Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp787708rwb; Thu, 19 Jan 2023 02:42:15 -0800 (PST) X-Google-Smtp-Source: AMrXdXvjC+R1tPCZ9CwfF2dNm458oTTmmxZdm99VyWKTWFj7rmJziUJl0PZ61n5zBxdhXiH49vaZ X-Received: by 2002:a17:902:d582:b0:189:c47b:af27 with SMTP id k2-20020a170902d58200b00189c47baf27mr10984170plh.10.1674124935257; Thu, 19 Jan 2023 02:42:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674124935; cv=none; d=google.com; s=arc-20160816; b=vcdInrRFM73chrwW8/Wln8Tt9SFXG/WOCVJE34Z6VpOOt+brnlfzY8o3dxKJ/uu6Sg 5mNy8g9GgWw9rlruFjulqIsC38oyn6Lhfu7oOtW432v6vCp/8TCYZF9PkQflO8dcjKBV 5FG206IQPE+OFezE3/Ug+6jOzddoGD/9d2BIZpDWjdvj7hOjPBu0lcCfUHuwN0TE+iPs 1XlEjg4npEwVB9NvuEjMAuUMQhvKxoV+KyAb5ATpRoceWxZrOxHDaVDjcA0IjqAM2RP6 g1FHGEBbH1ubL8BiinAezX1+waYgDYOTTo1wnV1tEgAaCZRXM115L+6XAeN4SIU6MFS3 KcNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:to:content-language:subject:user-agent:mime-version:date :message-id:dkim-signature:dkim-signature; bh=Tegevk4l6eSAVcZhXnC6lhrFkkCioF18pmZkx/QMwxI=; b=VChPSjP/+BJ2ukzzd4+yfnO7Njk9bNeFl++Y7oBaw9a+xPz0f+j+aXpEwi6Cv/rGSh tcwFvJhycddrVtXoiSUM/XB7bnGJ1oAUucCRLT2E71ddFiqV40sC27Z/pqIG/FlwuORW NmREYqawACffunRsBc7TPcOG/u2l2Ipkt4YpGD4MccXoIYbRqd/hviQ+N8sCYoMc0VZX 8GMFJPfHZofZlr3i97ZrSnqJV7R+/Pcft74+/xjGMoN6zy8U+2UfdytfLx1fq5Cjew6V 7Su4jf8o42qakRUWzwVt0ZteJRMHnWqz16zj/tWDiRzLVUSQpcAMovcokw5M3cB9bZFc ZsMg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=Es6O2oAV; dkim=neutral (no key) header.i=@suse.cz header.b=ZOZTb1xy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m20-20020a170902bb9400b001910f9d152csi36506687pls.156.2023.01.19.02.42.09; Thu, 19 Jan 2023 02:42:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=Es6O2oAV; dkim=neutral (no key) header.i=@suse.cz header.b=ZOZTb1xy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230198AbjASKcl (ORCPT + 44 others); Thu, 19 Jan 2023 05:32:41 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57544 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229623AbjASKcj (ORCPT ); Thu, 19 Jan 2023 05:32:39 -0500 Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 35AC9E8 for ; Thu, 19 Jan 2023 02:32:38 -0800 (PST) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id E584B5CC34; Thu, 19 Jan 2023 10:32:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1674124356; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Tegevk4l6eSAVcZhXnC6lhrFkkCioF18pmZkx/QMwxI=; b=Es6O2oAVkAEqFiIdqT+svJN6AueN7ixIB4oXi+Gf4j8u2FQwi8O9dHU20bnTWLOOSgFBpC Px1Oa8a7f6c8HyRHu8X5z9qY0tDXWqhaI5dfS7I+6qAxEDPJKFZoop0kmELlHk/XFJczW3 I+2VpMwQmUsMyrzKqFegwRE6s6UmV/8= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1674124356; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Tegevk4l6eSAVcZhXnC6lhrFkkCioF18pmZkx/QMwxI=; b=ZOZTb1xywmP4Ivu22dC+fS2VcRg7Epu4N+/9ViuwvDjwkOpVMDQYmEMfg2BcLlmj1gGVad lnvxKCplItVQtfDw== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id BB0D5139ED; Thu, 19 Jan 2023 10:32:36 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id