Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp11006988imu; Thu, 6 Dec 2018 10:01:37 -0800 (PST) X-Google-Smtp-Source: AFSGD/XLNfjjYs1BaN7IRtf9UpdxXFdHRANOsQvnK996FOBh0/hnSiQH6PzNSVcSbfyIpbWaRWLi X-Received: by 2002:a63:9402:: with SMTP id m2mr23984375pge.93.1544119297735; Thu, 06 Dec 2018 10:01:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544119297; cv=none; d=google.com; s=arc-20160816; b=Rqu4Sool3WleRSPG9A7FmE7Kp5+St3uE6z+LrQTSA9ffS1WLn7QfxOq5OtAMQqBvpu 8Mxejt9vL4ZTPsGiEwqNw61BnEzaWxqosU5ecpu+tKZjXzXFPeNHT5Fdtats3q9edpz9 blziqNIKVuRoRtAADxOM1lgQc8Xwci++wrzQkXgLYE8hH3aycKhzA2P6jqcqF+FnL2Gw TYkR3P1VAhMHiCTfVPw7aX0fRA3ofY5Q81lLgRN9iJzBUKw3/LBl/DgweslcE3TSRZc2 lqEWTxJ/IqVzQVFpe/uvrKkdHAf5wcsLdQa8FbZgO6bGSQZhNQUv0PETBOqZ3Fw3YT2k 9Jvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=iGpSMIkTI0kXJbKKUECkBbfYNUw1k8ufbJpOU8NuNXE=; b=HU0VOH3stTbxnqf2hFRDVQU/jeQALI0992RAQoFgklDucECPI5mFLg/lkSNKSGCdkx UCHpplZx6IPk77eRCzHxpp1m9j0VlhWB1is+KfGkjs1xJr9rrCD5pe8qXY+QBKLEZGow KicGEQN7XENFF959SvO/dNNTWC4m1BqPiOmDALDDkINrVduD8WD3bPT0V9Lgd++f524s HhWlRUGyM2KAYznCRozuXwIpUEQ287o+JED/qLS2jJmDcAxyK3UWVFvqRgTkr53wiCtQ Sex2u/cpOLD5XGc0QXEi36tgg6OAlBXbpVMJVhLeBzUIiWTZcpgWrx2TyStcUNgW+Sxm Vmuw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l3si752504pld.155.2018.12.06.10.01.05; Thu, 06 Dec 2018 10:01:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726084AbeLFSAD (ORCPT + 99 others); Thu, 6 Dec 2018 13:00:03 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:57412 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725948AbeLFSAC (ORCPT ); Thu, 6 Dec 2018 13:00:02 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 66B7E80D; Thu, 6 Dec 2018 10:00:02 -0800 (PST) Received: from arrakis.emea.arm.com (arrakis.cambridge.arm.com [10.1.196.113]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 33F853F5AF; Thu, 6 Dec 2018 10:00:01 -0800 (PST) Date: Thu, 6 Dec 2018 17:59:58 +0000 From: Catalin Marinas To: Qian Cai Cc: akpm@linux-foundation.org, ard.biesheuvel@linaro.org, marc.zyngier@arm.com, linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [RESEND PATCH] efi: let kmemleak ignore false positives Message-ID: <20181206175958.GS54495@arrakis.emea.arm.com> References: <1543517152-23969-1-git-send-email-cai@gmx.us> <20181206161633.36292-1-cai@gmx.us> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181206161633.36292-1-cai@gmx.us> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Dec 06, 2018 at 11:16:33AM -0500, Qian Cai wrote: > unreferenced object 0xffff8096c1acf580 (size 128): > comm "swapper/63", pid 0, jiffies 4294937418 (age 1201.230s) > hex dump (first 32 bytes): > 80 87 b5 c1 96 00 00 00 00 00 cc c2 16 00 00 00 ................ > 00 00 01 00 00 00 00 00 6b 6b 6b 6b 6b 6b 6b 6b ........kkkkkkkk > backtrace: > [<000000001d2549ba>] kmem_cache_alloc_trace+0x430/0x500 > [<0000000093a6dfab>] efi_mem_reserve_persistent+0x50/0xf8 > [<000000000a730828>] its_cpu_init_lpis+0x394/0x4b8 > [<00000000edf04e07>] its_cpu_init+0x104/0x150 > [<000000004d0342c5>] gic_starting_cpu+0x34/0x40 > [<000000005d9da772>] cpuhp_invoke_callback+0x228/0x1d68 > [<0000000061eace9b>] notify_cpu_starting+0xc0/0x118 > [<0000000048bc2dc5>] secondary_start_kernel+0x23c/0x3b0 > [<0000000015137d6a>] 0xffffffffffffffff > > efi_mem_reserve_persistent+0x50/0xf8: > kmalloc at include/linux/slab.h:546 > (inlined by) efi_mem_reserve_persistent at drivers/firmware/efi/efi.c:979 > > This line, > > rsv = kmalloc(sizeof(*rsv), GFP_ATOMIC); > > Kmemleak has a known limitation that can only track pointers in the kernel > virtual space. Hence, it will report false positives due to "rsv" will only > reference to other physical addresses, > > rsv->next = efi_memreserve_root->next; > efi_memreserve_root->next = __pa(rsv); > > Signed-off-by: Qian Cai Acked-by: Catalin Marinas