Received: by 2002:a19:f614:0:0:0:0:0 with SMTP id x20csp57813lfe; Fri, 15 Apr 2022 19:21:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwSKUTjccC0NbLx4WnwQZAeRnXzP3ggOPHawQh68IFCX3WvOZnqnAjfUKQK910nNZQTvz/t X-Received: by 2002:a17:902:eb82:b0:158:8feb:86d6 with SMTP id q2-20020a170902eb8200b001588feb86d6mr1756636plg.26.1650075712895; Fri, 15 Apr 2022 19:21:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650075712; cv=none; d=google.com; s=arc-20160816; b=zqyZhebLfYMdTKMOrHHBJWWdGzSyOoFv2E7ILgZGRvor5SlQSXdXYsIOiC8af0ukpC lwI8GISyWiy5luhnWAIDuq1KnPI1TVak6bIBEYTpXUJ2k4imQxDEXCPOn89anJFtButm TWDlJbWcoH9BLEfGcrzj0WS6K54PhCWOrzwpvAVk6Uzd13xv3Pj6/eERnsMQtmPrlc/t OJylqqra28NsIY+fSKDIthEAjFwRDqS1lmMFl//CpjRZ1Q+TJYU8GPPwLwwOFAr8p6FQ QffXeKaD6XDeQsU6jSUP4vSZ61xXz0g/MREAIcU7JVZmggSS+hZ1yTpkbcTUezDsLdG8 t39Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=mCEuHD36brVtOxyd++nob/+Gm+DiKQiXoh2FckYZDmo=; b=g2fp1k4vIsmAOrwPlfITCxW+H3QIvqSrmgBc2p23Sbeo955eyrQ3q6lY23lc9wp16T Q53g3Titm/AfOAmEUdhuwweqaE/POzGHRjkHbUwS9jnXJz/2T5xH0SjTFG0VgpyUjfYH pQEfMwJXgdyXlIgOQy5e6Ua29THHzXvnCUu0gNL91v3Otatw8x8BfWIrxeHlB/GouyP6 iBJDep3rcTBQR2SJTTDaplhpJvdX/wkugt9bwwEG94QbZEQwLgwimoubOpEePnwzx6B7 1sQ6BwAq/lkgiOZdk0HaFqqU1cZbzzUSFbOXmZ//bWurpSg7S1aZ7XQumg0HwDAcmYAy FceQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=qd4NjLdu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id b1-20020a170902d50100b00158eb28cb9dsi266852plg.254.2022.04.15.19.21.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Apr 2022 19:21:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=qd4NjLdu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A731515AE32; Fri, 15 Apr 2022 18:35:26 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238161AbiDNCnc (ORCPT + 99 others); Wed, 13 Apr 2022 22:43:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59780 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235844AbiDNCnb (ORCPT ); Wed, 13 Apr 2022 22:43:31 -0400 Received: from mail-lf1-x131.google.com (mail-lf1-x131.google.com [IPv6:2a00:1450:4864:20::131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D43531AF3E for ; Wed, 13 Apr 2022 19:41:03 -0700 (PDT) Received: by mail-lf1-x131.google.com with SMTP id y32so6749743lfa.6 for ; Wed, 13 Apr 2022 19:41:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=mCEuHD36brVtOxyd++nob/+Gm+DiKQiXoh2FckYZDmo=; b=qd4NjLduoTAivuhSPCDziNZX9mUcFXnmlw0uTDhfvoEc3UafX5fs5Re0iD5b+7/sVb AuBdeBCPpzky8ysbFOez7GVVHVyGoUYg8jXiZ8+TMpoaxEu1zbClTRkD1CF1JWKtXY3T m/RpH8GcI/cwf2hrMURfH8Kaf4wc6DfrsF4Z0pOB2uWuMnsv08kT1pFZX8x184An2FbJ Z4jP1pywbNvYV9F/jBKYOv6eC4LRaQELvQaJkSfASd2BXKcbC8X4+zLYDvR8++t/Jo8j NSLXuSrD/vgzZfXgs95l/lyN4dMgLLGeVEx0ZGBpIspJHN7BwklFYrjUOCf9YDeH5OG6 Cl5A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=mCEuHD36brVtOxyd++nob/+Gm+DiKQiXoh2FckYZDmo=; b=adwCXj9mLRLI0Sbss51YiayHnzq3/O+cszUcDPEZOivBSEYtSVX3rzGFzriK2h7wCQ yim+ZVRLv/Fzd7+W5Aoc5qVpPg5bJuF/T2ol/LTzOBMKAvAoTgQNlZVsDmrVLci0oT/q dZAl9EyUV5H4RDkcS94fa78LgVE+DP57o5VLXp1P+Ca6YsV6YrWEITcJBRv1DKnbzdkx Sz8DSlVgqwbeXJxn89C2yhAZGF/qdWg4uLyf9qdvhR1pqS4+wvAfH+DNeqSKkRA/v1+E g7mbC2g4Hcc0oIuZ7bSirY0Z3ki/Ehc07xHLiBKGZ30TOvpxGe6TOa1tQHDFztAtXv/2 F81w== X-Gm-Message-State: AOAM530fUoRR+azrRz9bpo2TZ4m/nUnFcrmM+VRIPbuf+mVWfJTvp5Lh WZvzR6+vO2JBX2z3//H9Sx6mT7vUTYdWQ22lI1skSfVO8zJ6Cg== X-Received: by 2002:a05:6512:10c8:b0:44a:9305:77bd with SMTP id k8-20020a05651210c800b0044a930577bdmr482301lfg.404.1649904061833; Wed, 13 Apr 2022 19:41:01 -0700 (PDT) MIME-Version: 1.0 References: <20220413122925.33856-1-patrick.wang.shcn@gmail.com> <20220413122826.792a859d90b6c2822b1c796a@linux-foundation.org> In-Reply-To: <20220413122826.792a859d90b6c2822b1c796a@linux-foundation.org> From: patrick wang Date: Thu, 14 Apr 2022 10:40:50 +0800 Message-ID: Subject: Re: [PATCH] mm: kmemleak: take a full lowmem check in kmemleak_*_phys() To: Andrew Morton Cc: catalin.marinas@arm.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 14, 2022 at 3:28 AM Andrew Morton wrote: > > On Wed, 13 Apr 2022 20:29:25 +0800 Patrick Wang wrote: > > > The kmemleak_*_phys() apis do not check the address for lowmem's min > > boundary, while the caller may pass an address below lowmem, which > > will trigger an oops: > > Do you believe this fix should be backported into -stable kernels? Yes, I think so. The callers may not quite know the actual address they pass(e.g. from devicetree). So the kmemleak_*_phys() apis should guarantee the address they finally use is in lowmem range.