[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Zf1WLscQHk9+w+Z+@gmail.com>
Date: Fri, 22 Mar 2024 10:58:06 +0100
From: Ingo Molnar <mingo@...nel.org>
To: "Rafael J. Wysocki" <rafael@...nel.org>
Cc: Dave Hansen <dave.hansen@...el.com>,
	Anton Altaparmakov <anton@...era.com>, Pavel Machek <pavel@....cz>,
	Thomas Gleixner <tglx@...utronix.de>,
	Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
	Dave Hansen <dave.hansen@...ux.intel.com>, x86@...nel.org,
	"H . Peter Anvin" <hpa@...or.com>, Chen Yu <yu.c.chen@...el.com>,
	Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>,
	Catalin Marinas <catalin.marinas@....com>, linux-mm@...ck.org,
	Matthieu Baerts <matthieu.baerts@...sares.net>,
	Mat Martineau <mathew.j.martineau@...ux.intel.com>,
	"Rafael J . Wysocki" <rafael.j.wysocki@...el.com>,
	linux-pm@...r.kernel.org, linux-kernel@...r.kernel.org,
	stable@...r.kernel.org
Subject: Re: [PATCH] x86/pm: Fix false positive kmemleak report in
 msr_build_context().
* Rafael J. Wysocki <rafael@...nel.org> wrote:
> On Thu, Mar 14, 2024 at 4:05 PM Dave Hansen <dave.hansen@...el.com> wrote:
> >
> > On 3/14/24 07:26, Anton Altaparmakov wrote:
> > >  /* image of the saved processor state */
> > >  struct saved_context {
> > > -     /*
> > > -      * On x86_32, all segment registers except gs are saved at kernel
> > > -      * entry in pt_regs.
> > > -      */
> > > -     u16 gs;
> > >       unsigned long cr0, cr2, cr3, cr4;
> > >       u64 misc_enable;
> > >       struct saved_msrs saved_msrs;
> > > @@ -27,6 +22,11 @@ struct saved_context {
> > >       unsigned long tr;
> > >       unsigned long safety;
> > >       unsigned long return_address;
> > > +     /*
> > > +      * On x86_32, all segment registers except gs are saved at kernel
> > > +      * entry in pt_regs.
> > > +      */
> > > +     u16 gs;
> > >       bool misc_enable_saved;
> > >  } __attribute__((packed));
> >
> > Isn't this just kinda poking at the symptoms?  This seems to be
> > basically the exact same bug as b0b592cf08, just with a different source
> > of unaligned structure members.
> >
> > There's nothing to keep folks from reintroducing these kinds of issues
> > and evidently no way to detect when they happen without lengthy reproducers.
> 
> This change is fine with me FWIW,
thx, I've added your:
    Acked-by: "Rafael J. Wysocki" <rafael@...nel.org>
> but I agree that making it for kmemleak reasons feels kind of misguided.
Yeah, so it's a workaround, but kmemleak is also a useful debugging 
facility that is finding memory leaks that static checkers are missing.
The fact that we don't have an easy way to prevent these problems from 
being introduced is I think properly counterbalanced by the facts that:
  1) Only kmemleak users are inconvenienced by the false positives.
  2) kmemleak users & maintainers have created the patch. There was no 
     pressure on us x86 maintainers other than to apply a root-cause 
     analyzed patch.
  2) Over a timespan of ~10 years only 2 such alignment problems were 
     introduced, and they were fixed by the kmemleak folks. I think that's 
     a fair price to pay for a useful facility.
Ie. I don't think there's any long-term maintenance burder concern.
So I've applied this workaround to x86/urgent, with a change to the title 
to make sure this isn't understood as a real bug in the PM code, but a 
workaround:
   37fb408c99af x86/pm: Work around false positive kmemleak report in msr_build_context()
.. lemme know if you feel strongly about this. :-)
Thanks,
	Ingo
Powered by blists - more mailing lists