Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp3075078rwe; Mon, 29 Aug 2022 05:32:00 -0700 (PDT) X-Google-Smtp-Source: AA6agR7nMRCMNhJSAFToCCXHtERPbn59b6YzieGdUq7AlnL5AU4wpemtAmRu57G/NhHji9Y3SmFl X-Received: by 2002:a63:4c:0:b0:42b:2673:2180 with SMTP id 73-20020a63004c000000b0042b26732180mr13980509pga.491.1661776319818; Mon, 29 Aug 2022 05:31:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661776319; cv=none; d=google.com; s=arc-20160816; b=GXIGa1tn6huLsAp3lf1qFe82NO0KQrE6l/W6gKMSzb3b25ORutAva4Mglqgu9mG/S9 9QYYLnObvX7VWqd8PJ6DWn8Jt/1ab/uY4afkvAKSfcCP2PViUNq9/WkDSB4s3ARnuOxD KfurNOa4opdqH1H6/bszo7jcLAZGcO8glvSjlvFmL0QkzUBcZ/GWU0VaNu6lWBvN6snL nup/6gZ0DlKsvIc9rpnYflcOcAcoPGuMA70TtwfXex1/cBl/OaeiuNKA/n5+mpvXrjSb EqvTmo+c1l9+ASiMU5LURWLXa60Afy1fMBKVun6vAM6oznz/MKTZjSkfaJJZ8Id5+gTI dE9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Kb9HJCZKYSb3c/VzDf7w4dWJbSTdTLGJ90bzs9Mfxqk=; b=NsqTIjxFCDjcXF/6vSRoZbtqbnvblRh3KbGe8EmnQtExeEstChKYGdgoiD7lhWNujT 5DUqCU5IxqF3qXY388yRQtOVU/djo2ibYOlPGyS00ViWkLv30rVKHO/kRVQF4/Jm4y7P zrl1I9dx9Hq/b/FQGK8JcOvD7WvjMXiLmzKG1tSeZGLp7Xm/Vb6se6vgQQDMg0pmHDPy Q95LSDVtR1ms2T4pZB0DgBK06fy6YF7OMP8b6QVSygsEq7hWgcYbQAOiLTaQZ2oQn85H PGSn9EqGtNCGLX9KC9nS8wf0WGZxI8qWvyCL9S54OROgeaRtt1aJwZvRyYYqZVxbh8HP fNRA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=gYVpIknm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u1-20020a170902e5c100b0016d8b0dfd3fsi10094590plf.566.2022.08.29.05.31.44; Mon, 29 Aug 2022 05:31:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=gYVpIknm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229491AbiH2Ly7 (ORCPT + 99 others); Mon, 29 Aug 2022 07:54:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35212 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232026AbiH2LyX (ORCPT ); Mon, 29 Aug 2022 07:54:23 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2C7CF93529; Mon, 29 Aug 2022 04:38:31 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 83DB3611F1; Mon, 29 Aug 2022 11:11:34 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 83E77C433D6; Mon, 29 Aug 2022 11:11:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1661771494; bh=MWjADRMk2URAIFFTWgxZCUWXo7D4BssI/xnxSLMxXSU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gYVpIknm8lpbgOPF3hIwNJ6hoDfOcC0PoDLgytMyj18GmGULCEuquPq/HDAXS3xh9 dZ9jHX3xuZZBB4s93kjt+878q/r58/4XMWAJahKoCPNm2mOrA8lw+D1zesMX1A46j9 5P7UfDZ140QdXIWiXYsJRZOLGfJwAuh9yO57W67M= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Liu Shixin , Muchun Song , Matthew Wilcox , Mike Kravetz , Oscar Salvador , Andrew Morton Subject: [PATCH 5.15 109/136] bootmem: remove the vmemmap pages from kmemleak in put_page_bootmem Date: Mon, 29 Aug 2022 12:59:36 +0200 Message-Id: <20220829105809.193452766@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220829105804.609007228@linuxfoundation.org> References: <20220829105804.609007228@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Liu Shixin commit dd0ff4d12dd284c334f7e9b07f8f335af856ac78 upstream. The vmemmap pages is marked by kmemleak when allocated from memblock. Remove it from kmemleak when freeing the page. Otherwise, when we reuse the page, kmemleak may report such an error and then stop working. kmemleak: Cannot insert 0xffff98fb6eab3d40 into the object search tree (overlaps existing) kmemleak: Kernel memory leak detector disabled kmemleak: Object 0xffff98fb6be00000 (size 335544320): kmemleak: comm "swapper", pid 0, jiffies 4294892296 kmemleak: min_count = 0 kmemleak: count = 0 kmemleak: flags = 0x1 kmemleak: checksum = 0 kmemleak: backtrace: Link: https://lkml.kernel.org/r/20220819094005.2928241-1-liushixin2@huawei.com Fixes: f41f2ed43ca5 (mm: hugetlb: free the vmemmap pages associated with each HugeTLB page) Signed-off-by: Liu Shixin Reviewed-by: Muchun Song Cc: Matthew Wilcox Cc: Mike Kravetz Cc: Oscar Salvador Cc: Signed-off-by: Andrew Morton Signed-off-by: Greg Kroah-Hartman --- mm/bootmem_info.c | 2 ++ 1 file changed, 2 insertions(+) --- a/mm/bootmem_info.c +++ b/mm/bootmem_info.c @@ -12,6 +12,7 @@ #include #include #include +#include void get_page_bootmem(unsigned long info, struct page *page, unsigned long type) { @@ -34,6 +35,7 @@ void put_page_bootmem(struct page *page) ClearPagePrivate(page); set_page_private(page, 0); INIT_LIST_HEAD(&page->lru); + kmemleak_free_part(page_to_virt(page), PAGE_SIZE); free_reserved_page(page); } }