Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6237489imu; Mon, 21 Jan 2019 05:36:55 -0800 (PST) X-Google-Smtp-Source: ALg8bN6xsOH2DnsQYaZmLDjCveMcHlFydJVeqEIc9NVXn2QpViMnRSPXecS6iQnpu/aW1HoiY4fV X-Received: by 2002:a63:6906:: with SMTP id e6mr27667418pgc.144.1548077815766; Mon, 21 Jan 2019 05:36:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548077815; cv=none; d=google.com; s=arc-20160816; b=wgM2ZZnzmsDekh8Hoo32zkq7rW9LIRiwTT8vHperk4RT209FjtkpxVTVjHBfVcekPW CarkNOMgWcVND/Gms3snV3GJ63z0AmjucbxWm9a1rG8Ybw3up/DEsMsfaNJbfwWUn5me Ftk27li2WBx3xMJ8s+UD/OKbeU/Etv0FtPiZk97OeS9XjO2L7JLW6HLnWpl3uLrKQGp3 a8Ue+YJja8Aiv1/C1ACHymhJrgRBb6v2Nz/gHhm5RD864fWkHGxsposPxv0g5x+se0NB uWM6OKRcOQs9h2sdAV7HmRhuz5qHVSHFOPlVh7Isy5bYl1uUaJ9o1R7XM8lKgFv/TWsR 25DA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=sMX8MFgFq7qG/XBwErQ6Rpj5SL+acQXqijoUIi5dXtA=; b=z9lPS1PsguoKauoubpOsylq4XGLfXdYIeIIEd2Ma/ZmFzPkg+ThjcBYJoc82Qs/i28 6PuG46Pb6tDdX7P19T0DzeOJJF+0S3BWlQQMnnjbOOCZlXPZjSPNO4rHDYdyJyPmN282 8tTcFaqv0pAqOQF0dMxz2N+GFSN/idkD5B5FxP1sv4yzLtffbIdGw0FrEnPgt6sZznCs OhBWrV8XMpAo+B8QGJvPUlzyyo31y2hFuraLpthlxDQA+DA0YlQ9tDw0K88o/IN7t0jW TtueVN+TeYmemYjGNeB58I7QgYpq8joJUmzM/JXO5roph5mZ9Rq9KTFvKsfLWMkyKr4B OS8g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=A5jSDmBc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y20si12183605plr.106.2019.01.21.05.36.34; Mon, 21 Jan 2019 05:36:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=A5jSDmBc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729039AbfAUNfZ (ORCPT + 99 others); Mon, 21 Jan 2019 08:35:25 -0500 Received: from mail.kernel.org ([198.145.29.99]:51512 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728648AbfAUNfZ (ORCPT ); Mon, 21 Jan 2019 08:35:25 -0500 Received: from mail-qt1-f173.google.com (mail-qt1-f173.google.com [209.85.160.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2FAE220879 for ; Mon, 21 Jan 2019 13:35:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548077724; bh=1dWunOA+vGZNvIl3JTgepZja1oWzemnosglZGJpT3Zg=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=A5jSDmBccIsRUnEYoq2iabrlDy3HGaem/53EBsOE6E6bWKvavNsS5cYRR+olJrf5q B4GJcKlxOvqPtB1L/zFbVq7AqOQHNghXtsZmebd50p0/MU4F9/pzeIrX4/JPsWVH6/ 8XYkjaqtm8U//78rQaXsXCzTg/XPQMk0Yj5BBkrY= Received: by mail-qt1-f173.google.com with SMTP id y20so23472103qtm.13 for ; Mon, 21 Jan 2019 05:35:24 -0800 (PST) X-Gm-Message-State: AJcUukc9sLv+s3gA1emK/OorZ1yW3lK1tg66mdOMOltbOi9LA8QLE4IC XVINa25DRmaWv1quWd428P+kWVyJ7y4gZOQXsQ== X-Received: by 2002:ac8:1712:: with SMTP id w18mr26513808qtj.76.1548077723365; Mon, 21 Jan 2019 05:35:23 -0800 (PST) MIME-Version: 1.0 References: <20190118143434.GE118707@arrakis.emea.arm.com> <20190119132832.GA29881@MBP.local> <6579db26-10ac-3fbf-1998-5b937a38f202@free.fr> In-Reply-To: From: Rob Herring Date: Mon, 21 Jan 2019 07:35:11 -0600 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: kmemleak panic To: Robin Murphy Cc: Marc Gonzalez , Catalin Marinas , Frank Rowand , Marek Szyprowski , Bjorn Andersson , Mark Rutland , Arnd Bergmann , Ard Biesheuvel , Oscar Salvador , Wei Yang , Michal Hocko , Andrew Morton , Linus Torvalds , Sri Krishna chowdary , Qian Cai , LKML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jan 21, 2019 at 6:19 AM Robin Murphy wrote: > > On 21/01/2019 11:57, Marc Gonzalez wrote: > [...] > > # echo dump=0xffffffc021e00000 > /sys/kernel/debug/kmemleak > > kmemleak: Object 0xffffffc021e00000 (size 2097152): > > kmemleak: comm "swapper/0", pid 0, jiffies 4294892296 > > kmemleak: min_count = 0 > > kmemleak: count = 0 > > kmemleak: flags = 0x1 > > kmemleak: checksum = 0 > > kmemleak: backtrace: > > kmemleak_alloc_phys+0x48/0x60 > > memblock_alloc_range_nid+0x8c/0xa4 > > memblock_alloc_base_nid+0x4c/0x60 > > __memblock_alloc_base+0x3c/0x4c > > early_init_dt_alloc_reserved_memory_arch+0x54/0xa4 > > fdt_init_reserved_mem+0x308/0x3ec > > early_init_fdt_scan_reserved_mem+0x88/0xb0 > > arm64_memblock_init+0x1dc/0x254 > > setup_arch+0x1c8/0x4ec > > start_kernel+0x84/0x44c > > 0xffffffffffffffff > > OK, so via the __va(phys) call in kmemleak_alloc_phys(), you end up with > the linear map address of a no-map reservation, which unsurprisingly > turns out not to be mapped. Is there a way to tell kmemleak that it > can't scan within a particular object? There was this patch posted[1]. I never got a reply, so it hasn't been applied. Rob https://patchwork.ozlabs.org/patch/995367/