Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp6607264rwb; Mon, 5 Dec 2022 15:05:24 -0800 (PST) X-Google-Smtp-Source: AA0mqf59OqdS8F7cY0iCgkuzeLpLSMrmvPFavWeu0PaSv0E0nHY1g87rm1TcWPjG9CAPMMsmqIdy X-Received: by 2002:a62:3306:0:b0:56b:8181:fe3e with SMTP id z6-20020a623306000000b0056b8181fe3emr88494810pfz.57.1670281524443; Mon, 05 Dec 2022 15:05:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670281524; cv=none; d=google.com; s=arc-20160816; b=wfNhf9wf5aHHvbFzV0i0s9ZB7bYDkRchNkOahWNOs1NfKg+O6Fnh/HKBuEYH2i3QCu 6Pa55C/LH2p7w/BFXhnfgmxIgB++jKe0Va8CaGL4MwSK7veNy80bSOSYH1PmRDYn5Ufx VuKvwEyW3D6JlUaCOwQMRkeYRX34T4vqmGUAgnQhn3vxz6yjf4jf2YN2R/81ZqeDapKe SpR2IufbMtSYhvZvrS5mmGaW7/I60mUdNKhuA0nb7bpaLYOMZx6LLEjNMeEkHpOUNj8A SYB/+V0h+kM9K0C7jn4grIl+lR2+PflTAD4DHsmqErODnHcxnUd29Tuy+9mBQC4qPaPH 6VdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:in-reply-to:references:date:message-id :from:subject:content-transfer-encoding:mime-version:dkim-signature; bh=w6tbNZepDwP1zPIQid6S7G5TwGLEBsAKqpNG/8/qJ4c=; b=lJAzqNLOxiPstb5s5/PSM6Z1j2tVGM+pk6AWU/aXTErwFiO73au+umoPqDeklYdqHC yQ8U+XttpPewMKw0ybBH3E8XSeoenjxxbeN7XtRADqxjDVNvvGLu4exdNvZx0EuRBJCC 2uztp4A6EOrYKO3LM6pHp6CfPaz+0Y1+zg0RcwECCARsmWsdxzXttjydN+fCEeaV6BPB 8brMCzF9kcKuvd7kWUFh5Xgt3G0c3TDZhKq/IMiRpp6OIES5+zV4qKIdxAyx91VfLngn RAn+toqWEyJLRLC4uvDoT8PcaGpEfpgepE27cJz7Q/Bt5eB42oC4ztUdRd10fLkqqpm7 DEYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ULBvvhhR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z18-20020a170903019200b001867ea919bdsi16780841plg.25.2022.12.05.15.05.13; Mon, 05 Dec 2022 15:05:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ULBvvhhR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232156AbiLEWkV (ORCPT + 79 others); Mon, 5 Dec 2022 17:40:21 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37966 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230235AbiLEWkS (ORCPT ); Mon, 5 Dec 2022 17:40:18 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 260A9CCA for ; Mon, 5 Dec 2022 14:40:18 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id BE76CB81598 for ; Mon, 5 Dec 2022 22:40:16 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPS id 628D0C433D7; Mon, 5 Dec 2022 22:40:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1670280015; bh=GJt2tQnd1Xeds2lIE0ThsvUpUJvK+iSYvNujEq1ftUg=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=ULBvvhhRvzK9LCZR4X9G0JzAec6adclarvUv/8MLd/rjJzfztFmatqkSoyCgJRuGL SIi2UK/GRQW9t8WokcK0Wbd/p6AR/cWPn6gAJ/y/7DH3i/mgoJrCHkjRFzYxmKmB/w urjm3vyEWuL0YxU22XjqgwZ8BQwiq1LLYpB0BAj8JCNtD+BFmfnv0vxsBtBH3k1HIz f827gvGp4Ryr9gJcPyQCW1UTXJKG8feJj92SF3hbOXoKgJqyhKEVUa7oI7DaSEKDPS UZrryZGmvAdqq1qEpKzICkzKLZHie3ShizgtkK5hXETBgPIi2e3XdkbiekmcQtO78A pH653pZlFQXyQ== Received: from aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (localhost.localdomain [127.0.0.1]) by aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (Postfix) with ESMTP id 47B59C395E5; Mon, 5 Dec 2022 22:40:15 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH 1/2] RISC-V: kexec: Fix memory leak of fdt buffer From: patchwork-bot+linux-riscv@kernel.org Message-Id: <167028001528.27830.840137402099225328.git-patchwork-notify@kernel.org> Date: Mon, 05 Dec 2022 22:40:15 +0000 References: <20221104095658.141222-1-lihuafei1@huawei.com> In-Reply-To: <20221104095658.141222-1-lihuafei1@huawei.com> To: Li Huafei Cc: linux-riscv@lists.infradead.org, paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, lizhengyu3@huawei.com, liaochang1@huawei.com, u.kleine-koenig@pengutronix.de, rdunlap@infradead.org, linux-kernel@vger.kernel.org, kexec@lists.infradead.org X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello: This series was applied to riscv/linux.git (for-next) by Palmer Dabbelt : On Fri, 4 Nov 2022 17:56:57 +0800 you wrote: > This is reported by kmemleak detector: > > unreferenced object 0xff60000082864000 (size 9588): > comm "kexec", pid 146, jiffies 4294900634 (age 64.788s) > hex dump (first 32 bytes): > d0 0d fe ed 00 00 12 ed 00 00 00 48 00 00 11 40 ...........H...@ > 00 00 00 28 00 00 00 11 00 00 00 02 00 00 00 00 ...(............ > backtrace: > [<00000000f95b17c4>] kmemleak_alloc+0x34/0x3e > [<00000000b9ec8e3e>] kmalloc_order+0x9c/0xc4 > [<00000000a95cf02e>] kmalloc_order_trace+0x34/0xb6 > [<00000000f01e68b4>] __kmalloc+0x5c2/0x62a > [<000000002bd497b2>] kvmalloc_node+0x66/0xd6 > [<00000000906542fa>] of_kexec_alloc_and_setup_fdt+0xa6/0x6ea > [<00000000e1166bde>] elf_kexec_load+0x206/0x4ec > [<0000000036548e09>] kexec_image_load_default+0x40/0x4c > [<0000000079fbe1b4>] sys_kexec_file_load+0x1c4/0x322 > [<0000000040c62c03>] ret_from_syscall+0x0/0x2 > > [...] Here is the summary with links: - [1/2] RISC-V: kexec: Fix memory leak of fdt buffer https://git.kernel.org/riscv/c/96df59b1ae23 - [2/2] RISC-V: kexec: Fix memory leak of elf header buffer https://git.kernel.org/riscv/c/cbc32023ddbd You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html