Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp429757imu; Fri, 7 Dec 2018 03:30:00 -0800 (PST) X-Google-Smtp-Source: AFSGD/VpdTyVd+ZENX1LMR5wzMXRpjaRKJ1DBpDC/DDNzap+vuthfwPPWE5YmgPHrjY+dYSPO9sz X-Received: by 2002:a62:5ec5:: with SMTP id s188mr1821437pfb.145.1544182200498; Fri, 07 Dec 2018 03:30:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544182200; cv=none; d=google.com; s=arc-20160816; b=OP+fKD4O90sHhV/ZIDfkWjKdrVCHGyG/Sw/Q2B+isvjc8UMEW+ZTH4saSCjDwfh3Jx RjeNpzzmdA7iujeFYCGgZCevawq9JrEaWDHFxYMnznALiVShO5qvTjW2ykN1Jf2fBeVE dnVAZv405GE0G5oBZDr0iOvTwUK55J2BXUIJ09beJ+uEIfhAIk4VlXOmUh1j6xpOrnIT TpehEL/0tTU/BqiAfbmUxzjfr1wBdTFZ7Fhki2orXWKHL+BfAKrVIYFo/PG/Z4YQgeOL Hs4HJ77WRgIyKJ8yxfrtfwz4GpD9CO9A3odktor7awFHQIBt6uyngFa+oDEjhbyZrdgV QvNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=Ot6c88os2Gn6TzPw7vDz+A24xuzPne5JzOuN2I+iXs4=; b=We9hr9e//jCkyHRUvlcVRrHDkTpFKiGphjZFplQ1dWcBzG/NifmBGA0YeHWRsUEPTh FZ3fuQMYpgv9C7+gcBkx2SkfndKbjUBtkpHM4ZHbBXKsjp1xrBtD0IX3bIsXiUEc8Fcj W2Fq6PMfT622Lqrg0QweoQOHNlv2Lrqxcm2z7B4WXXVoUwy5rPXNr7FuVRXc/j9HarvF 9Rh6cq1v2OQe06Y9JLegdLNtzdh2kZ+Y3qFIFHOciIGBSQVdnfP9Ztn5EE2vDZHOrL8w MRCqncENmxHD5qb5VUDBB2/3U0eou0JNuYWDztt3vC/M+lBkAT23GOkZWqIDKQA+WyXT CRYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=MFhvaXJS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b7si2879859plk.206.2018.12.07.03.29.45; Fri, 07 Dec 2018 03:30:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=MFhvaXJS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726038AbeLGL3J (ORCPT + 99 others); Fri, 7 Dec 2018 06:29:09 -0500 Received: from mail-it1-f196.google.com ([209.85.166.196]:51456 "EHLO mail-it1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725988AbeLGL3J (ORCPT ); Fri, 7 Dec 2018 06:29:09 -0500 Received: by mail-it1-f196.google.com with SMTP id x19so6382292itl.1 for ; Fri, 07 Dec 2018 03:29:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Ot6c88os2Gn6TzPw7vDz+A24xuzPne5JzOuN2I+iXs4=; b=MFhvaXJS6ddf5JyHcbeNRshml2CqrEFX+30Qcf6T0CFdNBtZ+UFoCP+QJgXFCTkhwi lUWMqJ4v39xxFG7WuFo3A2pzAZDpsrRWzEpq0JsRnYlk3HRr9/AcGJus5yeEEwV4szRk XN2hAiEV3gLipXh/z1WMCEfI1nZ6PAxDN1HFc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Ot6c88os2Gn6TzPw7vDz+A24xuzPne5JzOuN2I+iXs4=; b=ZZ4mb1UHUOSNiVgSU9auhzubrMeNvOB+earLqZBjkuBZakU4zHo3xe8j/tFNPVZilJ ytd5SDb9VfXVKwtztSKQj/Jx8Uokb6UijV2g4gsEdLEZFG3I6MT5vjI2sR9SB+5uknMi 3ysGHTlrxuVaCWtOFbQao5tVroTTfiKVCvyL5w6hKt/kKLvgtRTQ2LNSQ4WT10Q1OK79 4rngn35qQrs5JL4wff5TPl52q6tgZ/UQOxWq99vEyfgs27JRf5oig1scoEyFXa/6c8hh AlQ9EyJ/NT/enreUMKu7Bzbpf1Sl/lArjcEEZDZGQqyTUa7oN4ssb+QtQSGoS1pxyU/9 qBjw== X-Gm-Message-State: AA+aEWZJTlSCBQJJFy7TxkifZUHEmeUd4Y4n43k6HKY4O82CRe2I7/YN lzi2aPuicUil/ybWk1TQpcdCl26BZ42mclXYywMOGg== X-Received: by 2002:a24:710:: with SMTP id