Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp6263536yba; Wed, 1 May 2019 08:57:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqw28KZ3Q0amdnWsxi4jKDedwtQ2mHoSAAmhnayXFLBBAaJkMFDM/wOsuiIvwC3gihL1sF1W X-Received: by 2002:a65:6541:: with SMTP id a1mr12166977pgw.233.1556726238713; Wed, 01 May 2019 08:57:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556726238; cv=none; d=google.com; s=arc-20160816; b=GxAddKQVjWC/62+AKb76zVfl/C7TRTv4DR7KxGRJF32XrNXxTmlRpC1XPNn06FBOGt RS59q1E2KrW19ZHRt/6RO4vYliIEgNVAAgjxJ43N8Q9ktpGDvxaQaSeozJ05QljyP23l OTdtJ5jWq8OauCoNyutinQhTHeeYjiRBkNNTQJVL0joYTMOeN4Bf+7/wvmlT97cpqFZR kLzhflTumyN8qbvLTf4+z3/+HPr5S5q2LwukkaNdq4+UXQwhjqDSR6U2mCGON76f4tBa 72F6ePXRiA5QA17gkIGXJbkYZlbWApz1RA7iayXlh/tYUVxgzME5Xvzkk2GZBop3y7HJ aqXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=YQW+jYb1QOSNPQzC6QQb5TQmAMv2YGBzQa0HCvZyCVk=; b=lDNX2hcQjqqmtmC5TKuxIArrsxcSKsJxjLkV9o64QY7ZakbDsga5arcArk5Px71RwA LG5dJIucgkW5Ux0wftQwXNHJJfjI8ZE13P6MAnfODJS2U8FjsyK52mmIXQiVGthSV22E z3yASdZAE4PeTw9v2KnL0AuUJOr2E31baStbysXNaGpoflMG/f/nJ5uI2QhHywJOA5K8 jF1xXG6+4xo9tYuBeSGiuB01XoUe961CyMXF9ihj9RDbGwZE9iXPIq0bdmnvfQ+CTCNK lgNg6t3Kyw0lLgHpkkrGutukvwarxXAs6L9+WKs3Bpk+1S8mPb+ZvuFNYNc2YkgYIKKn ntBg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h94si40523304plb.261.2019.05.01.08.57.03; Wed, 01 May 2019 08:57:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726534AbfEAPz4 (ORCPT + 99 others); Wed, 1 May 2019 11:55:56 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:33082 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726452AbfEAPz4 (ORCPT ); Wed, 1 May 2019 11:55:56 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9ECD1A78; Wed, 1 May 2019 08:55:55 -0700 (PDT) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 5F2FD3F719; Wed, 1 May 2019 08:55:54 -0700 (PDT) Date: Wed, 1 May 2019 16:55:51 +0100 From: Mark Rutland To: Jens Axboe Cc: Matthew Wilcox , linux-kernel@vger.kernel.org, Alexander Viro , linux-fsdevel@vger.kernel.org, linux-block@vger.kernel.org Subject: Re: [PATCH] io_uring: avoid page allocation warnings Message-ID: <20190501155551.GF11740@lakrids.cambridge.arm.com> References: <20190430132405.8268-1-mark.rutland@arm.com> <20190430141810.GF13796@bombadil.infradead.org> <20190430145938.GA8314@lakrids.cambridge.arm.com> <20190430170302.GD8314@lakrids.cambridge.arm.com> <0bd395a0-e0d3-16a5-e29f-557e97782a48@kernel.dk> <20190501103026.GA11740@lakrids.cambridge.arm.com> <710a3048-ccab-260d-d8b7-1d51ff6d589d@kernel.dk> <20190501150921.GE11740@lakrids.cambridge.arm.com> <88fee953-ea3e-b9c0-650c-60faea07dd04@kernel.dk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <88fee953-ea3e-b9c0-650c-60faea07dd04@kernel.dk> User-Agent: Mutt/1.11.1+11 (2f07cb52) (2018-12-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 01, 2019 at 09:29:25AM -0600, Jens Axboe wrote: > On 5/1/19 9:09 AM, Mark Rutland wrote: > > I've manually minimized that to C below. AFAICT, that hits a leak, which > > is what's triggering the OOM after the program is run a number of times > > with the previously posted kvmalloc patch. > > > > Per /proc/meminfo, that memory isn't accounted anywhere. > > > >> Patch looks fine to me. Note > >> that buffer registration is under the protection of RLIMIT_MEMLOCK. > >> That's usually very limited for non-root, as root you can of course > >> consume as much as you want and OOM the system. > > > > Sure. > > > > As above, it looks like there's a leak, regardless. > > The leak is that we're not releasing imu->bvec in case of error. I fixed > a missing kfree -> kvfree as well in your patch, with this rolled up > version it works for me. That works for me too. I'll fold that into v2, and send that out momentarily. Thanks, Mark.