Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp102025rwb; Tue, 6 Dec 2022 17:59:06 -0800 (PST) X-Google-Smtp-Source: AA0mqf4gVWIDIkNQd8z5A8Q/qsRUcD3sNPEHaIw7Dt2efFVX6N+n279uNRFCfFwRMvzbFSf3y+/Q X-Received: by 2002:a17:907:770b:b0:7c1:277:caf3 with SMTP id kw11-20020a170907770b00b007c10277caf3mr6616990ejc.247.1670378345940; Tue, 06 Dec 2022 17:59:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670378345; cv=none; d=google.com; s=arc-20160816; b=IZ6P7zIk2/h+kQw0uvAJCyH5niamDDwJb8exwqvkQRG7/XvufV9paDxJDNbQv+vi21 p2f3glvpEmvF4fPctwBmwoPyQ3ibltPtAkUGR4n1v3SDcCsWBysS2zGl1kiMTFUFdZ8k Q1aHTaYD/kLDwGHxtNjlvAUnq1RP4inygMxA4Yr26IoNzUPT7F9myp9E8WCI7BcMiGLR yKTuuDVVYsX3yI6Sg51L2ztTS7hOuqzhAebaaiWJDxndtb+7yKwJFWlclWHw3dJ4McQo t0dvjlnxc4tzOUm2XkvhdwSUFtdVvr5V5yxMDBtu2+zmCNtp+EmJWGDDdLnosUCdK9bK SO9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=sNN2438tPQubDzu+ae8//KwLHcqi7zCFedx2rp7V6hQ=; b=oP26K+xA3+uimnooWcS0F2uUp580s9zxs0ym+zQmabaoGXJ1tWOhCb9IwP9wdERHxI pHrty2Jz1yfPWvLXZobgyvYAtmWxucRTqe8uOE1YdDez5wbBrjnkkVNO/RiUo99DUb5Z QPyRZDqHkJciT5gFzdy1XoLBXM16zOvZ3jYyw0Jnu7oPBO09zEnABNiFHjihzuDWrk56 b2Pao2bYuIM0ib6cpfpjOZDN32oO9i1vy8+ZnXuDznJrP1ce1S4EMulS8GYAr0FrfdRL 9Zxyayyy0nSrKmjWOeN4JskQWww7v8z47URynwOwKlLEVzZAs1kpF00X42UMO2TIDUV6 Oj+A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ca15-20020aa7cd6f000000b00463b0df4604si2875653edb.488.2022.12.06.17.58.47; Tue, 06 Dec 2022 17:59:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229877AbiLGBZc (ORCPT + 77 others); Tue, 6 Dec 2022 20:25:32 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45304 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229868AbiLGBZb (ORCPT ); Tue, 6 Dec 2022 20:25:31 -0500 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D89CA51C26 for ; Tue, 6 Dec 2022 17:25:29 -0800 (PST) Received: from kwepemm600010.china.huawei.com (unknown [172.30.72.54]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4NRfhk3wPKzmWK8; Wed, 7 Dec 2022 09:24:38 +0800 (CST) Received: from [10.67.110.237] (10.67.110.237) by kwepemm600010.china.huawei.com (7.193.23.86) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Wed, 7 Dec 2022 09:25:27 +0800 Subject: Re: [PATCH 1/2] RISC-V: kexec: Fix memory leak of fdt buffer To: Palmer Dabbelt , , , , , Paul Walmsley , , Palmer Dabbelt CC: , , References: <20221104095658.141222-1-lihuafei1@huawei.com> <167027930833.25586.2671834159281320615.b4-ty@rivosinc.com> From: Li Huafei Message-ID: <75925d58-ee92-e0f0-d1df-d8bd1d3fcfe3@huawei.com> Date: Wed, 7 Dec 2022 09:25:26 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.9.0 MIME-Version: 1.0 In-Reply-To: <167027930833.25586.2671834159281320615.b4-ty@rivosinc.com> Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.67.110.237] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To kwepemm600010.china.huawei.com (7.193.23.86) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.5 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022/12/6 6:28, Palmer Dabbelt wrote: > On Fri, 4 Nov 2022 17:56:57 +0800, Li Huafei wrote: >> This is reported by kmemleak detector: >> >> unreferenced object 0xff60000082864000 (size 9588): >> comm "kexec", pid 146, jiffies 4294900634 (age 64.788s) >> hex dump (first 32 bytes): >> d0 0d fe ed 00 00 12 ed 00 00 00 48 00 00 11 40 ...........H...@ >> 00 00 00 28 00 00 00 11 00 00 00 02 00 00 00 00 ...(............ >> backtrace: >> [<00000000f95b17c4>] kmemleak_alloc+0x34/0x3e >> [<00000000b9ec8e3e>] kmalloc_order+0x9c/0xc4 >> [<00000000a95cf02e>] kmalloc_order_trace+0x34/0xb6 >> [<00000000f01e68b4>] __kmalloc+0x5c2/0x62a >> [<000000002bd497b2>] kvmalloc_node+0x66/0xd6 >> [<00000000906542fa>] of_kexec_alloc_and_setup_fdt+0xa6/0x6ea >> [<00000000e1166bde>] elf_kexec_load+0x206/0x4ec >> [<0000000036548e09>] kexec_image_load_default+0x40/0x4c >> [<0000000079fbe1b4>] sys_kexec_file_load+0x1c4/0x322 >> [<0000000040c62c03>] ret_from_syscall+0x0/0x2 >> >> [...] > > Applied, thanks! > > [1/2] RISC-V: kexec: Fix memory leak of fdt buffer > https://git.kernel.org/palmer/c/96df59b1ae23 > [2/2] RISC-V: kexec: Fix memory leak of elf header buffer > https://git.kernel.org/palmer/c/cbc32023ddbd > > These are on for-next. They'd probably be fine fixes candidates had I gotten > to them in time, but it's pretty late and a leak during kexec doesn't seem like > a show-stopper. They'll get backported anyway, but this way they get an extra > week in linux-next just to see. > I have no problem with it being merged into the -next branch. Thanks Palmer! > Best regards, >