From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2447FC433FE for ; Tue, 19 Oct 2021 05:45:59 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 9E197610C7 for ; Tue, 19 Oct 2021 05:45:58 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 9E197610C7 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kvack.org Received: by kanga.kvack.org (Postfix) id EA12A900002; Tue, 19 Oct 2021 01:45:57 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id E2AB26B0071; Tue, 19 Oct 2021 01:45:57 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id CF205900002; Tue, 19 Oct 2021 01:45:57 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0089.hostedemail.com [216.40.44.89]) by kanga.kvack.org (Postfix) with ESMTP id BCC496B006C for ; Tue, 19 Oct 2021 01:45:57 -0400 (EDT) Received: from smtpin24.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay01.hostedemail.com (Postfix) with ESMTP id 7FA441802BE09 for ; Tue, 19 Oct 2021 05:45:57 +0000 (UTC) X-FDA: 78712100754.24.1509C65 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf22.hostedemail.com (Postfix) with ESMTP id 0409B1904 for ; Tue, 19 Oct 2021 05:45:55 +0000 (UTC) Received: by mail.kernel.org (Postfix) with ESMTPSA id D89D36108E; Tue, 19 Oct 2021 05:45:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1634622356; bh=4tFcqwTRXqGKGRhpNjefcElR0f+rUUFI3ptNbOGbzQ8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=WoCIneDVFecJl23oybkx9yUnJvdgy+f+amkOJAvBqJpz2zuSyoCxeqbT7ng87zswj qO9bagM7SZL6TsJfld6lr8ZrjSld5n5OvUIsy1QbL+9fdwqmQD98DFpVw/omy6UbVN jJpBs7vRcIB+OAMTzjITkRGXLzQwCJTl/YxkFW+1kqCGfh7IMiexscmHgoDk0ImT9P eScU6czzxnj+cFS7CSY8Xt9xuAstWDw4a1UxS9Bslrx+wBxE2u91nwaEem7f1LTzDa BnxUdjZYnJWDsx+324qsKQmw8K9QiL4mKU8XmqFAMtb8/TAP9IGLjQkaq1Jhube4qk uuY6NxPizwwVA== Date: Tue, 19 Oct 2021 08:45:49 +0300 From: Mike Rapoport To: Qian Cai Cc: linux-mm@kvack.org, Andrew Morton , Catalin Marinas , Mike Rapoport , Vladimir Zapolskiy , linux-kernel@vger.kernel.org, Linus Torvalds Subject: Re: [PATCH] memblock: exclude NOMAP regions from kmemleak Message-ID: References: <20211013054756.12177-1-rppt@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: X-Rspamd-Server: rspam03 X-Rspamd-Queue-Id: 0409B1904 X-Stat-Signature: 17mapipbu3rzbpakrwtw7ooxghg9qkja Authentication-Results: imf22.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=WoCIneDV; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf22.hostedemail.com: domain of rppt@kernel.org designates 198.145.29.99 as permitted sender) smtp.mailfrom=rppt@kernel.org X-HE-Tag: 1634622355-578067 Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Hi Qian, On Mon, Oct 18, 2021 at 11:55:40PM -0400, Qian Cai wrote: >=20 >=20 > On 10/13/2021 1:47 AM, Mike Rapoport wrote: > > From: Mike Rapoport > >=20 > > Vladimir Zapolskiy reports: > >=20 > > commit a7259df76702 ("memblock: make memblock_find_in_range method pr= ivate") > > invokes a kernel panic while running kmemleak on OF platforms with no= maped > > regions: > >=20 > > Unable to handle kernel paging request at virtual address fff000021= e00000 > > [...] > > scan_block+0x64/0x170 > > scan_gray_list+0xe8/0x17c > > kmemleak_scan+0x270/0x514 > > kmemleak_write+0x34c/0x4ac > >=20 > > Indeed, NOMAP regions don't have linear map entries so an attempt to = scan > > these areas would fault. > >=20 > > Prevent such faults by excluding NOMAP regions from kmemleak. > >=20 > > Link: https://lore.kernel.org/all/8ade5174-b143-d621-8c8e-dc6a1898c6f= b@linaro.org > > Fixes: a7259df76702 ("memblock: make memblock_find_in_range method pr= ivate") > > Signed-off-by: Mike Rapoport > > Tested-by: Vladimir Zapolskiy >=20 > Mike, reverting this commit on the top of today's linux-next fixed the = early booting hang > on an arm64 server with kmemleak. Even with "earlycon", it could only p= rint out those > lines. >=20 > EFI stub: Booting Linux Kernel... > EFI stub: EFI_RNG_PROTOCOL unavailable > EFI stub: ERROR: FIRMWARE BUG: kernel image not aligned on 128k boundar= y > EFI stub: ERROR: FIRMWARE BUG: Image BSS overlaps adjacent EFI memory r= egion > EFI stub: Using DTB from configuration table > EFI stub: Exiting boot services=E2=80=A6 >=20 > I could help to confirm if it hangs right in the early boot somewhere i= f needed. The kernel config and a log of working kernel would help to start with. =20 > start_kernel() > setup_arch() > paging_init() > map_mem() > memblock_mark_nomap( So we have kmemleak_free_part_phys() here. Catalin, any ideas? >=20 > > --- > > mm/memblock.c | 7 ++++++- > > 1 file changed, 6 insertions(+), 1 deletion(-) > >=20 > > diff --git a/mm/memblock.c b/mm/memblock.c > > index 184dcd2e5d99..5c3503c98b2f 100644 > > --- a/mm/memblock.c > > +++ b/mm/memblock.c > > @@ -936,7 +936,12 @@ int __init_memblock memblock_mark_mirror(phys_ad= dr_t base, phys_addr_t size) > > */ > > int __init_memblock memblock_mark_nomap(phys_addr_t base, phys_addr_= t size) > > { > > - return memblock_setclr_flag(base, size, 1, MEMBLOCK_NOMAP); > > + int ret =3D memblock_setclr_flag(base, size, 1, MEMBLOCK_NOMAP); > > + > > + if (!ret) > > + kmemleak_free_part_phys(base, size); > > + > > + return ret; > > } > > =20 > > /** > >=20 > > base-commit: 64570fbc14f8d7cb3fe3995f20e26bc25ce4b2cc > >=20 --=20 Sincerely yours, Mike.