y59NLEQcyWNRIAAAMHmgww (envelope-from ); Thu, 19 Jan 2023 10:32:36 +0000 Message-ID: <6e9e406a-8a94-4e34-9e5e-f4bb3a321b4e@suse.cz> Date: Thu, 19 Jan 2023 11:32:36 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.6.1 Subject: Re: [PATCHv4 2/2] mm: use stack_depot_early_init for kmemleak Content-Language: en-US To: "zhaoyang.huang" , Andrew Morton , Catalin Marinas , Nathan Chancellor , Peter Zijlstra , Zhaoyang Huang , linux-mm@kvack.org, linux-kernel@vger.kernel.org, ke.wang@unisoc.com, Mirsad Todorovac References: <1674091345-14799-1-git-send-email-zhaoyang.huang@unisoc.com> <1674091345-14799-2-git-send-email-zhaoyang.huang@unisoc.com> From: Vlastimil Babka In-Reply-To: <1674091345-14799-2-git-send-email-zhaoyang.huang@unisoc.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.5 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/19/23 02:22, zhaoyang.huang wrote: > From: Zhaoyang Huang > > Mirsad report bellow error which caused by stack_depot_init failed in kvcalloc. > Solve this by having stackdepot use stack_depot_early_init. > > On 1/4/23 17:08, Mirsad Goran Todorovac wrote: > I hate to bring bad news again, but there seems to be a problem with the output of /sys/kernel/debug/kmemleak: > > [root@pc-mtodorov ~]# cat /sys/kernel/debug/kmemleak > unreferenced object 0xffff951c118568b0 (size 16): > comm "kworker/u12:2", pid 56, jiffies 4294893952 (age 4356.548s) > hex dump (first 16 bytes): > 6d 65 6d 73 74 69 63 6b 30 00 00 00 00 00 00 00 memstick0....... > backtrace: > [root@pc-mtodorov ~]# > > Apparently, backtrace of called functions on the stack is no longer printed with the list of memory leaks. > This appeared on Lenovo desktop 10TX000VCR, with AlmaLinux 8.7 and BIOS version M22KT49A (11/10/2022) > and 6.2-rc1 and 6.2-rc2 builds. > This worked on 6.1 with the same CONFIG_KMEMLEAK=y and MGLRU enabled on a vanilla mainstream kernel > from Mr. Torvalds' tree. I don't know if this is deliberate feature for some reason or a bug. > Please find attached the config, lshw and kmemleak output. I think we could replace the full quote of the report with Link: https://lore.kernel.org/all/5272a819-ef74-65ff-be61-4d2d567337de@alu.unizg.hr/ also Fixes: 56a61617dd22 ("mm: use stack_depot for recording kmemleak's backtrace") (Andrew can do that when picking up, no need to send v5) > reported-by: Mirsad Todorovac > suggested-by: Vlastimil Babka > Signed-off-by: Zhaoyang Huang Acked-by: Vlastimil Babka But to be cleaner I'd also suggest Andrew adds the hunk below. The call to stack_depot_init() becomes no-op after this patch so it's not a bug to leave it there, but it's just misleading now. ---8<--- diff --git a/mm/kmemleak.c b/mm/kmemleak.c index 91dda5c2753a..55dc8b8b0616 100644 --- a/mm/kmemleak.c +++ b/mm/kmemleak.c @@ -2095,7 +2095,6 @@ void __init kmemleak_init(void) if (kmemleak_error) return; - stack_depot_init(); jiffies_min_age = msecs_to_jiffies(MSECS_MIN_AGE); jiffies_scan_wait = msecs_to_jiffies(SECS_SCAN_WAIT * 1000);