Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6164219imu; Mon, 21 Jan 2019 04:21:40 -0800 (PST) X-Google-Smtp-Source: ALg8bN4qS0cC4ONVpl9xs0sr1ACK+i9lheqXqVG75KnRAWZ3lIUCBy3SIDx+F4+TCXRpbRGf+jem X-Received: by 2002:a17:902:3f81:: with SMTP id a1mr29765234pld.258.1548073300325; Mon, 21 Jan 2019 04:21:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548073300; cv=none; d=google.com; s=arc-20160816; b=bSeqAnB8NcShVVQ1ovDzB51vZwaAv6IUAelU9uRszt54BlHYduh+d34LD3ZYbnyckh xqsjUTm6AFnAm3Xcw2Z16WV23JQoGGy1CyEQkqXV+g0CQGpvYJZlxms4xYnFo68/lSww PtqxbHa1O159MF/mjbeH+2UO6OhcyhhBVe+oAoeQA5NptrbgmjOvokn7D2XR8Xz+TxCM IX8yWYhmp71mO5l+l0XySdp1NOGzMynkSVu7NIMWPOtBsqzEmoIzkQk7t8muFtfkFMpz erLukwJDeOcmh+aYr69dQyWHs1t+KXRmrv+RZVksMwlMWvPvt/fkDNAlCA/c2/N3G/Xz 7Xxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=xkh63okoRDT9wLI8/Z6j4V2VNLrOoGaoIjCg2qNSTD8=; b=emH0F4+MBW2PfZz85E1LtlxvJjJCgXVL4Y/sCLR6aKQ9m0K2AgAdA5iwF9PEZxRXu8 YLP+7F0+sTd8x3uDtiYSgdxBPd7t/OkMatS65kK0/oUbSeMez7x+PG3mM/qvPRt7QgPN 6eRdjN2aDbsyMVqcsoW3e3pkdo8P82CyJ+ci0KhNZfMi0aV87z+cQD2JbKQFCS/4ZObs 94u/5QvHP3Jkvq901gGF9Mu3paLBd1OYHRyJj6Ig5Q44symM1gnHwrApj95lqnHtTTS0 xXde6iZjhNB++oWuywTOo/fRJJAwNXwTOA4N71PBL2CaIjJ/V0jPcDe6+tN5BUAQ7TmR weaw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j1si11929983plk.342.2019.01.21.04.21.14; Mon, 21 Jan 2019 04:21:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728434AbfAUMTk (ORCPT + 99 others); Mon, 21 Jan 2019 07:19:40 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:60902 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728216AbfAUMTj (ORCPT ); Mon, 21 Jan 2019 07:19:39 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id BC9AA80D; Mon, 21 Jan 2019 04:19:38 -0800 (PST) Received: from [10.1.196.75] (e110467-lin.cambridge.arm.com [10.1.196.75]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id AEB0B3F614; Mon, 21 Jan 2019 04:19:35 -0800 (PST) Subject: Re: kmemleak panic To: Marc Gonzalez , Catalin Marinas , Rob Herring , Frank Rowand , Marek Szyprowski , Bjorn Andersson Cc: Mark Rutland , Arnd Bergmann , Ard Biesheuvel , Oscar Salvador , Wei Yang , Michal Hocko , Andrew Morton , Linus Torvalds , Sri Krishna chowdary , Qian Cai , LKML References: <20190118143434.GE118707@arrakis.emea.arm.com> <20190119132832.GA29881@MBP.local> <6579db26-10ac-3fbf-1998-5b937a38f202@free.fr> From: Robin Murphy Message-ID: Date: Mon, 21 Jan 2019 12:19:27 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1 MIME-Version: 1.0 In-Reply-To: <6579db26-10ac-3fbf-1998-5b937a38f202@free.fr> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 21/01/2019 11:57, Marc Gonzalez wrote: [...] > # echo dump=0xffffffc021e00000 > /sys/kernel/debug/kmemleak > kmemleak: Object 0xffffffc021e00000 (size 2097152): > kmemleak: comm "swapper/0", pid 0, jiffies 4294892296 > kmemleak: min_count = 0 > kmemleak: count = 0 > kmemleak: flags = 0x1 > kmemleak: checksum = 0 > kmemleak: backtrace: > kmemleak_alloc_phys+0x48/0x60 > memblock_alloc_range_nid+0x8c/0xa4 > memblock_alloc_base_nid+0x4c/0x60 > __memblock_alloc_base+0x3c/0x4c > early_init_dt_alloc_reserved_memory_arch+0x54/0xa4 > fdt_init_reserved_mem+0x308/0x3ec > early_init_fdt_scan_reserved_mem+0x88/0xb0 > arm64_memblock_init+0x1dc/0x254 > setup_arch+0x1c8/0x4ec > start_kernel+0x84/0x44c > 0xffffffffffffffff OK, so via the __va(phys) call in kmemleak_alloc_phys(), you end up with the linear map address of a no-map reservation, which unsurprisingly turns out not to be mapped. Is there a way to tell kmemleak that it can't scan within a particular object? Robin.