Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp615756imu; Wed, 9 Jan 2019 03:33:14 -0800 (PST) X-Google-Smtp-Source: ALg8bN6hejFTGxKerIQjcwvyag1XtxssFoRLpbS+ptwKqsMaigw1nkzrkJR2LpYCnrzPgO/C5Lxb X-Received: by 2002:a63:111c:: with SMTP id g28mr5007442pgl.85.1547033593990; Wed, 09 Jan 2019 03:33:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547033593; cv=none; d=google.com; s=arc-20160816; b=Q2b47TOjRocGGhcRaIlh8SFR3JTZ3TxWG+Mk5jUCDFc1Xe2H+YbEBPsPoRKXdsmXwT pe2pSbXMZT5FbWD/TXAPio8aieI4hajxitnrE+L8CrnUnuJJHG/gM1wHzwUPmGLsyxfI /3xC+jndEax1Hp5l6RntEtIu5ObVH3VAeJTwHi8siQChj5P5Qk3LB2G/CCzq4kqzRLbt 6eyW8HCEePiqQJs1uNpv8MlSoC/BDqZGnGxIXN5yQzmKDz1yvffUR1q3xcx6wrbufmKx QAp4gmJ2g5NS44yAy+kNbQNW05KDfiKKhdH894wvmP+WsBfqn01zzHzkhgjZwZneMWyR /ESA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=06wb5c8IxBT/7GEFrbYnv5NYBhmVvhzJuwL7DLSAgew=; b=k4KCBkL/4i3tpAoTtvenuuzEkGAG3AX2Dp3wlhv02YIfU0AhI9+ddjwMDmm7BCeFka lHExiKVPFmwq1pzErlQIwxqhF2c4qlTj5XzVIy/GBIKb/CGb7Cram8Tx4EyWb2Zc72Rc G3MJOzTAUuL7pg14TXZz4xGfTNpe2iuQ7/tLNBvq8rnW+35jK9GQGKWdtMUckZKeG06D ISOZtOF9nRc+MAANt+WzwWsRDbccpk+Q7WvPtzPp+MKW0zEtsSw9O0hSptR9VLMIQD+p nRKJrX4aM7ITFcPhhzx/RJKJqHTcccEHCziUH4/NCgUqKyw2gqifFwssQfa2Gi/9gk3w 3o3A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r196si13352069pgr.311.2019.01.09.03.32.58; Wed, 09 Jan 2019 03:33:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730793AbfAILbd (ORCPT + 99 others); Wed, 9 Jan 2019 06:31:33 -0500 Received: from foss.arm.com ([217.140.101.70]:41736 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730239AbfAILbc (ORCPT ); Wed, 9 Jan 2019 06:31:32 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 5065DA78; Wed, 9 Jan 2019 03:31:32 -0800 (PST) Received: from mbp (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id C04FD3F70D; Wed, 9 Jan 2019 03:31:29 -0800 (PST) Date: Wed, 9 Jan 2019 11:31:26 +0000 From: Catalin Marinas To: Prateek Patel Cc: paul@paul-moore.com, sds@tycho.nsa.gov, eparis@parisplace.org, linux-kernel@vger.kernel.org, selinux@vger.kernel.org, linux-tegra@vger.kernel.org, talho@nvidia.com, swarren@nvidia.com, linux-mm@kvack.org, snikam@nvidia.com, vdumpa@nvidia.com, Sri Krishna chowdary Subject: Re: [PATCH] selinux: avc: mark avc node as not a leak Message-ID: <20190109113126.nzpmb7xx4xqtn37w@mbp> References: <1547023162-6381-1-git-send-email-prpatel@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1547023162-6381-1-git-send-email-prpatel@nvidia.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Prateek, On Wed, Jan 09, 2019 at 02:09:22PM +0530, Prateek Patel wrote: > From: Sri Krishna chowdary > > kmemleak detects allocated objects as leaks if not accessed for > default scan time. The memory allocated using avc_alloc_node > is freed using rcu mechanism when nodes are reclaimed or on > avc_flush. So, there is no real leak here and kmemleak_scan > detects it as a leak which is false positive. Hence, mark it as > kmemleak_not_leak. In theory, kmemleak should detect the node->rhead in the lists used by call_rcu() and not report it as a leak. Which RCU options do you have enabled (just to check whether kmemleak tracks the RCU internal lists)? Also, does this leak eventually disappear without your patch? Does echo dump=0xffffffc0dd1a0e60 > /sys/kernel/debug/kmemleak still display this object? Thanks. -- Catalin