Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1851638pxk; Tue, 1 Sep 2020 09:14:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyrCANEYHJ4sMgv15ww9o/Tu+D3erJ7veqlrXe96YNGeaj45dlObh2vdMPurLpNfx21ix+a X-Received: by 2002:a17:906:6c99:: with SMTP id s25mr2092587ejr.304.1598976861901; Tue, 01 Sep 2020 09:14:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598976860; cv=none; d=google.com; s=arc-20160816; b=PsCGWXo9wgjBmMF/4Vl+8MHE7qr4WHni1phwKgff37Aer7hqbdZH/AT6Pc68h9NtSI OZkx+VqKAspzGJcnck7BrlWqUpde1iGlwsP1DnvNLQESA0kjt+YOaMV8+Mi/m/dUaogY DO7mcNsZqvq+AtXqfIaOrArvO6gOU4YUGDGWQkBONlhgfxcZtZ01JB7TSZpbGwtL4PPR HqH6EtZDqxmkdwls8PXk0Oj3JKl4pnL20pyO3EZjFPDMDZl9E4k2+7pf68XDzxRNHE5h QD0WqbUzGYkVIAYR5BuaInS3SWuOG6/5SWzljXtGNHHDi4VN5uMot5iv4QgrjBGuuxsZ w7xA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=+9ITrwxUL5+Ov5+uUqc0JYZ1asvFKFhSfK1YzDCo2+4=; b=l2djXK/PILN27E0Ui63m/LHxkqtwUv48HoxXDBqCoOI0U6CA839+EWpGkKh3xRK6tY PcuEN2c7XkJxQmxqIrUT1kJVvy0AXpxRe8L2R9DE2CfZ1kcMz++Hu8NzHAanaicL6YwY TNJ6HQujJZ7j9tBQOTgzZBvM5BsxpYKu/zg6kjcIF5qbWIJB1BtaH7EEDbxXzaqiZpUi l+fp5WlzZeOkKCw+3UYtt+blM7q0WIdONzc/cVmkfYSTr+ze3qEbrUaIb3aYb69cfPz3 SNSdTUUFOeEVpkGr9/uDGe42DUQ5fx8mqgU8pjob9/hZOJwhmBpp+YeD/w+ZLjhnF6+G PNbw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0slcQnaI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m26si964379ejc.349.2020.09.01.09.13.56; Tue, 01 Sep 2020 09:14:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0slcQnaI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731581AbgIAQN1 (ORCPT + 99 others); Tue, 1 Sep 2020 12:13:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:43012 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731250AbgIAPgP (ORCPT ); Tue, 1 Sep 2020 11:36:15 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E507621707; Tue, 1 Sep 2020 15:36:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1598974574; bh=+kj9s/5ZqlyNsnM52p3naaPPs/OU12x7yQGwDwRDM5w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0slcQnaI6nrzG5Xnq7AHSJyJpRGFOiBliolkOfM+CkTm5+mhRWoZ5F4h3C0JYIpXo v57LeS8lADIRCy1tSVjsYbc/6SUl+g/SALyEm0rT3tDN5vu9+xHAPJm2GwVpq96wTX MD1IDTdrJCM7keSyqFzuL8BHyCA9yTI5k2fn8bLI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexey Kardashevskiy , Michael Ellerman , Sasha Levin Subject: [PATCH 5.8 014/255] powerpc/xive: Ignore kmemleak false positives Date: Tue, 1 Sep 2020 17:07:50 +0200 Message-Id: <20200901151001.473378139@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200901151000.800754757@linuxfoundation.org> References: <20200901151000.800754757@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexey Kardashevskiy [ Upstream commit f0993c839e95dd6c7f054a1015e693c87e33e4fb ] xive_native_provision_pages() allocates memory and passes the pointer to OPAL so kmemleak cannot find the pointer usage in the kernel memory and produces a false positive report (below) (even if the kernel did scan OPAL memory, it is unable to deal with __pa() addresses anyway). This silences the warning. unreferenced object 0xc000200350c40000 (size 65536): comm "qemu-system-ppc", pid 2725, jiffies 4294946414 (age 70776.530s) hex dump (first 32 bytes): 02 00 00 00 50 00 00 00 00 00 00 00 00 00 00 00 ....P........... 01 00 08 07 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000081ff046c>] xive_native_alloc_vp_block+0x120/0x250 [<00000000d555d524>] kvmppc_xive_compute_vp_id+0x248/0x350 [kvm] [<00000000d69b9c9f>] kvmppc_xive_connect_vcpu+0xc0/0x520 [kvm] [<000000006acbc81c>] kvm_arch_vcpu_ioctl+0x308/0x580 [kvm] [<0000000089c69580>] kvm_vcpu_ioctl+0x19c/0xae0 [kvm] [<00000000902ae91e>] ksys_ioctl+0x184/0x1b0 [<00000000f3e68bd7>] sys_ioctl+0x48/0xb0 [<0000000001b2c127>] system_call_exception+0x124/0x1f0 [<00000000d2b2ee40>] system_call_common+0xe8/0x214 Signed-off-by: Alexey Kardashevskiy Signed-off-by: Michael Ellerman Link: https://lore.kernel.org/r/20200612043303.84894-1-aik@ozlabs.ru Signed-off-by: Sasha Levin --- arch/powerpc/sysdev/xive/native.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/powerpc/sysdev/xive/native.c b/arch/powerpc/sysdev/xive/native.c index 71b881e554fcb..cb58ec7ce77ac 100644 --- a/arch/powerpc/sysdev/xive/native.c +++ b/arch/powerpc/sysdev/xive/native.c @@ -18,6 +18,7 @@ #include #include #include +#include #include #include @@ -647,6 +648,7 @@ static bool xive_native_provision_pages(void) pr_err("Failed to allocate provisioning page\n"); return false; } + kmemleak_ignore(p); opal_xive_donate_page(chip, __pa(p)); } return true; -- 2.25.1