From: Anton Altaparmakov <anton@tuxera.com>
To: Ingo Molnar <mingo@kernel.org>
Cc: Dave Hansen <dave.hansen@intel.com>,
"Rafael J . Wysocki" <rafael@kernel.org>,
Pavel Machek <pavel@ucw.cz>, Thomas Gleixner <tglx@linutronix.de>,
Ingo Molnar <mingo@redhat.com>, Borislav Petkov <bp@alien8.de>,
Dave Hansen <dave.hansen@linux.intel.com>,
"x86@kernel.org" <x86@kernel.org>,
"H . Peter Anvin" <hpa@zytor.com>, Chen Yu <yu.c.chen@intel.com>,
Pawan Gupta <pawan.kumar.gupta@linux.intel.com>,
Catalin Marinas <catalin.marinas@arm.com>,
Linux Memory Management <linux-mm@kvack.org>,
"Rafael J . Wysocki" <rafael.j.wysocki@intel.com>,
"linux-pm@vger.kernel.org" <linux-pm@vger.kernel.org>,
Linux Kernel <linux-kernel@vger.kernel.org>,
"stable@vger.kernel.org" <stable@vger.kernel.org>
Subject: Re: [PATCH] x86/pm: Fix false positive kmemleak report in msr_build_context().
Date: Fri, 22 Mar 2024 10:13:29 +0000 [thread overview]
Message-ID: <EA749B00-AD4C-461A-91E1-B471B79B733C@tuxera.com> (raw)
In-Reply-To: <Zf1XVPicqdJ3VBcl@gmail.com>
Hi Ingo,
> On 22 Mar 2024, at 10:03, Ingo Molnar <mingo@kernel.org> wrote:
> * Anton Altaparmakov <anton@tuxera.com> wrote:
>> Hi Dave,
>>> On 14 Mar 2024, at 15:05, Dave Hansen <dave.hansen@intel.com> wrote:
>>> On 3/14/24 07:26, Anton Altaparmakov wrote:
>>>> /* image of the saved processor state */
>>>> struct saved_context {
>>>> - /*
>>>> - * On x86_32, all segment registers except gs are saved at kernel
>>>> - * entry in pt_regs.
>>>> - */
>>>> - u16 gs;
>>>> unsigned long cr0, cr2, cr3, cr4;
>>>> u64 misc_enable;
>>>> struct saved_msrs saved_msrs;
>>>> @@ -27,6 +22,11 @@ struct saved_context {
>>>> unsigned long tr;
>>>> unsigned long safety;
>>>> unsigned long return_address;
>>>> + /*
>>>> + * On x86_32, all segment registers except gs are saved at kernel
>>>> + * entry in pt_regs.
>>>> + */
>>>> + u16 gs;
>>>> bool misc_enable_saved;
>>>> } __attribute__((packed));
>>>
>>> Isn't this just kinda poking at the symptoms? This seems to be
>>> basically the exact same bug as b0b592cf08, just with a different source
>>> of unaligned structure members.
>>
>> Yes, that is exactly the same bug. That's how we figured out the solution in fact - it is totally the same problem with another struct member...
>>
>>> There's nothing to keep folks from reintroducing these kinds of issues
>>> and evidently no way to detect when they happen without lengthy reproducers.
>>
>> Correct. But short of adding asserts / documentation that pointers must be aligned or kmemleak won't work or fixing kmemleak (which I expect is not tractical as it would become a lot slower if nothing else) not sure what else can be done.
>>
>> Given I cannot see any alternative to fixing the kmemleak failures I think it is worth applying this fix.
>>
>> Unless you have better ideas how to fix this issue?
>>
>> What I can say is that we run a lot of tests with our CI and applying
>> this fix we do not see any kmemleak issues any more whilst without it we
>> see hundreds of the above - from a single, simple test run consisting of
>> 416 individual test cases on kernel 5.10 x86 with kmemleak enabled we got
>> 20 failures due to this which is quite a lot. With this fix applied we
>> get zero kmemleak related failures.
>
> I turned this tidbit into the following paragraph in the commit:
>
> Testing:
>
> We run a lot of tests with our CI, and after applying this fix we do not
> see any kmemleak issues any more whilst without it we see hundreds of
> the above report. From a single, simple test run consisting of 416 individual test
> cases on kernel 5.10 x86 with kmemleak enabled we got 20 failures due to this,
> which is quite a lot. With this fix applied we get zero kmemleak related failures.
>
> Describing the impact of a fix in a changelog is always helpful.
That's a good idea, thank you! Also, thank you for taking the patch. Always nice not to have to maintain too many custom kernel patches!
Best regards,
Anton
>
> Thanks,
>
> Ingo
--
Anton Altaparmakov <anton at tuxera.com> (replace at with @)
Lead in File System Development, Tuxera Inc., http://www.tuxera.com/
next prev parent reply other threads:[~2024-03-22 10:13 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-03-14 14:26 Anton Altaparmakov
2024-03-14 15:05 ` Dave Hansen
2024-03-14 15:45 ` Anton Altaparmakov
2024-03-22 10:03 ` Ingo Molnar
2024-03-22 10:12 ` Anton Altaparmakov
2024-03-22 10:13 ` Anton Altaparmakov [this message]
2024-03-14 15:55 ` Rafael J. Wysocki
2024-03-22 9:58 ` Ingo Molnar
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=EA749B00-AD4C-461A-91E1-B471B79B733C@tuxera.com \
--to=anton@tuxera.com \
--cc=bp@alien8.de \
--cc=catalin.marinas@arm.com \
--cc=dave.hansen@intel.com \
--cc=dave.hansen@linux.intel.com \
--cc=hpa@zytor.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=linux-pm@vger.kernel.org \
--cc=mingo@kernel.org \
--cc=mingo@redhat.com \
--cc=pavel@ucw.cz \
--cc=pawan.kumar.gupta@linux.intel.com \
--cc=rafael.j.wysocki@intel.com \
--cc=rafael@kernel.org \
--cc=stable@vger.kernel.org \
--cc=tglx@linutronix.de \
--cc=x86@kernel.org \
--cc=yu.c.chen@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox