Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp36690imu; Thu, 3 Jan 2019 13:31:57 -0800 (PST) X-Google-Smtp-Source: AFSGD/WXJnRq9BQ3EZa4/omGpWQOciiYh+7hyPAibYnkMGvrfgF7LgW9zjTbZD2M9cHKARQFdMf1 X-Received: by 2002:a62:644:: with SMTP id 65mr49877658pfg.161.1546551116929; Thu, 03 Jan 2019 13:31:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546551116; cv=none; d=google.com; s=arc-20160816; b=DwCP5I31lif6PZ33yKNfA35Wl7PRFd0SKSasNcAX/bSsxUD12WxyFl4UeSQuyx99+7 YmUWPays2Bso1zeuzEqLklyLDewCE5eIR8NPjwBprHBf/Ny5n5vbq2F/ZnaWSwpWB6U+ ekAN1eF1xiYGE7SMYG1IzKJawZnb9j1DBt5b11F8DqsqxTLz0KsTYSkfz523D+C16dte j68LqYfjNANM1CGzP8oGCE1R6rpBUKjT4Wzo79WCNWFCjMfV93gvhRUDVYlRPfrZjFv1 IsFCXAyVQJhokfVruqA64DCj0ly1D4ZobJe48+KjlOhgc8KEfCKU9JFqd2s+z7R7Uisw V5Nw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:from; bh=Jgewgyapowunse7PixbufLUx9SaPioSNRC5DHUjQ6uo=; b=dWjM2KuCyJK8HGrzps4GIJai9tQ99+hCDIbUK4/JlFVO0wPao2NZ2+LyclhqolpH2l Mq+Q9DYKMZeA9jQd13mJCXlFaFT37EXruyLButZw8xdTC2jInajo+aPuALJ/A/G/+4Jw gK8YiYoibM5pz1Oba/Wm5J7PsJvUIedl2BlEqJODZj//o1ogiya2FtH3rlJmq+8id5TN KKzqnNrZKCsDRydOscPGggPvYk+B1wlEYr2/FarXZsgjfjt10i5GUlvJJqV4iUGAyHuk EAGCSZu8qt+nzmUIoi2tOB7CkTSy9WG28Hv0m09/UX8RA7Ms4whHQnwtbOhEoj+nbiO+ VfcA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d125si19036790pgc.418.2019.01.03.13.31.41; Thu, 03 Jan 2019 13:31:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731210AbfACPA2 (ORCPT + 99 others); Thu, 3 Jan 2019 10:00:28 -0500 Received: from mx2.suse.de ([195.135.220.15]:32868 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730747AbfACPAT (ORCPT ); Thu, 3 Jan 2019 10:00:19 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 0E690ADE2; Thu, 3 Jan 2019 15:00:18 +0000 (UTC) From: Roman Penyaev Cc: Roman Penyaev , Andrew Morton , Michal Hocko , Andrey Ryabinin , Joe Perches , "Luis R. Rodriguez" , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [PATCH 2/3] mm/vmalloc: do not call kmemleak_free() on not yet accounted memory Date: Thu, 3 Jan 2019 15:59:53 +0100 Message-Id: <20190103145954.16942-3-rpenyaev@suse.de> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20190103145954.16942-1-rpenyaev@suse.de> References: <20190103145954.16942-1-rpenyaev@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit To: unlisted-recipients:; (no To-header on input) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org __vmalloc_area_node() calls vfree() on error path, which in turn calls kmemleak_free(), but area is not yet accounted by kmemleak_vmalloc(). Signed-off-by: Roman Penyaev Cc: Andrew Morton Cc: Michal Hocko Cc: Andrey Ryabinin Cc: Joe Perches Cc: "Luis R. Rodriguez" Cc: linux-mm@kvack.org Cc: linux-kernel@vger.kernel.org --- mm/vmalloc.c | 16 +++++++++++----- 1 file changed, 11 insertions(+), 5 deletions(-) diff --git a/mm/vmalloc.c b/mm/vmalloc.c index 2cd24186ba84..dc6a62bca503 100644 --- a/mm/vmalloc.c +++ b/mm/vmalloc.c @@ -1565,6 +1565,14 @@ void vfree_atomic(const void *addr) __vfree_deferred(addr); } +static void __vfree(const void *addr) +{ + if (unlikely(in_interrupt())) + __vfree_deferred(addr); + else + __vunmap(addr, 1); +} + /** * vfree - release memory allocated by vmalloc() * @addr: memory base address @@ -1591,10 +1599,8 @@ void vfree(const void *addr) if (!addr) return; - if (unlikely(in_interrupt())) - __vfree_deferred(addr); - else - __vunmap(addr, 1); + + __vfree(addr); } EXPORT_SYMBOL(vfree); @@ -1709,7 +1715,7 @@ static void *__vmalloc_area_node(struct vm_struct *area, gfp_t gfp_mask, warn_alloc(gfp_mask, NULL, "vmalloc: allocation failure, allocated %ld of %ld bytes", (area->nr_pages*PAGE_SIZE), area->size); - vfree(area->addr); + __vfree(area->addr); return NULL; } -- 2.19.1