linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: Anton Altaparmakov <anton@tuxera.com>
To: Ingo Molnar <mingo@kernel.org>
Cc: Dave Hansen <dave.hansen@intel.com>,
	"Rafael J . Wysocki" <rafael@kernel.org>,
	Pavel Machek <pavel@ucw.cz>, Thomas Gleixner <tglx@linutronix.de>,
	Ingo Molnar <mingo@redhat.com>, Borislav Petkov <bp@alien8.de>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	"x86@kernel.org" <x86@kernel.org>,
	"H . Peter Anvin" <hpa@zytor.com>, Chen Yu <yu.c.chen@intel.com>,
	Pawan Gupta <pawan.kumar.gupta@linux.intel.com>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Linux Memory Management <linux-mm@kvack.org>,
	"Rafael J . Wysocki" <rafael.j.wysocki@intel.com>,
	"linux-pm@vger.kernel.org" <linux-pm@vger.kernel.org>,
	Linux Kernel <linux-kernel@vger.kernel.org>,
	"stable@vger.kernel.org" <stable@vger.kernel.org>
Subject: Re: [PATCH] x86/pm: Fix false positive kmemleak report in msr_build_context().
Date: Fri, 22 Mar 2024 10:12:36 +0000	[thread overview]
Message-ID: <1386E50F-7383-4666-A7DC-7AFE8D755C19@tuxera.com> (raw)
In-Reply-To: <Zf1XVPicqdJ3VBcl@gmail.com>

[-- Attachment #1: Type: text/plain, Size: 3000 bytes --]

Hi Ingo,

On 22 Mar 2024, at 10:03, Ingo Molnar <mingo@kernel.org> wrote:
* Anton Altaparmakov <anton@tuxera.com<mailto:anton@tuxera.com>> wrote:
Hi Dave,
On 14 Mar 2024, at 15:05, Dave Hansen <dave.hansen@intel.com> wrote:
On 3/14/24 07:26, Anton Altaparmakov wrote:
/* image of the saved processor state */
struct saved_context {
- /*
- * On x86_32, all segment registers except gs are saved at kernel
- * entry in pt_regs.
- */
- u16 gs;
unsigned long cr0, cr2, cr3, cr4;
u64 misc_enable;
struct saved_msrs saved_msrs;
@@ -27,6 +22,11 @@ struct saved_context {
unsigned long tr;
unsigned long safety;
unsigned long return_address;
+ /*
+ * On x86_32, all segment registers except gs are saved at kernel
+ * entry in pt_regs.
+ */
+ u16 gs;
bool misc_enable_saved;
} __attribute__((packed));

Isn't this just kinda poking at the symptoms?  This seems to be
basically the exact same bug as b0b592cf08, just with a different source
of unaligned structure members.

Yes, that is exactly the same bug.  That's how we figured out the solution in fact - it is totally the same problem with another struct member...

There's nothing to keep folks from reintroducing these kinds of issues
and evidently no way to detect when they happen without lengthy reproducers.

Correct.  But short of adding asserts / documentation that pointers must be aligned or kmemleak won't work or fixing kmemleak (which I expect is not tractical as it would become a lot slower if nothing else) not sure what else can be done.

Given I cannot see any alternative to fixing the kmemleak failures I think it is worth applying this fix.

Unless you have better ideas how to fix this issue?

What I can say is that we run a lot of tests with our CI and applying
this fix we do not see any kmemleak issues any more whilst without it we
see hundreds of the above - from a single, simple test run consisting of
416 individual test cases on kernel 5.10 x86 with kmemleak enabled we got
20 failures due to this which is quite a lot.  With this fix applied we
get zero kmemleak related failures.

I turned this tidbit into the following paragraph in the commit:

   Testing:

   We run a lot of tests with our CI, and after applying this fix we do not
   see any kmemleak issues any more whilst without it we see hundreds of
   the above report. From a single, simple test run consisting of 416 individual test
   cases on kernel 5.10 x86 with kmemleak enabled we got 20 failures due to this,
   which is quite a lot. With this fix applied we get zero kmemleak related failures.

Describing the impact of a fix in a changelog is always helpful.

That's a good idea, thank you!  Also, thank you for taking the patch.  Always nice not to have to maintain too many custom kernel patches!

Best regards,

Anton


Thanks,

Ingo

--
Anton Altaparmakov <anton at tuxera.com> (replace at with @)
Lead in File System Development, Tuxera Inc., http://www.tuxera.com/


[-- Attachment #2: Type: text/html, Size: 15445 bytes --]

  reply	other threads:[~2024-03-22 10:12 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-03-14 14:26 Anton Altaparmakov
2024-03-14 15:05 ` Dave Hansen
2024-03-14 15:45   ` Anton Altaparmakov
2024-03-22 10:03     ` Ingo Molnar
2024-03-22 10:12       ` Anton Altaparmakov [this message]
2024-03-22 10:13       ` Anton Altaparmakov
2024-03-14 15:55   ` Rafael J. Wysocki
2024-03-22  9:58     ` Ingo Molnar

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1386E50F-7383-4666-A7DC-7AFE8D755C19@tuxera.com \
    --to=anton@tuxera.com \
    --cc=bp@alien8.de \
    --cc=catalin.marinas@arm.com \
    --cc=dave.hansen@intel.com \
    --cc=dave.hansen@linux.intel.com \
    --cc=hpa@zytor.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=linux-pm@vger.kernel.org \
    --cc=mingo@kernel.org \
    --cc=mingo@redhat.com \
    --cc=pavel@ucw.cz \
    --cc=pawan.kumar.gupta@linux.intel.com \
    --cc=rafael.j.wysocki@intel.com \
    --cc=rafael@kernel.org \
    --cc=stable@vger.kernel.org \
    --cc=tglx@linutronix.de \
    --cc=x86@kernel.org \
    --cc=yu.c.chen@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox