Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp3405050imw; Mon, 18 Jul 2022 07:33:13 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uD3G+L0lli5xykfVi0xWxedBHgV5XpeHC9J8dEAQK+p4On0cOQU46No9+h2HAMq1FnXA/Z X-Received: by 2002:ac8:4e54:0:b0:31d:36a5:70cb with SMTP id e20-20020ac84e54000000b0031d36a570cbmr21624097qtw.18.1658154792948; Mon, 18 Jul 2022 07:33:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658154792; cv=none; d=google.com; s=arc-20160816; b=lkNeqMZveUgR27ofud2sM42QHE9NxnhQ41D915t+Lg/34Z84VfBjy9Afyr9QZ6QYik Oi+MWsAr5sJ5V+BVwn6qoh0TML15hAQ5Gc06astny+bDH7ce6zRFUsmUZrJJFvOlzyvL fQvgRjF2pBoDB96o+Oe6oCISWQZp9DLiOTuP7fAMl7imnzqEHDBJeNMfLj+PSkzFMgUD fLDk8gYVmzqd0INQNx2YprBjhshmsVB9tI1nWcKFO1Bifv4RJW0UvcjXkEQyj5mzcXgc x2jNnMrjqWJ1VSdT5NUoaSOvCur/PSNejVfO5a7mXt4cmKv0u/lxOys/dYwnVI9cJZxb 8Y8g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=Mtj0EAXN9U90VAEHDyJp+h4NOUaHKEG8aPk/GVml+8g=; b=bDidbvIjhQrfdx+vkWfqc56V4c2w6DYEpvtNgzfbai5aBZ8qZlcDTsjtU2bGXozX9s Iyq7skNbvVtgVcGE5nZT4PB350Du63uQiVsmDZ3Jms5VNdx2lC+WNBUU94vgb6Rze/Lh x52m5ukaIpnC1asJV+L6zUX4Kd6OKTzBFeIVwtjmg/II5ys1nnwp0p+rwpNel67Pe8AC 9EareOf7MDJqAffExjf9n3ZhPCLfJRsajlN1aeM2btmbweEBW5bJSi229ZBU6+WdO24M 1q3dPFJWQLLK1mmhGi5E/N9oEBdlUjMgCEj6qGKGU3pCOGd7ykEnNwTedm5YsHifDxU7 EfLA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=sdl0ANPh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gh3-20020a05621429c300b004738378abaasi5870883qvb.74.2022.07.18.07.32.58; Mon, 18 Jul 2022 07:33:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=sdl0ANPh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235565AbiGRO1E (ORCPT + 99 others); Mon, 18 Jul 2022 10:27:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52944 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235184AbiGRO1C (ORCPT ); Mon, 18 Jul 2022 10:27:02 -0400 Received: from mail-yw1-x1130.google.com (mail-yw1-x1130.google.com [IPv6:2607:f8b0:4864:20::1130]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2CEC626FC for ; Mon, 18 Jul 2022 07:27:02 -0700 (PDT) Received: by mail-yw1-x1130.google.com with SMTP id 00721157ae682-31e45527da5so10394797b3.5 for ; Mon, 18 Jul 2022 07:27:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Mtj0EAXN9U90VAEHDyJp+h4NOUaHKEG8aPk/GVml+8g=; b=sdl0ANPhWcYPKRHeSiX1ABKy52Q5uvPDzWi8yihz91FuiqXXxpmBjVZ9WIUQy6cTHc SVeSJDUI7mE0oz1+jwRcPlb5SNGDfV6W12sAtvt7t07e1nVG0CA7y1C5GJrYMdhOiTXQ zZ94pG2BXNmmp3guQGPtbHGYaGZ6xiPeBWVZacMwDedrGf1lyWCFPkaki4fyOdCWuWhf Hjw6S8dfyMpJeJXQ9A8p+Cuk9qR3a3Sjxx3KSzyTuA9O7XbyBemHwAdQGk8SOEsoT7LK xd9g/XFSsdVj9oXrndkCoI96eLOyfjql8zI7+HdJ0er6oSeib3d2Gdn1G5gJfE3uIFFq Zqug== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Mtj0EAXN9U90VAEHDyJp+h4NOUaHKEG8aPk/GVml+8g=; b=mEKntE6zR/zQ4HbRLpXgYY9hgg3Fryi9b+MKOv8tapdca6u82C/KYcAcVbANSlw+Pe CMZhjbz/iEMGGPzniMvAVpOq47i76PG1bBkOoUeWz8tXZQsrKlvTqXBgmclLD9t5dhKm 0ut/Ey3d/zKVVFvvGSlNHzhVj0ne4kO+1n4SvicKlZMYpZhSgwjt7wvfHSgDIGwIG8yA nZNR2fobtiq8CwkxHA4Elz4fBH1Lf1rrT7dtRZUQpfChEtwjWAkVfBeXwK/jzCQQSYBS eRsVfwseCR4aOfiAEJm6M4cZk3J+nBB7DWwYA6+Slz4NsT3rijt/+/EvJxIJgutW77Lj wxuA== X-Gm-Message-State: AJIora+BZ+JVS1xYGH/mzx1Lfi9FAYb/JU/1UVqa3MP/iTo7QIkQymMm TrVpPVv9wZAqQpHSe3NQy0VTgrN9yDcgcOl7vKwo2w== X-Received: by 2002:a81:5a0a:0:b0:31d:ad7c:8fa5 with SMTP id o10-20020a815a0a000000b0031dad7c8fa5mr30075011ywb.512.1658154421240; Mon, 18 Jul 2022 07:27:01 -0700 (PDT) MIME-Version: 1.0 References: <20220628113714.7792-1-yee.lee@mediatek.com> <20220628113714.7792-2-yee.lee@mediatek.com> <20220715163305.e70c8542d5e7d96c5fd87185@linux-foundation.org> In-Reply-To: From: Marco Elver Date: Mon, 18 Jul 2022 16:26:25 +0200 Message-ID: Subject: Re: [PATCH v2 1/1] mm: kfence: apply kmemleak_ignore_phys on early allocated pool To: Geert Uytterhoeven Cc: Andrew Morton , yee.lee@mediatek.com, Linux Kernel Mailing List , Catalin Marinas , Alexander Potapenko , Dmitry Vyukov , Matthias Brugger , "open list:KFENCE" , "open list:MEMORY MANAGEMENT" , "moderated list:ARM/Mediatek SoC support" , "moderated list:ARM/Mediatek SoC support" Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 16 Jul 2022 at 20:43, Geert Uytterhoeven wrote: [...] > > - This patch has been accused of crashing the kernel: > > > > https://lkml.kernel.org/r/YsFeUHkrFTQ7T51Q@xsang-OptiPlex-9020 > > > > Do we think that report is bogus? > > I think all of this is highly architecture-specific... The report can be reproduced on i386 with CONFIG_X86_PAE=y. But e.g. mm/memblock.c:memblock_free() is also guilty of using __pa() on previously memblock_alloc()'d addresses. Looking at the phys addr before memblock_alloc() does virt_to_phys(), the result of __pa() looks correct even on PAE, at least for the purpose of passing it on to kmemleak(). So I don't know what that BUG_ON(slow_virt_to_phys() != phys_addr) is supposed to tell us here. Ideas?