Received: by 2002:a05:6a10:c7c6:0:0:0:0 with SMTP id h6csp2962849pxy; Tue, 3 Aug 2021 21:36:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwwFTFIrQyp9RjWU4bhJq2AEkERi1yAEpObWQJ/b7c9sUIfshQbiE0tNkyMOh1ty5K/373H X-Received: by 2002:a02:7f12:: with SMTP id r18mr22030292jac.50.1628051795116; Tue, 03 Aug 2021 21:36:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628051795; cv=none; d=google.com; s=arc-20160816; b=gBunuhLHaZ5YMFxgNPU3ZBZlsEV589HWPPXN1XfFmFjbkIstYzbB3jtMxA4nsuUuro 2wv7uZE54bxKbvE8LVULy+ZokSt8a4bYB3JZVVlABn6mQaBcjLbJwdo1Vppc7f+vVbK5 aqvoquNlFduMhj3swQog5E+ICIX5Y5fUDf9L0/RmTatJOU8wsyYElKsn5QZw04reTegp YV8DcIItd2s6mS+xVZmjJAAdn8r5kwmEZl4RsJKybZGKtNy+2HZtCtvaAyjZfz5vd2cx LiIhO0+TS3SFjCNOykGZ+JLnECZhcZt30BQOZWrpUXi80pVaX00NeXq2RJnUoPzc+Xr5 yrUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=76g5eCAEPkqgfp0s7N0sYRvwdwuJKK7JqWus/SVvSEM=; b=hvaxhI+B2ngOGdkvMLu50lBgpEjFRljgwg0KM5ZbAxq+kwPwl5/3opUIlIow0iGa1G 6Y9hr94BJyeD86EiMqdBi2TagMs6G3CrTc8C7HUX5T/9/QCZTcm9TWdFrP5nfUTIWg6x Q6ggyjJymsImeQR+CyTPyh36mPafSlrx11PzwZx2Sobpez+Xn+uA8nLDPlQqaUyMfdRh BkUebVROhHlTLxUsOMmbYdiKpTCNtv7h+zXwdD/khKAG4El5cQIAtw01BoccEYRF57uV c1VM5jOCvxiJYy+N5gsZI7uz+QqQTqtCnEMtuhLi9EM07T8Gm8m8HPrD7TQvf3tJihvt 2m4A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z10si1078859ilz.130.2021.08.03.21.36.23; Tue, 03 Aug 2021 21:36:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235237AbhHDEeB (ORCPT + 99 others); Wed, 4 Aug 2021 00:34:01 -0400 Received: from mga14.intel.com ([192.55.52.115]:41728 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234994AbhHDEcw (ORCPT ); Wed, 4 Aug 2021 00:32:52 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10065"; a="213574638" X-IronPort-AV: E=Sophos;i="5.84,293,1620716400"; d="scan'208";a="213574638" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Aug 2021 21:32:39 -0700 X-IronPort-AV: E=Sophos;i="5.84,293,1620716400"; d="scan'208";a="511702729" Received: from iweiny-desk2.sc.intel.com (HELO localhost) ([10.3.52.147]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Aug 2021 21:32:39 -0700 From: ira.weiny@intel.com To: Dave Hansen , Dan Williams Cc: Ira Weiny , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Peter Zijlstra , Andy Lutomirski , "H. Peter Anvin" , Fenghua Yu , Rick Edgecombe , x86@kernel.org, linux-kernel@vger.kernel.org, nvdimm@lists.linux.dev, linux-mm@kvack.org Subject: [PATCH V7 18/18] devdax: Enable stray access protection Date: Tue, 3 Aug 2021 21:32:31 -0700 Message-Id: <20210804043231.2655537-19-ira.weiny@intel.com> X-Mailer: git-send-email 2.28.0.rc0.12.gb6a658bd00c9 In-Reply-To: <20210804043231.2655537-1-ira.weiny@intel.com> References: <20210804043231.2655537-1-ira.weiny@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ira Weiny Device dax is primarily accessed through user space. Kernel access is controlled through the kmap interfaces. Now that all valid kernel initiated access to dax devices have been accounted for with pgmap_mk_{readwrite,noaccess}() through kmap, turn on PGMAP_PKEYS_PROTECT for device dax. Signed-off-by: Ira Weiny --- Changes for V7 Use pgmap_protetion_enabled() s/PGMAP_PKEYS_PROTECT/PGMAP_PROTECTION/ --- drivers/dax/device.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/dax/device.c b/drivers/dax/device.c index dd8222a42808..cdf6ef4c1edb 100644 --- a/drivers/dax/device.c +++ b/drivers/dax/device.c @@ -426,6 +426,8 @@ int dev_dax_probe(struct dev_dax *dev_dax) } pgmap->type = MEMORY_DEVICE_GENERIC; + if (pgmap_protection_enabled()) + pgmap->flags |= PGMAP_PROTECTION; addr = devm_memremap_pages(dev, pgmap); if (IS_ERR(addr)) return PTR_ERR(addr); -- 2.28.0.rc0.12.gb6a658bd00c9