Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4883384yba; Wed, 10 Apr 2019 06:59:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqwaFgwLBuudbfmGE6iRw2vaQVSo54mEoDsOV/zyTEzmXPq2/rzu/SOVCohqcvjxQkgbF32b X-Received: by 2002:a63:af0a:: with SMTP id w10mr17861102pge.67.1554904749366; Wed, 10 Apr 2019 06:59:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554904749; cv=none; d=google.com; s=arc-20160816; b=zILTcVsH7rAdJQ+MocLz/ZiBwr4k4eTdetuWLQvm7+/QLxoWH61NJHevTyQGdHCDs3 tEotLgQucWUqDu332DFXYVqwwwaHCQf1tM0MC11lGHMpJk2XuwvRBJUvcnNMKIxAIPGf QLo6dzEu2+9wtu4njbRhd44eV/PeXugfdv1mNEKm3ucJ/EFLdpjcbADKXtHRgYfNTNnb kP3YWtx2WdKWZ17uIITrVreEAhWf/PRgI68PZ5vcmuoJag4/b181ycVrcJoa0DxOIfOA g4jFxjNkbvHe8L5Dzx1s8A1RZ+maVjznBN/nbsjQiQNqSZlOcBLhLFUE6owLFIfPT/a/ EGEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=l9wHU6OXz7jYCVcXbXfWTNfEtZHB/ROeE+wXFopTNNQ=; b=jZ0ubHBr80132qV83h/i/ZyFF871jCCN5uw7cQ3KotoI+sFBE0wShmS/R6+2R2/A0n uh1Fj43MVqYaJwU2lxqHG043lv6W0vGRye+IEw4t50lQS1JTI+IRonPgUZLWWc0XFok2 BIU3r+9FjDWIFO7yNTcWcbBc5cJ48m3JQeslFvU9vwM85ZDRyIEOqrwl1ZQQV91sGGlN qZgIk3kpVn69xrh8YsXb9ELT+w9MTf5I/XgQBkEl10CUdZII/v8HKohdWMNqe8bwkd/s DM/fdCg9/R4ibqOwvh5BcDp+a4vjjDFNlqKwNA2CpvOsgCxHDrQkA+J7N98/T81PJGp+ Q0mg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h66si8338990pgc.418.2019.04.10.06.58.53; Wed, 10 Apr 2019 06:59:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732296AbfDJN4u (ORCPT + 99 others); Wed, 10 Apr 2019 09:56:50 -0400 Received: from mail-ot1-f65.google.com ([209.85.210.65]:42259 "EHLO mail-ot1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731470AbfDJN4u (ORCPT ); Wed, 10 Apr 2019 09:56:50 -0400 Received: by mail-ot1-f65.google.com with SMTP id 103so1966622otd.9; Wed, 10 Apr 2019 06:56:49 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=l9wHU6OXz7jYCVcXbXfWTNfEtZHB/ROeE+wXFopTNNQ=; b=k51Uwtaf0VMYv6I4o4CtjvjUQkObx4pKu63UdoIZoLe3EHvzXSh+NA756VC4Z7DAJR JZT/c2LZZtVvsKcE7+0jMJ4dFIs+ajkhXzeVhu3JWdApiT8B32jgIVFXU6I95/ZG2JVe JISmzeTPLyxeKfOH0jGIxI7VPqZxZYACk+HFLyAZ/OzCIspVlBAeTUDq59HgN7I6tWhM hOvKhCbRXUenpi8dM/0eKSUJ2/ZcmQifjjgXN601rL6kJ32XLQw8Goo6KOLRxer6dfQH RXD3wZkB2SMGwrYdLLVPmeCypUQrDDqQ17FA2e2dhdMs5CZzSJl6H4EJWQAzZ/vvwxDo EG5g== X-Gm-Message-State: APjAAAVWiZSBDCS1KGlfHj5C3jn+S92+frevL0juWvJ2Qs0u+ilabDz8 5mVE0bMn/8gY3P3C/qSgNWvn9jM= X-Received: by 2002:a9d:3f4b:: with SMTP id m69mr28270573otc.246.1554904609205; Wed, 10 Apr 2019 06:56:49 -0700 (PDT) Received: from localhost (24-155-109-49.dyn.grandenetworks.net. [24.155.109.49]) by smtp.gmail.com with ESMTPSA id s31sm15586216otb.35.2019.04.10.06.56.48 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 10 Apr 2019 06:56:48 -0700 (PDT) Date: Wed, 10 Apr 2019 08:56:48 -0500 From: Rob Herring To: pierre Kuo Cc: Frank Rowand , devicetree@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 1/1] of: reserved_mem: fix reserve memory leak Message-ID: <20190410135648.GA25739@bogus> References: <20190219074500.16454-1-vichy.kuo@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190219074500.16454-1-vichy.kuo@gmail.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 19, 2019 at 03:45:00PM +0800, pierre Kuo wrote: > The __reserved_mem_init_node will call region specific reserved memory > init codes, but once all compatibled init codes failed, the memory region > will left in memory.reserved and cause leakage. > > Take cma reserve memory DTS for example, if user declare 1MB size, > which is not align to (PAGE_SIZE << max(MAX_ORDER - 1, > pageblock_order)), rmem_cma_setup will return -EINVAL. > Meanwhile, rmem_dma_setup will also return -EINVAL since "reusable" > property is not set. If finally there is no reserved memory init pick up > this memory, kernel will left the 1MB leak in memory.reserved. > > This patch will remove this kind of memory from memory.reserved, only > when __reserved_mem_init_node return neither 0 nor -ENOENT. > > Signed-off-by: pierre Kuo > --- > drivers/of/of_reserved_mem.c | 22 +++++++++++++++++----- > 1 file changed, 17 insertions(+), 5 deletions(-) As no one else seems to have any comments, I've applied it. Rob