From patchwork Wed Oct 18 10:29:46 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Liu Shixin X-Patchwork-Id: 13426733 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6364DCDB47E for ; Wed, 18 Oct 2023 09:30:38 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id A8B6B8D0150; Wed, 18 Oct 2023 05:30:29 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 9EDFF8D014C; Wed, 18 Oct 2023 05:30:29 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 7F1EC8D0150; Wed, 18 Oct 2023 05:30:29 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id 6869B8D014C for ; Wed, 18 Oct 2023 05:30:29 -0400 (EDT) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id 48E8080190 for ; Wed, 18 Oct 2023 09:30:29 +0000 (UTC) X-FDA: 81358061778.07.59DEB55 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by imf09.hostedemail.com (Postfix) with ESMTP id 0E78F14002E for ; Wed, 18 Oct 2023 09:30:26 +0000 (UTC) Authentication-Results: imf09.hostedemail.com; dkim=none; dmarc=pass (policy=quarantine) header.from=huawei.com; spf=pass (imf09.hostedemail.com: domain of liushixin2@huawei.com designates 45.249.212.188 as permitted sender) smtp.mailfrom=liushixin2@huawei.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1697621427; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=D3ZK2F+1B7hk/Ob5LKYTaMLtCgj+8CCYSXooVfHp9ZI=; b=2YkBZzFEEdP4jc8hH3YnUyxfaNF7mRJ+WWmUhHPaPYuiCUJVT38MKag6NHCKsMhYE3sOLk LsQX2Wo9BTGLEG6Theg5uZ0CIxrLRxp+LYyjRP1jiRREKN2c7HBSdljsTnRaKlglDCMynp khAgV5hfi14iGinN4i9L3WHaYV/0Pxw= ARC-Authentication-Results: i=1; imf09.hostedemail.com; dkim=none; dmarc=pass (policy=quarantine) header.from=huawei.com; spf=pass (imf09.hostedemail.com: domain of liushixin2@huawei.com designates 45.249.212.188 as permitted sender) smtp.mailfrom=liushixin2@huawei.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1697621427; a=rsa-sha256; cv=none; b=EtD/wFzsymWp+h8K18bJLHEUPJnDMwDEKBdue/qil/s5BWImXABsp18RO1ctM8mb6c+bC1 L6uZcYxuedt+64qNvxmGshI14D1Cac9dZ1v4jgz7k41uwVWfiZBgwibpFKfxa+ZaF2Of24 e4n0tylRvhEAAnqjihe7hCkel4pNSDk= Received: from dggpemm500009.china.huawei.com (unknown [172.30.72.56]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4S9QTV12p7zRt62; Wed, 18 Oct 2023 17:26:38 +0800 (CST) Received: from huawei.com (10.175.113.32) by dggpemm500009.china.huawei.com (7.185.36.225) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.31; Wed, 18 Oct 2023 17:30:17 +0800 From: Liu Shixin To: Catalin Marinas , Patrick Wang , Andrew Morton , Kefeng Wang CC: , , Liu Shixin Subject: [PATCH v3 1/7] bootmem: use kmemleak_free_part_phys in put_page_bootmem Date: Wed, 18 Oct 2023 18:29:46 +0800 Message-ID: <20231018102952.3339837-2-liushixin2@huawei.