Received: by 2002:a05:7412:e794:b0:fa:551:50a7 with SMTP id o20csp2370686rdd; Fri, 12 Jan 2024 07:31:26 -0800 (PST) X-Google-Smtp-Source: AGHT+IGql0tyPEnmdVdEw52hHjXC5XArPa3gYXJ/xatJkV8JUloLJQfl3zHWxIClNKUCKTGDjHW+ X-Received: by 2002:a05:6359:5e26:b0:174:d511:632d with SMTP id pw38-20020a0563595e2600b00174d511632dmr1410928rwb.52.1705073485529; Fri, 12 Jan 2024 07:31:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1705073485; cv=none; d=google.com; s=arc-20160816; b=F3mqf5cnHPoE6fnTku2fqxqVGH6eUFHjjhhisr3emP5d0SPaklktRCdc6nCeOOHWxN GD18Pd/dOY6jKns0S2LURyaSY0pQB+q49zuL/0vYU54Hw8/VJf8ESPQPsbXXRCjJS7mR 4b8ZZFpogYjoQjos5tzW1uG2xS0E+xT9qt0Yy2TIQqdDJDoJ/aGzxygb6OA38G2pHHWY osyU8/SiXsL4I23HBI++4qqE/drCINX/KXZDQqyhjC9n/owZ/VnSNa3sTS0rpc2XuCu/ gRG93ct4eiE9oqvVPUvrUmWj27aP7PhFHP0RSSj7RgD6BZGm23y4xTwXzw4PvyubqoCi I+HA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:feedback-id:dkim-signature; bh=ZhpXUyqtXqqOuV7cHzzwsDe+dNf2DevUdK02WPndxl4=; fh=ASkitx3QkTw8sA54fi/+nsgQH1alif9yDmZVnumb0P8=; b=P5Cf3HviK5sWeKjmhRyTL8kHChNZlzbGpVt60HLtUXsd22dE7JUffVCpOOsLiroevG vmagMZJqqhFOJE9Sw0p3KxqzEJ/QyNVjF0qHrgp78NBXh7bauKxJG06288eoAlWOhYKL nr5GE2+8lhR06Zk/29M8C//OkO+O2Ne0obtIEUgWgCTYJcZN+3o/slR4uxnBC9Y5s3MD vDp8We/zAvM9EwAEm3qxw1UGOmyCKnjXnmT4TO+WqrFMb/Dt+YOYwvoT0xotLvexxc97 ikW9h7wXvPECiHMB6OhASRpiTqAmYZDPvcLFiVQ5SOIwo7arVBth9wT5OkurCRiJkc3e KIJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=ftbXLT06; spf=pass (google.com: domain of linux-kernel+bounces-24800-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-24800-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id jc19-20020a056a006c9300b006d9b36931b5si3534885pfb.285.2024.01.12.07.31.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 12 Jan 2024 07:31:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-24800-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=ftbXLT06; spf=pass (google.com: domain of linux-kernel+bounces-24800-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-24800-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 981A5286481 for ; Fri, 12 Jan 2024 15:31:24 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id AFE1C6EB5C; Fri, 12 Jan 2024 15:31:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=messagingengine.com header.i=@messagingengine.com header.b="ftbXLT06" Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 84B4B6EB50 for ; Fri, 12 Jan 2024 15:31:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=idosch.org Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=idosch.org Received: from compute6.internal (compute6.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id 3F5715C018D; Fri, 12 Jan 2024 10:31:15 -0500 (EST) Received: from mailfrontend1 ([10.202.2.162]) by compute6.internal (MEProxy); Fri, 12 Jan 2024 10:31:15 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-type:content-type:date:date :feedback-id:feedback-id:from:from:in-reply-to:in-reply-to :message-id:mime-version:references:reply-to:subject:subject:to :to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm2; t=1705073475; x=1705159875; bh=ZhpXUyqtXqqOuV7cHzzwsDe+dNf2 DevUdK02WPndxl4=; b=ftbXLT06+QrUk2I79xF+R9gJMtElPIs0d158WM7JuOq7 EK7cWJYR0cItZn/yzg9sL74hkcLW7Zu+3Er+xQL38mxFrgNcGwj3MA8u5inkPMtw d6sxJEZ6SBeEY/MdTtwNIFfwYJl0Lal+JvhXJM5fU7Dc1JPTTpU+Al4XUHIpeZJQ OZ7LtfLi1TZlQp5lUeDT4RqlGbknjo5wGxqWTcpQT1HV+nV5Vse+OK9BAPG8ooR3 RrbESSgigv5ENZgJ3JxCwvGoXU7dmMPavZ0avTJEKl56wZS+B6G2aHNMK6dZ0L4C 6+Wflx9bHtygvFCXZWIyW2YJKBTb26QHnpb/o93lIA== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvkedrvdeihedgjeeiucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne cujfgurhepfffhvfevuffkfhggtggujgesthdtredttddtvdenucfhrhhomhepkfguohcu ufgthhhimhhmvghluceoihguohhstghhsehiughoshgthhdrohhrgheqnecuggftrfgrth htvghrnhepvddufeevkeehueegfedtvdevfefgudeifeduieefgfelkeehgeelgeejjeeg gefhnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomhepih guohhstghhsehiughoshgthhdrohhrgh X-ME-Proxy: Feedback-ID: i494840e7:Fastmail Received: by mail.messagingengine.com (Postfix) with ESMTPA; Fri, 12 Jan 2024 10:31:13 -0500 (EST) Date: Fri, 12 Jan 2024 17:31:10 +0200 From: Ido Schimmel To: Catalin Marinas Cc: Robin Murphy , joro@8bytes.org, will@kernel.org, iommu@lists.linux.dev, linux-kernel@vger.kernel.org, zhangzekun11@huawei.com, john.g.garry@oracle.com, dheerajkumar.srivastava@amd.com, jsnitsel@redhat.com Subject: Re: [PATCH v3 0/2] iommu/iova: Make the rcache depot properly flexible Message-ID: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Thu, Jan 11, 2024 at 10:13:01AM +0000, Catalin Marinas wrote: > On Thu, Jan 11, 2024 at 10:20:27AM +0200, Ido Schimmel wrote: > > On Wed, Jan 10, 2024 at 05:58:15PM +0000, Catalin Marinas wrote: > > > Transient false positives are possible, especially as the code doesn't > > > use a double-linked list (for the latter, kmemleak does checksumming and > > > detects the prev/next change, defers the reporting until the object > > > becomes stable). That said, if a new scan is forced (echo scan > > > > /sys/kernel/debug/kmemleak), are the same objects still listed as leaks? > > > If yes, they may not be transient. > > > > We are doing "scan" and "clear" after each test. I will disable the > > "clear" and see if the leaks persist. > > If it is indeed a false positive Looks like the leaks are transient. After removing the "clear" step the leaks do not seem to persist. > you can try the patch below (I haven't given it any run-time test, > only compiled): Will try and let you know next week. Thanks