From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id AFA56C47071 for ; Thu, 16 Nov 2023 10:14:14 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 47E81440152; Thu, 16 Nov 2023 05:14:14 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 42EB3440009; Thu, 16 Nov 2023 05:14:14 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2F643440152; Thu, 16 Nov 2023 05:14:14 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 1FD38440009 for ; Thu, 16 Nov 2023 05:14:14 -0500 (EST) Received: from smtpin04.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id DF17740BE6 for ; Thu, 16 Nov 2023 10:14:13 +0000 (UTC) X-FDA: 81463407186.04.5AF88F4 Received: from mail-yw1-f173.google.com (mail-yw1-f173.google.com [209.85.128.173]) by imf08.hostedemail.com (Postfix) with ESMTP id 2C244160009 for ; Thu, 16 Nov 2023 10:14:12 +0000 (UTC) Authentication-Results: imf08.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=rHYfQWoW; spf=pass (imf08.hostedemail.com: domain of glider@google.com designates 209.85.128.173 as permitted sender) smtp.mailfrom=glider@google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1700129652; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=S5z27wFZQcKESSrI85AK8SZJIpmMB6uhj5fEtkmaII8=; b=0vE+IBz9liKNOZfCCGYFUw3RydYXW96yGwu+E+Nd/sEWcHZT4wgF5FIUFXkUb2P1ZNW0J7 sa9/aNt0nr8CxSI5bpTkVDwdbSdFHDZ6lS6LpdX20XsV5SyCaCB27GYkcAqowy3gStIIz6 pnCJ29rk3M23ZGU0D850IAT3biTbG0U= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1700129652; a=rsa-sha256; cv=none; b=ZuJu9JSMK5wHcVl20IGqIpSEyZ1aTjdJklmrg7mhTJInsV7uRY0PpC4z22VEHnprZnxDsW 04Jp132smIQD9ISFCIoIEWd+8VrVbHgxQwMmV2a9oi7CyKoYtr2MQpAEhNs2e5Rse00tZi uPQSChGOz+OgHvucJaEnBPxukwWFvU4= ARC-Authentication-Results: i=1; imf08.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=rHYfQWoW; spf=pass (imf08.hostedemail.com: domain of glider@google.com designates 209.85.128.173 as permitted sender) smtp.mailfrom=glider@google.com; dmarc=pass (policy=reject) header.from=google.com Received: by mail-yw1-f173.google.com with SMTP id 00721157ae682-5b383b4184fso6849977b3.1 for ; Thu, 16 Nov 2023 02:14:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1700129651; x=1700734451; darn=kvack.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=S5z27wFZQcKESSrI85AK8SZJIpmMB6uhj5fEtkmaII8=; b=rHYfQWoWkMn7yHqaxGOdMt26D1NqnHQYLMFwJ3ljpT4syMfD9y0TZChHoDXl23Nvag wo/TCnE+UuacMn2ukP5akHB79tlCq7b6WrZaEWtJ6qUIZucDMJ+G4CPfGm1+qhHmwFlv Y7YkZO+ANC2n5CEiW8IZf9m/S8rN+V/WoxvmyZmmeb5CfQ89oDRPcC0VF+fS+hWTFnAd qjlkPXsCw8pTJtcGo9CCiF4CTF0D0jqM+pUrvT7gq5/h2WJuP0NV/tKb49C6JHYza+At mImbBWUnlD9+WZMeFZBNJyr9/LITHTuVoIgUmKhrg4mZlGHn//cnT/dBz689urzis0qW