The patch titled Subject: Revert "mm/gup: check page posion status for coredump." has been added to the -mm tree. Its filename is revert-mm-gup-check-page-posion-status-for-coredump.patch This patch should soon appear at https://ozlabs.org/~akpm/mmots/broken-out/revert-mm-gup-check-page-posion-status-for-coredump.patch and later at https://ozlabs.org/~akpm/mmotm/broken-out/revert-mm-gup-check-page-posion-status-for-coredump.patch Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/process/submit-checklist.rst when testing your code *** The -mm tree is included into linux-next and is updated there every 3-4 working days ------------------------------------------------------ From: Michal Hocko <mhocko@xxxxxxxx> Subject: Revert "mm/gup: check page posion status for coredump." While reviewing http://lkml.kernel.org/r/20210429122519.15183-4-david@xxxxxxxxxx I have crossed d3378e86d182 ("mm/gup: check page posion status for coredump.") and noticed that this patch is broken in two ways. First it doesn't really prevent hwpoison pages from being dumped because hwpoison pages can be marked asynchornously at any time after the check. Secondly, and more importantly, the patch introduces a ref count leak because get_dump_page takes a reference on the page which is not released. It also seems that the patch was merged incorrectly because there were follow up changes not included as well as discussions on how to address the underlying problem http://lkml.kernel.org/r/57ac524c-b49a-99ec-c1e4-ef5027bfb61b@xxxxxxxxxx Therefore revert the original patch. Link: https://lkml.kernel.org/r/20210505135407.31590-1-mhocko@xxxxxxxxxx Fixes: d3378e86d182 ("mm/gup: check page posion status for coredump.") Signed-off-by: Michal Hocko <mhocko@xxxxxxxx> Reviewed-by: David Hildenbrand <david@xxxxxxxxxx> Cc: Aili Yao <yaoaili@xxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- mm/gup.c | 4 ---- mm/internal.h | 20 -------------------- 2 files changed, 24 deletions(-) --- a/mm/gup.c~revert-mm-gup-check-page-posion-status-for-coredump +++ a/mm/gup.c @@ -1593,10 +1593,6 @@ struct page *get_dump_page(unsigned long FOLL_FORCE | FOLL_DUMP | FOLL_GET); if (locked) mmap_read_unlock(mm); - - if (ret == 1 && is_page_poisoned(page)) - return NULL; - return (ret == 1) ? page : NULL; } #endif /* CONFIG_ELF_CORE */ --- a/mm/internal.h~revert-mm-gup-check-page-posion-status-for-coredump +++ a/mm/internal.h @@ -96,26 +96,6 @@ static inline void set_page_refcounted(s set_page_count(page, 1); } -/* - * When kernel touch the user page, the user page may be have been marked - * poison but still mapped in user space, if without this page, the kernel - * can guarantee the data integrity and operation success, the kernel is - * better to check the posion status and avoid touching it, be good not to - * panic, coredump for process fatal signal is a sample case matching this - * scenario. Or if kernel can't guarantee the data integrity, it's better - * not to call this function, let kernel touch the poison page and get to - * panic. - */ -static inline bool is_page_poisoned(struct page *page) -{ - if (PageHWPoison(page)) - return true; - else if (PageHuge(page) && PageHWPoison(compound_head(page))) - return true; - - return false; -} - extern unsigned long highest_memmap_pfn; /* _ Patches currently in -mm which might be from mhocko@xxxxxxxx are revert-mm-gup-check-page-posion-status-for-coredump.patch