Received: by 2002:a05:7412:8d11:b0:fa:4934:9f with SMTP id bj17csp378264rdb; Sun, 14 Jan 2024 23:17:17 -0800 (PST) X-Google-Smtp-Source: AGHT+IGEFXzBsv2b5qe6/fJyc0Elb1D+B1nPYvE2XBW4C/II7efxtmW2JAddlG6UzjMW2fVdvG5c X-Received: by 2002:a17:902:7403:b0:1d5:8ce6:73 with SMTP id g3-20020a170902740300b001d58ce60073mr2518241pll.115.1705303036859; Sun, 14 Jan 2024 23:17:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1705303036; cv=none; d=google.com; s=arc-20160816; b=m8ObX7JXbT7o4nU+toskwOQKkKIClfVb2egST6t4WpLAt3ZED4bts4sXf41axoxCzJ 7Q/jKPDWsNZIA3l/WfsF9k1xzfzdBJgb3eYN2+48o8pKDhoox+ls1bgQALtH3IxAjnsw cucn7N2WQYp1Zwrxs2H/FyYeo/ntAGYuR3e9bwdhmpk2F0LPtFbLh0XR3SssQ2fkejUF Swz3IbBYzoLdDf5d5phZUDoaXpEV/Qk9IVwm6w4l77m9Thd9uYgu3rxuj7WoO5qpevm4 xpXNDUJAtKFSyjrten9NH5dCWS89kXU1Z+L6bLp+LxfrglYAH0lOkhdijqpsVU77vh2k MdBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:feedback-id:dkim-signature; bh=phMzmdFjOAKkAe7G8nrfpKSwAy4DgHYOvk+P0sJcsSc=; fh=ASkitx3QkTw8sA54fi/+nsgQH1alif9yDmZVnumb0P8=; b=YRfxpTD5phEkk1WoagaRXi4yHTjZY+E/uGIFWTONneU1pQctV7+M2INAwaYgYszQ/h 7hbzoF2zMryGTAUhFATiE9QCFs1vJlD8d2+JIXte8CHFOjamLRaeJLLetporo7njMcKn olaYQchPM1uhbOXFZ5wr19cSVTiY9j0Z3GkPFobrAZ5BIj3pxOLu03GN327S2XUM6SZU Ehx3E+JrzVl+lcKkJKxZHl+dBAA35+Mnc/JhNREqjo4P28cZQQ/aJy2dEWnJ61nd6r4i dVrKlfjbpfQc+QNXF2qUjGKOv4nVVCttAjqoZyIBOtpIwFUnXdjGq5G+qq7O5oH/7cur paUA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b="To/Qh4W4"; spf=pass (google.com: domain of linux-kernel+bounces-25674-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-25674-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id y16-20020a170902b49000b001d5ac213d30si5573870plr.552.2024.01.14.23.17.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 14 Jan 2024 23:17:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-25674-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b="To/Qh4W4"; spf=pass (google.com: domain of linux-kernel+bounces-25674-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-25674-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 858B62814D5 for ; Mon, 15 Jan 2024 07:17:16 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 6669F3D8E; Mon, 15 Jan 2024 07:17:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=messagingengine.com header.i=@messagingengine.com header.b="To/Qh4W4" Received: from wout1-smtp.messagingengine.com (wout1-smtp.messagingengine.com [64.147.123.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 75BB64401 for ; Mon, 15 Jan 2024 07:17:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=idosch.org Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=idosch.org Received: from compute2.internal (compute2.nyi.internal [10.202.2.46]) by mailout.west.internal (Postfix) with ESMTP id BC8EB3200A44; Mon, 15 Jan 2024 02:17:07 -0500 (EST) Received: from mailfrontend2 ([10.202.2.163]) by compute2.internal (MEProxy); Mon, 15 Jan 2024 02:17:08 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-type:content-type:date:date :feedback-id:feedback-id:from:from:in-reply-to:in-reply-to :message-id:mime-version:references:reply-to:subject:subject:to :to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm3; t=1705303027; x=1705389427; bh=phMzmdFjOAKkAe7G8nrfpKSwAy4D gHYOvk+P0sJcsSc=; b=To/Qh4W4hmr8MB7sDIHKrDXKYa/e1KA9x/mTaRwx72wo D+D3wqUPDeVShEL2JNk4pKm8wILHPcPWsyoXIZh1SIWAqupZrZKYt8speoW0ZuPG pmc/w87ox30gtBgi2es4wCEoe2dzrpBFyy5rbOtDu1D10mrieLghfs8n8ZBSusUj td6qR4IstkHuj7PV++56rHcC/VdLWfC16C48KQeRDY0xPpZuKcKAhbbVC49SHvjx f4xqWHhzy9bkINzZNRI3A/Zv8uhlH32oX67Mgez8+qjj7faApFNEByqo569g/CHx KIkcXpy8FMIifxVGq2R5bZ7JC7f00IRGqEaVr1BvgA== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvkedrvdejtddguddthecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmd enucfjughrpeffhffvvefukfhfgggtuggjsehttdertddttddvnecuhfhrohhmpefkugho ucfutghhihhmmhgvlhcuoehiughoshgthhesihguohhstghhrdhorhhgqeenucggtffrrg htthgvrhhnpedvudefveekheeugeeftddvveefgfduieefudeifefgleekheegleegjeej geeghfenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpe hiughoshgthhesihguohhstghhrdhorhhg X-ME-Proxy: Feedback-ID: i494840e7:Fastmail Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon, 15 Jan 2024 02:17:06 -0500 (EST) Date: Mon, 15 Jan 2024 09:17:04 +0200 From: Ido Schimmel To: Catalin Marinas Cc: Robin Murphy , joro@8bytes.org, will@kernel.org, iommu@lists.linux.dev, linux-kernel@vger.kernel.org, zhangzekun11@huawei.com, john.g.garry@oracle.com, dheerajkumar.srivastava@amd.com, jsnitsel@redhat.com Subject: Re: [PATCH v3 0/2] iommu/iova: Make the rcache depot properly flexible Message-ID: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Fri, Jan 12, 2024 at 05:31:15PM +0200, Ido Schimmel wrote: > On Thu, Jan 11, 2024 at 10:13:01AM +0000, Catalin Marinas wrote: > > On Thu, Jan 11, 2024 at 10:20:27AM +0200, Ido Schimmel wrote: > > > On Wed, Jan 10, 2024 at 05:58:15PM +0000, Catalin Marinas wrote: > > > > Transient false positives are possible, especially as the code doesn't > > > > use a double-linked list (for the latter, kmemleak does checksumming and > > > > detects the prev/next change, defers the reporting until the object > > > > becomes stable). That said, if a new scan is forced (echo scan > > > > > /sys/kernel/debug/kmemleak), are the same objects still listed as leaks? > > > > If yes, they may not be transient. > > > > > > We are doing "scan" and "clear" after each test. I will disable the > > > "clear" and see if the leaks persist. > > > > If it is indeed a false positive > > Looks like the leaks are transient. After removing the "clear" step the > leaks do not seem to persist. > > > you can try the patch below (I haven't given it any run-time test, > > only compiled): > > Will try and let you know next week. Looks good. Feel free to add: Tested-by: Ido Schimmel Thanks!