From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 64241C433F5 for ; Mon, 8 Nov 2021 10:47:10 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id E1B9E60E75 for ; Mon, 8 Nov 2021 10:47:09 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org E1B9E60E75 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kvack.org Received: by kanga.kvack.org (Postfix) id 7ADE56B006C; Mon, 8 Nov 2021 05:47:09 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 75D356B0071; Mon, 8 Nov 2021 05:47:09 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 672D76B0072; Mon, 8 Nov 2021 05:47:09 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0207.hostedemail.com [216.40.44.207]) by kanga.kvack.org (Postfix) with ESMTP id 5432F6B006C for ; Mon, 8 Nov 2021 05:47:09 -0500 (EST) Received: from smtpin08.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id E77B378B39 for ; Mon, 8 Nov 2021 10:47:08 +0000 (UTC) X-FDA: 78785435736.08.2244885 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf13.hostedemail.com (Postfix) with ESMTP id 78750104D8CF for ; Mon, 8 Nov 2021 10:46:58 +0000 (UTC) Received: by mail.kernel.org (Postfix) with ESMTPSA id DF4DA61359; Mon, 8 Nov 2021 10:38:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1636367887; bh=xj1zISrLJM071lTGH9/U7IsLw03GBjukAVuQNFLuOtE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uTjpBMeiq1Xurb+GdXKUNM668W7EB9VmxXmVaCt4c2QaSR66OQCqYw0jwadLnybOA 1cIS7Xfw3G2kDEsaAfb+gLZUWtID2QvdBdizRtoqGgPXYHFj3igkt74urNV9LArNZ+ Ke3+2w5lZXMVCfSQwlatNdTobCywO4bs9OkG+SVWV6vCWqs8KXEeVs1e6MgYAGpbQp nGEtd4VO3Z31AZ6J0JbLqYjGmZoYBd0kKh8BadOMEkJ7yl3bNrItunA2mpJxr5Cwkq ZyJt+UBCq7YHlNWCQUsvWbFqbgwTpGIodHuFHF9mdzqkWjgkdeZhyNO8MtAvych8o0 oI2vPUb+c74GQ== From: Will Deacon To: Qian Cai , Catalin Marinas Cc: kernel-team@android.com, Will Deacon , Andrey Ryabinin , Mike Rapoport , Andrew Morton , kasan-dev@googlegroups.com, linux-arm-kernel@lists.infradead.org, Dmitry Vyukov , Andrey Konovalov , linux-kernel@vger.kernel.org, linux-mm@kvack.org, Alexander Potapenko , Russell King Subject: Re: [PATCH v2] arm64: Track no early_pgtable_alloc() for kmemleak Date: Mon, 8 Nov 2021 10:37:52 +0000 Message-Id: <163636592237.15032.12831105402698814160.b4-ty@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20211105150509.7826-1-quic_qiancai@quicinc.com> References: <20211105150509.7826-1-quic_qiancai@quicinc.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" X-Rspamd-Server: rspam02 X-Rspamd-Queue-Id: 78750104D8CF X-Stat-Signature: 5wdizyc3brzzicbc7r5aspqj166y5zb6 Authentication-Results: imf13.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=uTjpBMei; spf=pass (imf13.hostedemail.com: domain of will@kernel.org designates 198.145.29.99 as permitted sender) smtp.mailfrom=will@kernel.org; dmarc=pass (policy=none) header.from=kernel.org X-HE-Tag: 1636368418-589048 Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Fri, 5 Nov 2021 11:05:09 -0400, Qian Cai wrote: > After switched page size from 64KB to 4KB on several arm64 servers here= , > kmemleak starts to run out of early memory pool due to a huge number of > those early_pgtable_alloc() calls: >=20 > kmemleak_alloc_phys() > memblock_alloc_range_nid() > memblock_phys_alloc_range() > early_pgtable_alloc() > init_pmd() > alloc_init_pud() > __create_pgd_mapping() > __map_memblock() > paging_init() > setup_arch() > start_kernel() >=20 > [...] Applied to arm64 (for-next/core), thanks! [1/1] arm64: Track no early_pgtable_alloc() for kmemleak https://git.kernel.org/arm64/c/c6975d7cab5b Cheers, --=20 Will https://fixes.arm64.dev https://next.arm64.dev https://will.arm64.dev