Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6300779imu; Mon, 21 Jan 2019 06:38:36 -0800 (PST) X-Google-Smtp-Source: ALg8bN5+IYbFCwDgbpBpgr+R50n58iwpos4LpwaROdqSFJShfKgm6Jm3pP0E280g636hCEsGSSZS X-Received: by 2002:a63:f658:: with SMTP id u24mr28593145pgj.267.1548081515966; Mon, 21 Jan 2019 06:38:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548081515; cv=none; d=google.com; s=arc-20160816; b=CZj1FZeJb8WdXhfT3JnWh/GWlGiIzQibDodl3NwBFiF92WG4HtpAXw5m5oGm8/00Ga 1DCIdgNZo3bsErLeAVxGNElExD4nyPQCET9veoWWzzJ8AGi2JfTFbfvkmQmsP9csi91y GC9Whh8pz1RmvOtEtbuzDfi8CJ5fvzaQ2NZtQAYGj/Fuqp1Z+VjBNlIPrTdapjb2yha5 O0fR48Kl3FlZi5yYwdnrNzCllI5VygBbkHeDY0ugx8arY0hGtzNwRdDd0iXjwzSyso9L 4LFwYJaChalZLaO5K4+S1iJj6OhSGap/gtnQnQio7eHq8GCzRXOpFJjE8yBpkaD3vL0B YncQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=V/xNQwDiwS0CBYaJO5KRMU/NoH398ScRtWfybpKtDAE=; b=C4BXuBUvAHEV0MPu98/7WKNdaW1VP1OfDD8KeRSnrQdpjbVOTD7pz8h9veeIlqbhze sWWhreSGgbZ3QEmBmmOcPw48J0L96w98jlVV11DmQuOZEZOqbe936JQnL9T2eHO317oN rY4pxTZochXg+yj4fJuGUXFY0Ilzt+ELaqZgm0GjvvvvNi0K4ptP2lLWgJw1QWip4f8G KLyfjeL8/s67G0nDzveNsO91NfvVN7AmRNLHq+Adc0g4KjmHfpDKFxLnE3QU/y6CbCjn OFknKLKoc6coqFF5jV2UgIBBFn45DKQ4uc0huOO3tFlWhLlnsACsEkVT+WmIUbzImG5d ns0g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a6si12503953pfo.90.2019.01.21.06.38.19; Mon, 21 Jan 2019 06:38:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729174AbfAUOhL (ORCPT + 99 others); Mon, 21 Jan 2019 09:37:11 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:35586 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729185AbfAUOhK (ORCPT ); Mon, 21 Jan 2019 09:37:10 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id DB3C2EBD; Mon, 21 Jan 2019 06:37:09 -0800 (PST) Received: from arrakis.emea.arm.com (arrakis.cambridge.arm.com [10.1.196.113]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E66563F5C1; Mon, 21 Jan 2019 06:37:06 -0800 (PST) Date: Mon, 21 Jan 2019 14:37:04 +0000 From: Catalin Marinas To: Rob Herring Cc: Robin Murphy , Marc Gonzalez , Frank Rowand , Marek Szyprowski , Bjorn Andersson , Mark Rutland , Arnd Bergmann , Ard Biesheuvel , Oscar Salvador , Wei Yang , Michal Hocko , Andrew Morton , Linus Torvalds , Sri Krishna chowdary , Qian Cai , LKML Subject: Re: kmemleak panic Message-ID: <20190121143704.GE29504@arrakis.emea.arm.com> References: <20190118143434.GE118707@arrakis.emea.arm.com> <20190119132832.GA29881@MBP.local> <6579db26-10ac-3fbf-1998-5b937a38f202@free.fr> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jan 21, 2019 at 07:35:11AM -0600, Rob Herring wrote: > On Mon, Jan 21, 2019 at 6:19 AM Robin Murphy wrote: > > > > On 21/01/2019 11:57, Marc Gonzalez wrote: > > [...] > > > # echo dump=0xffffffc021e00000 > /sys/kernel/debug/kmemleak > > > kmemleak: Object 0xffffffc021e00000 (size 2097152): > > > kmemleak: comm "swapper/0", pid 0, jiffies 4294892296 > > > kmemleak: min_count = 0 > > > kmemleak: count = 0 > > > kmemleak: flags = 0x1 > > > kmemleak: checksum = 0 > > > kmemleak: backtrace: > > > kmemleak_alloc_phys+0x48/0x60 > > > memblock_alloc_range_nid+0x8c/0xa4 > > > memblock_alloc_base_nid+0x4c/0x60 > > > __memblock_alloc_base+0x3c/0x4c > > > early_init_dt_alloc_reserved_memory_arch+0x54/0xa4 > > > fdt_init_reserved_mem+0x308/0x3ec > > > early_init_fdt_scan_reserved_mem+0x88/0xb0 > > > arm64_memblock_init+0x1dc/0x254 > > > setup_arch+0x1c8/0x4ec > > > start_kernel+0x84/0x44c > > > 0xffffffffffffffff > > > > OK, so via the __va(phys) call in kmemleak_alloc_phys(), you end up with > > the linear map address of a no-map reservation, which unsurprisingly > > turns out not to be mapped. Is there a way to tell kmemleak that it > > can't scan within a particular object? > > There was this patch posted[1]. I never got a reply, so it hasn't been applied. > > https://patchwork.ozlabs.org/patch/995367/ Thanks Rob, I wasn't aware of this patch (or I just missed it at the time). I wonder whether kmemleak should simply remove ranges passed to memblock_remove(), or at least mark them as no-scan. -- Catalin