p7VA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1700129651; x=1700734451; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=S5z27wFZQcKESSrI85AK8SZJIpmMB6uhj5fEtkmaII8=; b=nSwW3JCU2+v39/cuuRV0K2k0Nh/fFB496R43jCwYWVcGBsHMwa1u9xGdMoCuSynJ0w SF9o81GQTHyULMUkOVmF2Fa5fmgh9kDgb7gaHHVNHaq9qLWQOHO4Fihlh5DGwIqxp4rq f6gdbthETQw6dUADBCT6Fs4ISm8eDEtlRteZiOdG72OHEslwunPRw1KDEsl9kf5jEt4w +ytGRMG5qU+Td3xiGJTNwUea6fNbne2SOLEaGQHiA+L3B2/G64rogxjkZWjFIJXVSjs1 RA69LhhQF5BGohsU5oHvWtcf9ga24DZPY5spYXwdJU2+BwPQ7U74Ue+CBE86YXGAlLmM kLWA== X-Gm-Message-State: AOJu0YwiXvwII0vpo2hezrJDGBRjpsUaeqR4BNXK7BuLnGh2jbxDCJy5 P9V+TQCmaJsKD36UQ610J59zC8nOSzQA/qXrDXNIrw== X-Google-Smtp-Source: AGHT+IF+jaGcS9pPp5H4LI7L0H2rgwwBBSMYs58tIpjDOVz6YSDhqCfvQL1gqRcOfGQbFFqR56bfm3c0DchFbitnYxg= X-Received: by 2002:a81:47c3:0:b0:594:f864:8507 with SMTP id u186-20020a8147c3000000b00594f8648507mr15893002ywa.51.1700129651150; Thu, 16 Nov 2023 02:14:11 -0800 (PST) MIME-Version: 1.0 References: <20231115203401.2495875-1-iii@linux.ibm.com> <20231115203401.2495875-7-iii@linux.ibm.com> In-Reply-To: <20231115203401.2495875-7-iii@linux.ibm.com> From: Alexander Potapenko Date: Thu, 16 Nov 2023 11:13:30 +0100 Message-ID: Subject: Re: [PATCH 06/32] kmsan: Fix kmsan_copy_to_user() on arches with overlapping address spaces To: Ilya Leoshkevich Cc: Alexander Gordeev , Andrew Morton , Christoph Lameter , David Rientjes , Joonsoo Kim , Marco Elver , Masami Hiramatsu , Pekka Enberg , Steven Rostedt , Vasily Gorbik , Vlastimil Babka , Christian Borntraeger , Dmitry Vyukov , Hyeonggon Yoo <42.hyeyoo@gmail.com>, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-s390@vger.kernel.org, linux-trace-kernel@vger.kernel.org, Mark Rutland , Roman Gushchin , Sven Schnelle Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Stat-Signature: f9ywwd7fqk3hr7oz1bz8s984bkrnccoc X-Rspamd-Server: rspam10 X-Rspamd-Queue-Id: 2C244160009 X-Rspam-User: X-HE-Tag: 1700129652-51168 X-HE-Meta: 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 1b5F7Exf K2PPnARbLc61916ccZYCagvNq14lIXwj0bJeTnx5fbPeFrqT6o2bHBtDtwxeEPAJ4ev/J4y8C1kedFHHCOwudyX9S/62XNkveq0n9A0hb6s02oqAgcdUmSNTtVgVv5awFpfhk/HpuewpBtPAsgSlIuPEnPOJmudNZ2RwYe2SN4/vZaWCV8NzhIPxej3xMYbxxrfRLLNu+a83MXbv/UqhGrwSpcJkTOLFXdt+0VWlyQHOV+9Q/PtCV9/EneVgUKuPWN7+V77QIfqrxo8LIgb434w5ehGDGZjyMhsn0b7T6RQqdq0Z5SFDHVFy+pHJJIvGF7+nq5jrqZPDq7HoGEBwIPIC0ObgB+HyXLi6hBEXKGOHbrB6iuxYGYxQMAOTcyrBa4W0Xtjaq/43ibDE= X-Bogosity: Ham, tests=bogofilter, spamicity=0.071420, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Wed, Nov 15, 2023 at 9:34=E2=80=AFPM Ilya Leoshkevich wrote: > > Comparing pointers with TASK_SIZE does not make sense when kernel and > userspace overlap. Assume that we are handling user memory access in > this case. > > Reported-by: Alexander Gordeev > Signed-off-by: Ilya Leoshkevich Reviewed-by: Alexander Potapenko