Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755991AbdDRNb2 (ORCPT ); Tue, 18 Apr 2017 09:31:28 -0400 Received: from resqmta-ch2-11v.sys.comcast.net ([69.252.207.43]:58978 "EHLO resqmta-ch2-11v.sys.comcast.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752827AbdDRNb0 (ORCPT ); Tue, 18 Apr 2017 09:31:26 -0400 Date: Tue, 18 Apr 2017 08:31:24 -0500 (CDT) From: Christoph Lameter X-X-Sender: cl@east.gentwo.org To: Michal Hocko cc: Kees Cook , Andrew Morton , Pekka Enberg , David Rientjes , Joonsoo Kim , Linux-MM , LKML Subject: Re: [PATCH] mm: Add additional consistency check In-Reply-To: <20170418064124.GA22360@dhcp22.suse.cz> Message-ID: References: <20170411141956.GP6729@dhcp22.suse.cz> <20170411164134.GA21171@dhcp22.suse.cz> <20170411183035.GD21171@dhcp22.suse.cz> <20170411185555.GE21171@dhcp22.suse.cz> <20170411193948.GA29154@dhcp22.suse.cz> <20170418064124.GA22360@dhcp22.suse.cz> Content-Type: text/plain; charset=US-ASCII X-CMAE-Envelope: MS4wfF9DmNNqa1MN01wwmbUImZMmWEgHYssMpn7LKCpNLo9NJhOb1nNTU+CNPNz6mQE7j1Nk1mLKlW7K8Xc9y07h0zXpNzcpke0TTS7xXW/FUTE82pfkj81I C0AZ/Np33XeKBdWv8Bvi9bdrac49/vZS7PW6iVDqCFWEqS1Ud2IIXeK23JXuH/VdgMwXmxAL4x7RDLuGyL7+P9pxQHfRaTxfPeQfSrU9BVmkeCy8XcgThpaR p1lNZs86IbFe8gTz1UnzyxWbRYLq38OJ5BM+RBeaCNumn2dfIgfw0l+1k88ZPO8VsEEqTrPb3k3woB1G6Ve7UnCgQOjfNNlNRRZ1Vg7z2OmcF7cZtN93e0bE /BTyHhR7XAGZP+ujGiUPx8lYJngfEozwruwkee2u+huD6FzXbWY= Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 637 Lines: 14 On Tue, 18 Apr 2017, Michal Hocko wrote: > > The patch does not do that. See my review. Invalid points to kfree are > > already caught with a bug on. See kfree in mm/slub.c > > Are you even reading those emails? First of all we are talking about > slab here. Secondly I've already pointed out that the BUG_ON(!PageSlab) > in kmem_freepages is already too late because we do operate on a > potential garbage from invalid page... Again this is confusing because you are discussing something that was not covered by the patch submitted. Please start another discussion thread on kfree() separately from the discussion of the patch here.