Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp4879598ioo; Tue, 31 May 2022 13:55:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy/IUwxf14JdMHq0pTsHHoGX0xpxQ7mHkYKyw8VkDEk4lP4H1GWG+D2hlR/uSlN7T36nq6A X-Received: by 2002:a05:6402:2410:b0:42d:a513:5536 with SMTP id t16-20020a056402241000b0042da5135536mr20615166eda.395.1654030504990; Tue, 31 May 2022 13:55:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654030504; cv=none; d=google.com; s=arc-20160816; b=H+znoQdWMAcj+o7rp3vBsXxTqgFAHxJNP0aaTzbzrhwTlwi0DYtyAgC5qXYDOwCW4f 5X6zJLIY0NVYqU8m3o+vN5kjq6z3q8oR1+dcBz8vMMoKcVYQpfUIx2i26ip+M2M3Lr9U FnZ2v0MYVSkBq8WE7iwMenUOigbLeFIsNjXoh2Pp/QNahuK7v5YWz3CSfUb+iLDEixXw AmRS7kaIu8fxO0f4DNlyGenehpoQBYmQu2x2N+moxXE9L4HWkzCNYuB6rWFR4HposZcx k+Y6kISmBQeGKT9wClT4opMqkcgg5P0rpMc2xwLwJ1SqMFfBgoXwU5CH9a0UHZtTxaqW P6Eg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=K3pN88jXH1vfrmHxeSExlscdSifdbbGoFMeN+ga79lE=; b=G7Tkv4PTw5a7drMuq3zXzkCiwc4+GaT/FV+ZUdrO6B8rYPDi+HBbGFXEC+HWMFCzpd 2V0R3i5JSn8CHLdNafd8QlUQq2ntH76AIaelTTQWCykBlTucr03hwrvT/mp7RLRX0VXd A7dMFm1Y6R3ZXpWbGKnJcwEG+nQsjQJ0oo4iueO/vGQ9e3kFdaxONzrhzvKbcshG31vD stPiD7MuuDqa3dLdbDJQHztVMHe4g2q0KYbY1GoO19d/ehpyAIQFqu0XlBz3KXsu/vV7 8+cJ2NYH3sDGHI/cf/9etRLEgUDIJ1sf9yMTagZ5dTghwYgmAW0dvhBQi304lGZlQpr0 4j9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=u8LXi8Tr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id dn4-20020a17090794c400b006fecede9498si3954120ejc.556.2022.05.31.13.54.29; Tue, 31 May 2022 13:55:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=u8LXi8Tr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346277AbiEaRCI (ORCPT + 99 others); Tue, 31 May 2022 13:02:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48440 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243327AbiEaRCH (ORCPT ); Tue, 31 May 2022 13:02:07 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B658A11A28 for ; Tue, 31 May 2022 10:02:05 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 6EFD8B810F5 for ; Tue, 31 May 2022 17:02:04 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6FB68C385A9; Tue, 31 May 2022 17:02:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1654016523; bh=djguEZZRDPP3prGCOje7q6bgq4eAd52mgC9VJE+UvZo=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=u8LXi8TrTLqG5iEZu55P2t2fyZ7OD8tsnQ5PXBbTHF/LgZ7Gi/yTmdTg35xoBS1iF kPWVMEi0YCNM3eiemsEVp4EWCKCcBMPir39ZJGsRQAiXvhi47LZTtJIz5CnwwL+BCC itAMIVSohp4iS+gL8uhbPTelu0YU8Tmf5gErzxEd7PqW/ikfvH/Nd1XUPACMS3Imf9 KytTjEIc588n91CXJVh98FTVqVQQZ2/k/hHrC/O9VTR0YgOVWOc6xBnSEYwTmVv49V L3TY/sY3bxouJIpPcwL6yYLVMiIsCRS3RfMNniPc4lETv9a6GNBVMmERdniNJycG7o FnXOpjXSYq6BQ== Date: Tue, 31 May 2022 18:01:58 +0100 From: Will Deacon To: Qian Cai Cc: Marc Zyngier , James Morse , Alexandru Elisei , Suzuki K Poulose , Catalin Marinas , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, linux-kernel@vger.kernel.org Subject: Re: [PATCH] KVM: arm64: Fix memory leaks from stage2 pagetable Message-ID: <20220531170157.GC25631@willie-the-truck> References: <20220526203956.143873-1-quic_qiancai@quicinc.com> <20220531165710.GB25631@willie-the-truck> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220531165710.GB25631@willie-the-truck> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 31, 2022 at 05:57:11PM +0100, Will Deacon wrote: > On Thu, May 26, 2022 at 04:39:56PM -0400, Qian Cai wrote: > > Running some SR-IOV workloads could trigger some leak reports from > > kmemleak. > > > > unreferenced object 0xffff080243cef500 (size 128): > > comm "qemu-system-aar", pid 179935, jiffies 4298359506 (age 1629.732s) > > hex dump (first 32 bytes): > > 28 00 00 00 01 00 00 00 00 e0 4c 52 03 08 ff ff (.........LR.... > > e0 af a4 7f 7c d1 ff ff a8 3c b3 08 00 80 ff ff ....|....<...... > > backtrace: > > kmem_cache_alloc_trace > > kvm_init_stage2_mmu > > Hmm, I can't spot a 128-byte allocation in here so this is pretty cryptic. > I don't really like the idea of papering over the report; we'd be better off > trying to reproduce it. ... although the hexdump does look like {u32; u32; ptr; ptr; ptr}, which would match 'struct kvm_pgtable'. I guess the allocation is aligned to ARCH_DMA_MINALIGN, which could explain the size? Have you spotted any pattern for when the leak occurs? How are you terminating the guest? Will