lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Y2uGZL1ou+JGu2mh@zn.tnic>
Date:   Wed, 9 Nov 2022 11:52:20 +0100
From:   Borislav Petkov <bp@...en8.de>
To:     Ravi Bangoria <ravi.bangoria@....com>
Cc:     x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: AMD uncore kmemleak

Hey,

Peter said you liked this stuff so here it is. :-)

On one of my test boxes (Carrizo laptop - that's an Excavator core) I
see the below. It happens with 6.1-rc1.

I booted latest -rc4 + tip/master and it is gone so something has
changed in the meantime or this particular version doesn't fire...

Anyway, we thought you should know in case you want to dig deeper.

Thx.

cat /sys/kernel/debug/kmemleak
unreferenced object 0xffff888101a3d3a0 (size 32):
  comm "swapper/0", pid 1, jiffies 4294892455 (age 294.968s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000002f5fe849>] __kmalloc_node+0x5f/0x180
    [<00000000066a1fb1>] amd_uncore_cpu_up_prepare+0xc7/0x240
    [<000000005fa7fab5>] cpuhp_invoke_callback+0xf8/0x460
    [<00000000d4b0952e>] cpuhp_issue_call+0x118/0x190
    [<000000008cb1592a>] __cpuhp_setup_state_cpuslocked+0xee/0x2a0
    [<0000000007534fa6>] __cpuhp_setup_state+0x76/0x100
    [<00000000d8277f50>] amd_uncore_init+0x275/0x336
    [<000000004af336cd>] do_one_initcall+0x44/0x200
    [<0000000040cb5caf>] kernel_init_freeable+0x198/0x1e4
    [<000000008b0e9fae>] kernel_init+0x16/0x120
    [<00000000459bcaeb>] ret_from_fork+0x22/0x30
unreferenced object 0xffff888101a3d240 (size 32):
  comm "swapper/0", pid 1, jiffies 4294892455 (age 294.968s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000002f5fe849>] __kmalloc_node+0x5f/0x180
    [<00000000066a1fb1>] amd_uncore_cpu_up_prepare+0xc7/0x240
    [<000000005fa7fab5>] cpuhp_invoke_callback+0xf8/0x460
    [<00000000d4b0952e>] cpuhp_issue_call+0x118/0x190
    [<000000008cb1592a>] __cpuhp_setup_state_cpuslocked+0xee/0x2a0
    [<0000000007534fa6>] __cpuhp_setup_state+0x76/0x100
    [<00000000d8277f50>] amd_uncore_init+0x275/0x336
    [<000000004af336cd>] do_one_initcall+0x44/0x200
    [<0000000040cb5caf>] kernel_init_freeable+0x198/0x1e4
    [<000000008b0e9fae>] kernel_init+0x16/0x120
    [<00000000459bcaeb>] ret_from_fork+0x22/0x30
unreferenced object 0xffff888101a3d4a0 (size 32):
  comm "swapper/0", pid 1, jiffies 4294892455 (age 294.968s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000002f5fe849>] __kmalloc_node+0x5f/0x180
    [<00000000066a1fb1>] amd_uncore_cpu_up_prepare+0xc7/0x240
    [<000000005fa7fab5>] cpuhp_invoke_callback+0xf8/0x460
    [<00000000d4b0952e>] cpuhp_issue_call+0x118/0x190
    [<000000008cb1592a>] __cpuhp_setup_state_cpuslocked+0xee/0x2a0
    [<0000000007534fa6>] __cpuhp_setup_state+0x76/0x100
    [<00000000d8277f50>] amd_uncore_init+0x275/0x336
    [<000000004af336cd>] do_one_initcall+0x44/0x200
    [<0000000040cb5caf>] kernel_init_freeable+0x198/0x1e4
    [<000000008b0e9fae>] kernel_init+0x16/0x120
    [<00000000459bcaeb>] ret_from_fork+0x22/0x30

-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