Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1893961pxk; Tue, 1 Sep 2020 10:11:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzGcsubgMJjV15nrjnozyY0aflwEK1VNwoeTi106taDoG6DeVHOFbGx2S174eJBwu5XznTX X-Received: by 2002:a17:906:2818:: with SMTP id r24mr2550570ejc.31.1598980310233; Tue, 01 Sep 2020 10:11:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598980310; cv=none; d=google.com; s=arc-20160816; b=GUhuw0sXLakrchHcojTsvOllN8cP95XqhDK3bn+m8GZgk4mSnnAVzFyn05aKtPDe2E 2cQgYvfyqMOI0Sxl3gxRTqJmlvgqMbs0FN836EFGn7Vtj9R9ay/EF4Y0/ICWQSodjedq /j7Tp46DI9BUi80vRpiBpdtFW5CtL7mN/hxoVvRTWB534m6DV1mNH+dKVacyD0FjVfgZ ZT3f+1QxurgcoIcR6mmmqeWrXpSyDR5Vihpd1M0r4983YCFje1AoufR0whJ+DfiJUYq9 A1ULcywNr0WsC+k11HcAI2MmGzIwnrX7A2SQqRsa1vAo4nbF7nf2XjWtriIwHPMDtNTI 55oQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=68rH37DLbbr9AtqWZAifA45lys1FnF7+1nbYLr1iPMk=; b=HX5xvM9zRuMHXdzUT8urosJ2/6OQ+hd9XHJj7l/sjUiSxzT0Gz5NS49QsGzRP9y/qh rYxsMgKapXGQmaghTUr/cwg5s5WbLtL5/putMzkoZs3S1791H2NVoY83gzllvzLWI4FS f09a5xiYPS4yOfN8dt3WNUKRkidSmja9BJyJONNYoEVxOOzw4++S1UPa1O0OkSJq1lid ls6e0xLUkjyoa96QnMWxvxA72Ni115mqMT48lzJvgS1znt20mv5j6rUlN41TZycoCDcH eLxbtYTzrt1yb27bjOBMoEaiPtxQkhE7YxUIBHX2YNftLkwLvFp7SE1AqlY4d4e6Ecof zIWQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="IbhwXq/C"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c1si730903edq.576.2020.09.01.10.11.26; Tue, 01 Sep 2020 10:11:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="IbhwXq/C"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729705AbgIARJN (ORCPT + 99 others); Tue, 1 Sep 2020 13:09:13 -0400 Received: from mail.kernel.org ([198.145.29.99]:35364 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729434AbgIAPRp (ORCPT ); Tue, 1 Sep 2020 11:17:45 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9B9042100A; Tue, 1 Sep 2020 15:17:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1598973465; bh=OQzbnqReLKWAXFeJ31Qs4pL4CU0pTPEUgjVmHQ7LnW0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IbhwXq/Cztc0UcbctIUsO2wMwFXsGT8OO35LvmcIWsENyBQghkSbCOl+z2ivUJZ6D L/ur0Zo4ZteKFitEJ8Of9BIITgH/bJdsujMUkdB4dGTRocrvuk+BxjvJkVHiHtTO/l FYR8fD5CZVZrDEdCB8JCXNbhRYIG+3MSS34DrKS8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexey Kardashevskiy , Michael Ellerman , Sasha Levin Subject: [PATCH 4.14 10/91] powerpc/xive: Ignore kmemleak false positives Date: Tue, 1 Sep 2020 17:09:44 +0200 Message-Id: <20200901150928.614636143@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200901150928.096174795@linuxfoundation.org> References: <20200901150928.096174795@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexey Kardashevskiy [ Upstream commit f0993c839e95dd6c7f054a1015e693c87e33e4fb ] xive_native_provision_pages() allocates memory and passes the pointer to OPAL so kmemleak cannot find the pointer usage in the kernel memory and produces a false positive report (below) (even if the kernel did scan OPAL memory, it is unable to deal with __pa() addresses anyway). This silences the warning. unreferenced object 0xc000200350c40000 (size 65536): comm "qemu-system-ppc", pid 2725, jiffies 4294946414 (age 70776.530s) hex dump (first 32 bytes): 02 00 00 00 50 00 00 00 00 00 00 00 00 00 00 00 ....P........... 01 00 08 07 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000081ff046c>] xive_native_alloc_vp_block+0x120/0x250 [<00000000d555d524>] kvmppc_xive_compute_vp_id+0x248/0x350 [kvm] [<00000000d69b9c9f>] kvmppc_xive_connect_vcpu+0xc0/0x520 [kvm] [<000000006acbc81c>] kvm_arch_vcpu_ioctl+0x308/0x580 [kvm] [<0000000089c69580>] kvm_vcpu_ioctl+0x19c/0xae0 [kvm] [<00000000902ae91e>] ksys_ioctl+0x184/0x1b0 [<00000000f3e68bd7>] sys_ioctl+0x48/0xb0 [<0000000001b2c127>] system_call_exception+0x124/0x1f0 [<00000000d2b2ee40>] system_call_common+0xe8/0x214 Signed-off-by: Alexey Kardashevskiy Signed-off-by: Michael Ellerman Link: https://lore.kernel.org/r/20200612043303.84894-1-aik@ozlabs.ru Signed-off-by: Sasha Levin --- arch/powerpc/sysdev/xive/native.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/powerpc/sysdev/xive/native.c b/arch/powerpc/sysdev/xive/native.c index 30cdcbfa1c04e..b0e96f4b728c1 100644 --- a/arch/powerpc/sysdev/xive/native.c +++ b/arch/powerpc/sysdev/xive/native.c @@ -22,6 +22,7 @@ #include #include #include +#include #include #include @@ -630,6 +631,7 @@ static bool xive_native_provision_pages(void) pr_err("Failed to allocate provisioning page\n"); return false; } + kmemleak_ignore(p); opal_xive_donate_page(chip, __pa(p)); } return true; -- 2.25.1