Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp167008ybz; Thu, 16 Apr 2020 22:05:06 -0700 (PDT) X-Google-Smtp-Source: APiQypIlOXrIeDZdw/8TVvzQQU0fHWr6YHc+jUIWo0bL5dYsgyVkpnw4RkHwFh5JRSqqZYF4etdK X-Received: by 2002:a50:f699:: with SMTP id d25mr1328921edn.244.1587099905992; Thu, 16 Apr 2020 22:05:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587099905; cv=none; d=google.com; s=arc-20160816; b=dLKJK54VIjdnW5xsbvjOxLA6WXU6Syheu0L8ZWQADnpXIQRPWBp8fnR8VvAkkgtuFR mXAgJysLP7Ub0tAbxFdLTIWMum7ZUPr0cN7qV5lTEjPXGB6WutbhC3nwSlLbcZpM98ER MldREf2DFXFzy2tkmI4HjwLZ0i79EUdlCL4WBA0nlFlYe4XnRDSfNHHKER0FMZ9PhmuS hStuKsmGQhoSiJhxsy1rxEwS1mo2Mn+0pCJ1hq7j3W32ZmZHuUa9IP3ZiSo1tqHr7GT4 YXjRCIQTjTp89VNP3gzVnP0dzMp4DMGs1kEigKaPpYfyYGaRwHi7bk88qoR/Epkfd/l2 baQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=ILaBZhN7R98FO7LHrOfSbUAGGqwmdUHLc5Y8hYQW4gQ=; b=vWf1D0Hmc3mbPArTxcYZjOv6iUAlAxIl1mRqGbezQh7aM8Xr6RfjJe7HDCWOpSWIJC KA6c0siYVxHlM2wMHX/J2SYU2ya/Bytwdk25HwB4zl2D/UfM+BwfaiEH1QN5ge9ZhtaW REGX/PBpRzr8yB/wCf2c03ydENR9OVL5LcZ40qfPn3hhdNjhOXG2GSw7JXhrVueSquNb XYJX8s6oea8rckccboyYoqyWjaBhPk7yXB8gMFN+aH7S0NlCEuImD4Q/8jKP3sp0sxQD u5j/GwQEb6raYm8wU2kGNJ2cyOU2BWmF6I15OeBJPgyHdAkZ52aAvrzH5JUuDFd63lo3 fL3A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qn23si12718968ejb.111.2020.04.16.22.04.38; Thu, 16 Apr 2020 22:05:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726644AbgDQFBd (ORCPT + 99 others); Fri, 17 Apr 2020 01:01:33 -0400 Received: from mga09.intel.com ([134.134.136.24]:60789 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726026AbgDQFBc (ORCPT ); Fri, 17 Apr 2020 01:01:32 -0400 IronPort-SDR: 2RsSl9GR1MhW+5KUJptMatVT228rDjmLPX6IfhfiB1dIHrv+Cv0s82h0z//sBaXwHUCgCmHxV+ pInH192KaaqA== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Apr 2020 22:01:32 -0700 IronPort-SDR: y9xCn0hZVNz07AYUIHEbV88iGRzkkdCHHgqDEJ7xsIgzlicLI5zaLj+whK8ekhjh/dljRJyXCJ NfX0eUU93Pdg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.72,393,1580803200"; d="scan'208";a="455514715" Received: from shbuild999.sh.intel.com ([10.239.147.105]) by fmsmga006.fm.intel.com with ESMTP; 16 Apr 2020 22:01:30 -0700 From: Feng Tang To: Corey Minyard , Arnd Bergmann , Greg Kroah-Hartman , openipmi-developer@lists.sourceforge.net, linux-kernel@vger.kernel.org Cc: Feng Tang Subject: [PATCH RFC] ipmi: use vzalloc instead of kmalloc for user creation Date: Fri, 17 Apr 2020 13:01:29 +0800 Message-Id: <1587099689-13678-1-git-send-email-feng.tang@intel.com> X-Mailer: git-send-email 2.7.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We met mulitple times of failure of staring bmc-watchdog, due to the runtime memory allocation failure of order 4. bmc-watchdog: page allocation failure: order:4, mode:0x40cc0(GFP_KERNEL|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0-1 CPU: 1 PID: 2571 Comm: bmc-watchdog Not tainted 5.5.0-00045-g7d6bb61d6188c #1 Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.00.01.0015.110720180833 11/07/2018 Call Trace: dump_stack+0x66/0x8b warn_alloc+0xfe/0x160 __alloc_pages_slowpath+0xd3e/0xd80 __alloc_pages_nodemask+0x2f0/0x340 kmalloc_order+0x18/0x70 kmalloc_order_trace+0x1d/0xb0 ipmi_create_user+0x55/0x2c0 [ipmi_msghandler] ipmi_open+0x72/0x110 [ipmi_devintf] chrdev_open+0xcb/0x1e0 do_dentry_open+0x1ce/0x380 path_openat+0x305/0x14f0 do_filp_open+0x9b/0x110 do_sys_open+0x1bd/0x250 do_syscall_64+0x5b/0x1f0 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Using vzalloc/vfree for creating ipmi_user heals the problem. Signed-off-by: Feng Tang --- drivers/char/ipmi/ipmi_msghandler.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/char/ipmi/ipmi_msghandler.c b/drivers/char/ipmi/ipmi_msghandler.c index c48d8f0..96f1573 100644 --- a/drivers/char/ipmi/ipmi_msghandler.c +++ b/drivers/char/ipmi/ipmi_msghandler.c @@ -1153,7 +1153,7 @@ static void free_user_work(struct work_struct *work) remove_work); cleanup_srcu_struct(&user->release_barrier); - kfree(user); + vfree(user); } int ipmi_create_user(unsigned int if_num, @@ -1185,7 +1185,7 @@ int ipmi_create_user(unsigned int if_num, if (rv) return rv; - new_user = kmalloc(sizeof(*new_user), GFP_KERNEL); + new_user = vzalloc(sizeof(*new_user)); if (!new_user) return -ENOMEM; @@ -1232,7 +1232,7 @@ int ipmi_create_user(unsigned int if_num, out_kfree: srcu_read_unlock(&ipmi_interfaces_srcu, index); - kfree(new_user); + vfree(new_user); return rv; } EXPORT_SYMBOL(ipmi_create_user); -- 2.7.4