From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932491AbdEDC3x (ORCPT ); Wed, 3 May 2017 22:29:53 -0400 Received: from szxga03-in.huawei.com ([45.249.212.189]:5916 "EHLO szxga03-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932192AbdEDC3r (ORCPT ); Wed, 3 May 2017 22:29:47 -0400 Message-ID: <590A91DF.8030004@huawei.com> Date: Thu, 4 May 2017 10:28:47 +0800 From: zhong jiang User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:12.0) Gecko/20120428 Thunderbird/12.0.1 MIME-Version: 1.0 To: Rik van Riel CC: David Rientjes , Bjorn Helgaas , Yoshinori Sato , Rich Felker , Andrew Morton , , , , , , , , Xishi Qiu Subject: Re: [RESENT PATCH] x86/mem: fix the offset overflow when read/write mem References: <1493293775-57176-1-git-send-email-zhongjiang@huawei.com> <1493837167.20270.8.camel@redhat.com> In-Reply-To: <1493837167.20270.8.camel@redhat.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.177.29.68] X-CFilter-Loop: Reflected X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090203.590A9203.0024,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0, ip=0.0.0.0, so=2014-11-16 11:51:01, dmn=2013-03-21 17:37:32 X-Mirapoint-Loop-Id: 30990fa4a53bbb90ffa765342b414b0a Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2017/5/4 2:46, Rik van Riel wrote: > On Tue, 2017-05-02 at 13:54 -0700, David Rientjes wrote: > >>> diff --git a/drivers/char/mem.c b/drivers/char/mem.c >>> index 7e4a9d1..3a765e02 100644 >>> --- a/drivers/char/mem.c >>> +++ b/drivers/char/mem.c >>> @@ -55,7 +55,7 @@ static inline int >> valid_phys_addr_range(phys_addr_t addr, size_t count) >>> >>> static inline int valid_mmap_phys_addr_range(unsigned long pfn, >> size_t size) >>> { >>> - return 1; >>> + return (pfn << PAGE_SHIFT) + size <= __pa(high_memory); >>> } >>> #endif >>> >> I suppose you are correct that there should be some sanity checking >> on the >> size used for the mmap(). > My apologies for not responding earlier. It may > indeed make sense to have a sanity check here. > > However, it is not as easy as simply checking the > end against __pa(high_memory). Some systems have > non-contiguous physical memory ranges, with gaps > of invalid addresses in-between. The invalid physical address means that it is used as io mapped. not in system ram region. /dev/mem is not access to them , is it right? > You would have to make sure that both the beginning > and the end are valid, and that there are no gaps of > invalid pfns in the middle... If it is limited in system ram, we can walk the resource to exclude them. or adding pfn_valid further to optimize. whether other situation should be consider ? I am not sure. > At that point, is the complexity so much that it no > longer makes sense to try to protect against root > crashing the system? > your suggestion is to let the issue along without any protection. just root user know what they are doing. Thanks zhongjiang