Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp111117rwb; Tue, 6 Dec 2022 18:06:04 -0800 (PST) X-Google-Smtp-Source: AA0mqf5V+/dlyBwqXo313HxCqzRjrH2kPuauE/9p5TOraDKpbcesWeGUJ4JpqmVlbyldtbARfK0I X-Received: by 2002:a05:6402:28c9:b0:469:ba7c:bc75 with SMTP id ef9-20020a05640228c900b00469ba7cbc75mr5917980edb.286.1670378764154; Tue, 06 Dec 2022 18:06:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670378764; cv=none; d=google.com; s=arc-20160816; b=mC+Wnw0onb/iRJeSHIP0XbCxZqmT4RMGH8zDy6vNpPHR58nZMWR7O1WZJXhp5C1Zoq NZcVDliEl6gYyvdjlMpR89wR6M7frVzAA6mqC++qTVntrDTVs+g9pGXxYgHhe65SRjwj 5ue4aTIsuAuegZzeRxqOB3Q9yb1lbRNREbz/2BlMC+UNOkB9kM9ZeDcZ7K5tlYbYu+11 cUzW0YULev8wP++AmqJCH2QJvZkJ1IKP1Pw9ldERUUbVPi9L9qCV0oCueltrNPc2KdbS QmxmJRnaDdWgyWZeIH27Ct9ju/73ltfuI3nlu5agL/f5OAzPP//30hG6uqwMSn/E0EuK Xe3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=sNN2438tPQubDzu+ae8//KwLHcqi7zCFedx2rp7V6hQ=; b=USpzHqhriwiNj48waIOoMwGWvDrgbYBnGg4x6GEg/nz1oHwznNSWKc6N8PcXzIJ3XT EN55MimRFVPoD5gnsSLxOxFstxRREjiXcl29wS+P8BgaB2UFqAedfgJJrm3iYwHyxKK2 Y28h4oPGVE8jz+h507AxkIfmjXFX+iCXd/LfLAXZK+637aHToqZF9OyoyXzQ/wNy2nF8 t2entZy80rY1m6YZqGPdIy1Iuz4ueWjGe/k/JjwqkcmS7Fk80PBBXpecUDdP8YD9YHAD LL+qEn36oqQA65yQGcO5ZvbN8NYQRfZ4nP9ZQloMdTKA8kLvQzV8v9nAGLMYGtJ4Gaug j+/Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ne3-20020a1709077b8300b007c0c1cd86cfsi11788233ejc.36.2022.12.06.18.05.45; Tue, 06 Dec 2022 18:06:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229774AbiLGBZS (ORCPT + 77 others); Tue, 6 Dec 2022 20:25:18 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45054 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229475AbiLGBZR (ORCPT ); Tue, 6 Dec 2022 20:25:17 -0500 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B6AAF51C18 for ; Tue, 6 Dec 2022 17:25:16 -0800 (PST) Received: from kwepemm600010.china.huawei.com (unknown [172.30.72.53]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4NRfhS69xNzRpRj; Wed, 7 Dec 2022 09:24:24 +0800 (CST) Received: from [10.67.110.237] (10.67.110.237) by kwepemm600010.china.huawei.com (7.193.23.86) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Wed, 7 Dec 2022 09:25:14 +0800 Subject: Re: [PATCH 1/2] RISC-V: kexec: Fix memory leak of fdt buffer To: Palmer Dabbelt , , , , , Paul Walmsley , , Palmer Dabbelt CC: , , References: <20221104095658.141222-1-lihuafei1@huawei.com> <167027930833.25586.2671834159281320615.b4-ty@rivosinc.com> From: Li Huafei Message-ID: Date: Wed, 7 Dec 2022 09:24:56 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.9.0 MIME-Version: 1.0 In-Reply-To: <167027930833.25586.2671834159281320615.b4-ty@rivosinc.com> Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.67.110.237] X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To kwepemm600010.china.huawei.com (7.193.23.86) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.5 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022/12/6 6:28, Palmer Dabbelt wrote: > On Fri, 4 Nov 2022 17:56:57 +0800, Li Huafei wrote: >> This is reported by kmemleak detector: >> >> unreferenced object 0xff60000082864000 (size 9588): >> comm "kexec", pid 146, jiffies 4294900634 (age 64.788s) >> hex dump (first 32 bytes): >> d0 0d fe ed 00 00 12 ed 00 00 00 48 00 00 11 40 ...........H...@ >> 00 00 00 28 00 00 00 11 00 00 00 02 00 00 00 00 ...(............ >> backtrace: >> [<00000000f95b17c4>] kmemleak_alloc+0x34/0x3e >> [<00000000b9ec8e3e>] kmalloc_order+0x9c/0xc4 >> [<00000000a95cf02e>] kmalloc_order_trace+0x34/0xb6 >> [<00000000f01e68b4>] __kmalloc+0x5c2/0x62a >> [<000000002bd497b2>] kvmalloc_node+0x66/0xd6 >> [<00000000906542fa>] of_kexec_alloc_and_setup_fdt+0xa6/0x6ea >> [<00000000e1166bde>] elf_kexec_load+0x206/0x4ec >> [<0000000036548e09>] kexec_image_load_default+0x40/0x4c >> [<0000000079fbe1b4>] sys_kexec_file_load+0x1c4/0x322 >> [<0000000040c62c03>] ret_from_syscall+0x0/0x2 >> >> [...] > > Applied, thanks! > > [1/2] RISC-V: kexec: Fix memory leak of fdt buffer > https://git.kernel.org/palmer/c/96df59b1ae23 > [2/2] RISC-V: kexec: Fix memory leak of elf header buffer > https://git.kernel.org/palmer/c/cbc32023ddbd > > These are on for-next. They'd probably be fine fixes candidates had I gotten > to them in time, but it's pretty late and a leak during kexec doesn't seem like > a show-stopper. They'll get backported anyway, but this way they get an extra > week in linux-next just to see. > I have no problem with it being merged into the -next branch. Thanks Palmer! > Best regards, >