[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1210229802.23330.4.camel@minggr.sh.intel.com>
Date: Thu, 08 May 2008 14:56:42 +0800
From: Lin Ming <ming.m.lin@...el.com>
To: Vegard Nossum <vegard.nossum@...il.com>
Cc: Pekka Enberg <penberg@...helsinki.fi>,
Bob Moore <robert.moore@...el.com>,
Alexey Starikovskiy <astarikovskiy@...e.de>,
Len Brown <len.brown@...el.com>, linux-acpi@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: Re: ACPI: kmemcheck: Caught 16-bit read from freed memory
(f7c12ec6)
On Thu, 2008-05-08 at 08:31 +0200, Vegard Nossum wrote:
> (Reworked to bottom-post style)
>
> On Thu, May 8, 2008 at 8:12 AM, Lin Ming <ming.m.lin@...el.com> wrote:
> > > though it is unlikely that it will help you more than looking at the
> > > code (or the report) will do.
> > >
> > > > Thanks,
> > > > Lin Ming
> > > >
> > > > Signed-off-by: Lin Ming <ming.m.lin@...el.com>
> > > > ---
> > > > diff --git a/drivers/acpi/parser/psargs.c b/drivers/acpi/parser/psargs.c
> > > > index f1e8bf6..ef55d24 100644
> > > > --- a/drivers/acpi/parser/psargs.c
> > > > +++ b/drivers/acpi/parser/psargs.c
> > > > @@ -268,7 +268,7 @@ acpi_ps_get_next_namepath(struct acpi_walk_state
> > > > *walk_state,
> > >
> > > > */
> > > > if (ACPI_SUCCESS(status) &&
> > > > possible_method_call && (node->type == ACPI_TYPE_METHOD)) {
> > > > - if (walk_state->op->common.aml_opcode == AML_UNLOAD_OP) {
> > > > + if (walk_state->op && walk_state->op->common.aml_opcode ==
> > > > AML_UNLOAD_OP) {
> > > > /*
> > > > * acpi_ps_get_next_namestring has increased the AML pointer,
> > > > * so we need to restore the saved AML pointer for method call.
> > >
> > > Also, noticing your change, I can see why it makes no difference:
> > > Pekka already found that it is walk_state->op that has the value of
> > > 0xf7c12ec6 (e.g. the pointer being dereferenced), so the test will
> > > still succeed.
> > >
> > > On the other hand, I have discovered what seems to be a deficiency in
> > > kmemcheck (i.e. it might be my fault entirely), so it is possible that
> > > the warning is bogus. Will send an update shortly.
>
> Okay: The deficiency is that SLUB will use the first four bytes of
> each allocation to store the so-called freepointer; this means that
> these will always be marked "initialized" even though they might
> belong to an allocation that has been freed. This should NOT affect
> the genuineness of the warning, however note that an earlier error
> might have passed unnoticed. In other words, it doesn't lead to false
> positives.
>
> > On Thu, 2008-05-08 at 08:05 +0200, Vegard Nossum wrote:
> > > Hello,
> > >
> > > On Thu, May 8, 2008 at 7:35 AM, Lin Ming <ming.m.lin@...el.com> wrote:
> > > > Here comes a simple patch that fixes the warning in my machine.
> > > >
> > > > Vegard, would you please help to test it in your machine?
> > > >
> > >
> > > Thanks for the try, but unfortunately this does not solve the problem.
> >
> > It's strange.
> > In my machine, without this patch the warning shows up
> > With this patch applied the waring goes away
>
> Ah. That is strange indeed.
>
> > Would you please upload the acpidump file?
>
> Which file is this or how can I produce it? Please tell me the exact
> parameters to pass to the command line.
Please download acpidump util from
http://kernel.org/pub/linux/kernel/people/lenb/acpi/utils/pmtools-20071116.tar.bz2
Run "acpidump > acpidump.out" as root
Then upload acpidump.out to somewhere I can access
Lin Ming
>
> > > Please note that kmemcheck is an patch to the kernel; without it you
> > > will never see the warning. You can pull it from
> > > git://git.kernel.org/pub/scm/linux/kernel/git/vegard/kmemcheck.git current
> >
> > Yes, I pulled the kmemcheck tree.
> >
> > BTW, I like the kmemcheck patch, it's very useful :) Great work :)
> >
> > Lin Ming
>
> Ahh, great. You got it working! Thanks :-D
>
>
> Vegard
>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists