Re: [PATCH] mm: __nr_to_section - make it safe against overflow v2

From: Cyrill Gorcunov
Date: Tue Jan 06 2009 - 02:49:42 EST


[KAMEZAWA Hiroyuki - Tue, Jan 06, 2009 at 03:30:36PM +0900]
| On Tue, 6 Jan 2009 14:57:41 +0900
| KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx> wrote:
|
| > On Mon, 5 Jan 2009 16:37:42 -0800
| > Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> wrote:
| >
| > > On Mon, 5 Jan 2009 13:31:32 +0300
| > > Cyrill Gorcunov <gorcunov@xxxxxxxxx> wrote:
| > >
| > > > __nr_to_section should check for array bound overflow.
| > > > We should better get NULL dereference then silently
| > > > pass some memory snippet out of bounds to a caller.
| > > >
| > >
| > > Are there actually any known problems here?
| > >
| >
| > IIRC, I never saw any problem. (But I may see in memory-hotplug development.)
|
| I digged mails and seems this patch is from this thread.
|
| =
| http://lkml.org/lkml/2009/1/4/61
| =
|
| He seems to want to hunt boot time failure.
| (Finally, BIOS-update was necessary for original problem of this thread.)
|
| Cyrill, could you modify this WARN_ON() works works when __nr_to_section()
| is called directly by sparse.c and memhotplug.c ?
|
| Adding WARN_ON() in pfn_to_page() is overkill.
|
| Thanks,
| -Kame
|

Thanks for review Kame, this patch should be just dropped.

Actually the only code snippet which make me nervious is
sizeof (mem_section) part. Which is to remain power of
two and even doesn't have 'packed' attribute neither any
comments above. And if it happens that it will be modified
or say gcc decide to add some bytes here (bugs happens) we
would silently address wrong mem_section. So I think at least
the 'comment' part of my patch is deserve to be applied :)

- Cyrill -
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/