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20231018102952.3339837-1-liushixin2@huawei.com> References: <20231018102952.3339837-1-liushixin2@huawei.com> MIME-Version: 1.0 X-Originating-IP: [10.175.113.32] X-ClientProxiedBy: dggems706-chm.china.huawei.com (10.3.19.183) To dggpemm500009.china.huawei.com (7.185.36.225) X-CFilter-Loop: Reflected X-Rspam-User: X-Stat-Signature: 599cmorxbfnoi78xjw7agro3njga3drm X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: 0E78F14002E X-HE-Tag: 1697621426-990000 X-HE-Meta: U2FsdGVkX18IVu8uWe67y1jO7oNPclIOOzJmLSucLIt2sK8c+hL+Ub8yzxl/Aio+g3IjCMF+Ejb9yOZ6jgF6AFlE+7WVqpQBUmO4U1WTT4CXiv5yt5XjJz2wJIFcei87iZ7mdBTlr7bYLF6h0hyulMod737KH9sP7l9eQPjEBcFpKss1+kAZIAWrIs8NmLr2fd7RnHLDWNp5Nfcch0qaqo11UuGAuLrosbbkUyDaH3BsU/VaZGkxkwoeZbZjhrzqa7knQ7nMHfsHCGk17yPlQOPveBF8++wYy6zg9m8JfOs7+dPwMt0IGM1cc3LRmXWsF5VoNIzLhZw78FZW79O33mI7BFwU0cq2w9rtAlA/siNAYC9AgiIYRZ5R1c+kwo44q6GXwDEevSvAvL+HHdtiNlEaX9ynQkPK6ue+dYvXP1suBYidoqMzCFffRMpR9qiyGR2ph3dtZVYm1kc/ptcxUuLmh8bIbt8xMS7dp+tGPFZXEWYaeM2ynG8W85Y/86Fv3MA2ODRFTwlyaBjPs4OunHinR24+YCKRYks2YgMq2YvCGimbmMvoCXGNrjd9dz/PxqNlbQe0QWa8iR1JxEUdmf1QFG1gCZC0NBNY4lzgBsq1VDYNMzVtCmKn2sEgRsG9EZ9qrGz+jNS1dR1FY3szxk0AH9umUde9DB4GuQYOFdWaYKlH1dqE8xQ1/fVBQeW9pi7UYd6Ljxe2vypsRKXoLsrIQSB3bifPO+TlI4UiauouDtqmnefLf6hgve6Nu2T8wyBNQHl07VBGszAEzyFWcEirU7cUtFe/0GbVP/zoRg5EN3Grq6ZdbwW1iOMexm+4mbpUY32VixWvDp/GiQRSs6PfjaIOoxmMuxDml0ZnCrZKWtbDiMnfBSfE4cvm/ZS6Rg1StGa5/FzQ8OoeaYDt3HhdNZuwgI+HmAteUacJRSrsU/At5S+KsCXvyb3RCv+vA6uoPgOLajGFASJeQhr qiWTMhRw 6OJ8D5WfIKPPI2wH6gDtecdlFnf8EOBEk5/PpXaPrl7fbhs+8lHpKmfi5Vh5HbUdHcZqMGBkQj9PeA5gEfOb0Iqx+B2zJdz3T/urGAxGrHgCPbVvhwz7RtCArBeOecdnEWdOk2y3pVMYO268oLBUBqRe7qbor41dYgizB+deIl0k86pz25ZLf1JcsubVFNlhQ0e2A35HFQMctvHMhyCFx5sQEMB/IdNR34Gz1oJVaQS7u7BewiejI/fNk6Qo6wOcMX5APFizjdhafeDgh/JBkX1GasIWSiRlkEAydeVZzOQ5wlE+yPa91IaMxzd1wfYVKxxXW X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Since kmemleak_alloc_phys() rather than kmemleak_alloc() was called from memblock_alloc_range_nid(), kmemleak_free_part_phys() should be used to delete kmemleak object in put_page_bootmem(). In debug mode, there are following warning: kmemleak: Partially freeing unknown object at 0xffff97345aff7000 (size 4096) Fixes: dd0ff4d12dd2 ("bootmem: remove the vmemmap pages from kmemleak in put_page_bootmem") Signed-off-by: Liu Shixin Acked-by: Catalin Marinas --- mm/bootmem_info.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mm/bootmem_info.c b/mm/bootmem_info.c index b1efebfcf94b..fa7cb0c87c03 100644 --- a/mm/bootmem_info.c +++ b/mm/bootmem_info.c @@ -34,7 +34,7 @@ void put_page_bootmem(struct page *page) ClearPagePrivate(page); set_page_private(page, 0); INIT_LIST_HEAD(&page->lru); - kmemleak_free_part(page_to_virt(page), PAGE_SIZE); + kmemleak_free_part_phys(PFN_PHYS(page_to_pfn(page)), PAGE_SIZE); free_reserved_page(page); } }