >> const char *func) > >> { > >> @@ -469,6 +496,8 @@ static int dax_mmap(struct file *filp, struct vm_area_struct *vma) > >> */ > >> id = dax_read_lock(); > >> rc = check_vma(dev_dax, vma, __func__); > >> + if (!rc) > >> + rc = check_vma_range(dev_dax, vma, __func__); > >> dax_read_unlock(id); > >> if (rc) > >> return rc;