[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140331130417.GG22728@two.firstfloor.org>
Date: Mon, 31 Mar 2014 15:04:17 +0200
From: Andi Kleen <andi@...stfloor.org>
To: Prarit Bhargava <prarit@...hat.com>
Cc: linux-kernel@...r.kernel.org, Andi Kleen <andi@...stfloor.org>,
Josh Boyer <jwboyer@...oraproject.org>,
Rob Landley <rob@...dley.net>,
Andrew Morton <akpm@...ux-foundation.org>,
Steven Rostedt <rostedt@...dmis.org>,
Ingo Molnar <mingo@...nel.org>,
Peter Zijlstra <peterz@...radead.org>,
Frederic Weisbecker <fweisbec@...il.com>,
linux-doc@...r.kernel.org
Subject: Re: [PATCH] Add initcall_blacklist kernel parameter [v2]
> do_initcall_level(level);
> +
> + list_for_each_safe(tmp, next, &blacklisted_initcalls) {
> + entry = list_entry(tmp, struct blacklist_entry, next);
> + free_bootmem(entry->buf, strlen(entry->buf));
> + free_bootmem(entry, sizeof(*entry));
Does that really work? At this point the bootmem allocator should
be already finished, so no memory will be freed.
For this case it's probably ok to leak it.
Alternatively you could use static arrays and storing pointer/len.
-Andi
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists