Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp4939433imw; Tue, 19 Jul 2022 16:48:44 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vdax820my/mHds1bpZJ+rKcUxfLww85gFqj2eU5sU3ejqDCbzWlBIgYz0r3nwqJTns2d3k X-Received: by 2002:a17:907:7347:b0:72d:78bb:b0d7 with SMTP id dq7-20020a170907734700b0072d78bbb0d7mr29898266ejc.45.1658274524471; Tue, 19 Jul 2022 16:48:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658274524; cv=none; d=google.com; s=arc-20160816; b=ddh5bHYs+I5+pbrofqLp9UVN6V3fuNykk4vuxPa6w2kzk/fQI+pVNIGDNWFyb8sACd 2Ym4zhmLoFWnje/Uz0+fafv5ZvZYY4CW7mZKCFc/l+VeGi2u0K8Ve6TlgxsfrEiawvkD RrsgO3+ZyG+LFIKJY1iUmfAHIIZ+2dFkcbiPuuudYUEQXpSUU2gXkbTMqffRAu70iQOH 1EOqhYY4JYvKcS/LeZHTS68D5sZGJfJzoe26lNQph0jVARWplswqp8/bPRdh5gWODHw0 3wDPei+Nca6UtOcCV7SZ/2FGWi6lpjH+jLgzUTV8jfDm5nohdGPNJHtz3WpwCHxUpl57 J2uw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=1eAIWeFmZQqOIaWa0qEnwmG7+gddq4/fVT/CRZt8reo=; b=rrN9khPJHfscvt1etoNhWC5RKy1eqILLkHdxNMYn+kgs31Pgm74zomTCx6u49HAVj/ ymRHnto3yDfgQAZyCyA/8hVCajGeTzTcDNxBsfS+LZtPCyFavCwZyqItpNHj9p8IHI5g FQ9XFe81LXT57pWUZi7H19dhN5i3ZPlTmUaS7zKwYSdqQOj/Looc3drzGTZrOqM5G7b6 MIcMhnXyfQk7FG/jGBTujiEqgG3trrYnCh7HFJLQ1X/Ut0FWbgGPMcT6a9eOx8HNH/uw vXBSDH/1jjeUsMu332fnsitLcxoU5syJbcMEtKf7n+t+GT5hK+/Nw4TZNN34gxxGValG KSiA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=Zkzn2vo0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id cs16-20020a170906dc9000b0072f66504cc1si1226705ejc.334.2022.07.19.16.48.19; Tue, 19 Jul 2022 16:48:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=Zkzn2vo0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236213AbiGSXWX (ORCPT + 99 others); Tue, 19 Jul 2022 19:22:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45188 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233867AbiGSXWV (ORCPT ); Tue, 19 Jul 2022 19:22:21 -0400 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7047947B84 for ; Tue, 19 Jul 2022 16:22:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1658272940; x=1689808940; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=DNYh3WvqLRfUXzaq47t9zdMeNxzavxqzs6FOlkMSOks=; b=Zkzn2vo0LRx+Z507IMw/Cn7A7uX0XMFdv2Hl1b/5lRSaK58SUh1plOkH xIuGkCFl1kGrMV/zV9SI5FV3AbU+E8Ax2sSrFHsb+xNgmtzPmr+PHR36R xcsLNcgJzj60Vf+EbWeCftQEscGNsZAV6HGAjf7dE4+N3HWqnzxV6P5Cg VnwjwzOV48LNZfBPjzI5ufcmTvMsGhdu471cNYCNmZYO1ocHgXTYdnsET q7PWNPdTGS7P29dLUz6VkHqThATldoZfKOgFNaZogYrCz519eUZ17GdGT I9kmNg8IC6jNbkUnT47iM3m+BODHwkKcsY0ALXBqWTgnbJZbqaJchnmH3 Q==; X-IronPort-AV: E=McAfee;i="6400,9594,10413"; a="287786756" X-IronPort-AV: E=Sophos;i="5.92,285,1650956400"; d="scan'208";a="287786756" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Jul 2022 16:22:13 -0700 X-IronPort-AV: E=Sophos;i="5.92,285,1650956400"; d="scan'208";a="687299824" Received: from twliston-mobl1.amr.corp.intel.com (HELO [10.212.132.190]) ([10.212.132.190]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Jul 2022 16:22:12 -0700 Message-ID: Date: Tue, 19 Jul 2022 16:22:12 -0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.9.1 Subject: Re: [PATCH v2 1/1] mm: kfence: apply kmemleak_ignore_phys on early allocated pool Content-Language: en-US To: Andrew Morton , Marco Elver Cc: Geert Uytterhoeven , yee.lee@mediatek.com, Linux Kernel Mailing List , Catalin Marinas , Alexander Potapenko , Dmitry Vyukov , Matthias Brugger , "open list:KFENCE" , "open list:MEMORY MANAGEMENT" , "moderated list:ARM/Mediatek SoC support" , "moderated list:ARM/Mediatek SoC support" , Dave Hansen References: <20220628113714.7792-1-yee.lee@mediatek.com> <20220628113714.7792-2-yee.lee@mediatek.com> <20220715163305.e70c8542d5e7d96c5fd87185@linux-foundation.org> <20220719161356.df8d7f6fc5414cc9cc7f8302@linux-foundation.org> From: Dave Hansen In-Reply-To: <20220719161356.df8d7f6fc5414cc9cc7f8302@linux-foundation.org> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-5.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/19/22 16:13, Andrew Morton wrote: > On Mon, 18 Jul 2022 16:26:25 +0200 Marco Elver wrote: > >> On Sat, 16 Jul 2022 at 20:43, Geert Uytterhoeven wrote: >> [...] >>>> - This patch has been accused of crashing the kernel: >>>> >>>> https://lkml.kernel.org/r/YsFeUHkrFTQ7T51Q@xsang-OptiPlex-9020 >>>> >>>> Do we think that report is bogus? >>> I think all of this is highly architecture-specific... >> The report can be reproduced on i386 with CONFIG_X86_PAE=y. But e.g. >> mm/memblock.c:memblock_free() is also guilty of using __pa() on >> previously memblock_alloc()'d addresses. Looking at the phys addr >> before memblock_alloc() does virt_to_phys(), the result of __pa() >> looks correct even on PAE, at least for the purpose of passing it on >> to kmemleak(). So I don't know what that BUG_ON(slow_virt_to_phys() != >> phys_addr) is supposed to tell us here. >> > It's only been nine years, so I'm sure Dave can remember why he added > it ;) > > BUG_ON(slow_virt_to_phys((void *)x) != phys_addr); > > in arch/x86/mm/physaddr.c:__phys_addr(). I think I intended it to double check that the linear map is *actually* a linear map for 'x'. Sure, we can use the "x - PAGE_OFFSET" shortcut, but did it turn out to be actually accurate for the address it was handed? I'd be curious what the page tables actually say for the address that's causing problems.