f16mr1490200itf.121.1544182148356; Fri, 07 Dec 2018 03:29:08 -0800 (PST) MIME-Version: 1.0 References: <1543517152-23969-1-git-send-email-cai@gmx.us> <20181206161633.36292-1-cai@gmx.us> <20181206175958.GS54495@arrakis.emea.arm.com> <1544119499.12945.48.camel@gmx.us> In-Reply-To: <1544119499.12945.48.camel@gmx.us> From: Ard Biesheuvel Date: Fri, 7 Dec 2018 12:28:57 +0100 Message-ID: Subject: Re: [RESEND PATCH] efi: let kmemleak ignore false positives To: Qian Cai Cc: Catalin Marinas , Andrew Morton , Marc Zyngier , linux-efi , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 6 Dec 2018 at 19:05, Qian Cai wrote: > > On Thu, 2018-12-06 at 19:01 +0100, Ard Biesheuvel wrote: > > On Thu, 6 Dec 2018 at 19:00, Catalin Marinas wrote: > > > > > > On Thu, Dec 06, 2018 at 11:16:33AM -0500, Qian Cai wrote: > > > > unreferenced object 0xffff8096c1acf580 (size 128): > > > > comm "swapper/63", pid 0, jiffies 4294937418 (age 1201.230s) > > > > hex dump (first 32 bytes): > > > > 80 87 b5 c1 96 00 00 00 00 00 cc c2 16 00 00 00 ................ > > > > 00 00 01 00 00 00 00 00 6b 6b 6b 6b 6b 6b 6b 6b ........kkkkkkkk > > > > backtrace: > > > > [<000000001d2549ba>] kmem_cache_alloc_trace+0x430/0x500 > > > > [<0000000093a6dfab>] efi_mem_reserve_persistent+0x50/0xf8 > > > > [<000000000a730828>] its_cpu_init_lpis+0x394/0x4b8 > > > > [<00000000edf04e07>] its_cpu_init+0x104/0x150 > > > > [<000000004d0342c5>] gic_starting_cpu+0x34/0x40 > > > > [<000000005d9da772>] cpuhp_invoke_callback+0x228/0x1d68 > > > > [<0000000061eace9b>] notify_cpu_starting+0xc0/0x118 > > > > [<0000000048bc2dc5>] secondary_start_kernel+0x23c/0x3b0 > > > > [<0000000015137d6a>] 0xffffffffffffffff > > > > > > > > efi_mem_reserve_persistent+0x50/0xf8: > > > > kmalloc at include/linux/slab.h:546 > > > > (inlined by) efi_mem_reserve_persistent at drivers/firmware/efi/efi.c:979 > > > > > > > > This line, > > > > > > > > rsv = kmalloc(sizeof(*rsv), GFP_ATOMIC); > > > > > > > > Kmemleak has a known limitation that can only track pointers in the kernel > > > > virtual space. Hence, it will report false positives due to "rsv" will > > > > only > > > > reference to other physical addresses, > > > > > > > > rsv->next = efi_memreserve_root->next; > > > > efi_memreserve_root->next = __pa(rsv); > > > > > > > > Signed-off-by: Qian Cai > > > > > > Acked-by: Catalin Marinas \ > > > > I don't see the patch and I wasn't cc'ed > > That is strange. Please see, > > https://lore.kernel.org/lkml/1543517152-23969-1-git-send-email-cai@gmx.us/ OK, I found it in my spam folder, apologies for that. This kmalloc() will be replaced in the next merge window by a call to __get_free_page(). Does kmemleak still require the kmemleak_ignore() for that case? Or is it only for kmalloc()?