[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160826161841.GA20794@breakpoint.cc>
Date: Fri, 26 Aug 2016 18:18:41 +0200
From: Florian Westphal <fw@...len.de>
To: Eric Dumazet <eric.dumazet@...il.com>
Cc: David Miller <davem@...emloft.net>, CAI Qian <caiqian@...hat.com>,
Thomas Graf <tgraf@...g.ch>,
Herbert Xu <herbert@...dor.apana.org.au>,
Eric Dumazet <edumazet@...gle.com>,
Network Development <netdev@...r.kernel.org>,
Linus Torvalds <torvalds@...ux-foundation.org>,
Florian Westphal <fw@...len.de>
Subject: Re: [PATCH net] rhashtable: fix a memory leak in alloc_bucket_locks()
Eric Dumazet <eric.dumazet@...il.com> wrote:
> From: Eric Dumazet <edumazet@...gle.com>
>
> If vmalloc() was successful, do not attempt a kmalloc_array()
>
> Fixes: 4cf0b354d92e ("rhashtable: avoid large lock-array allocations")
> Reported-by: CAI Qian <caiqian@...hat.com>
> Signed-off-by: Eric Dumazet <edumazet@...gle.com>
> Cc: Florian Westphal <fw@...len.de>
> ---
> lib/rhashtable.c | 7 ++++---
> 1 file changed, 4 insertions(+), 3 deletions(-)
>
> diff --git a/lib/rhashtable.c b/lib/rhashtable.c
> index 5ba520b544d7..56054e541a0f 100644
> --- a/lib/rhashtable.c
> +++ b/lib/rhashtable.c
> @@ -77,17 +77,18 @@ static int alloc_bucket_locks(struct rhashtable *ht, struct bucket_table *tbl,
> size = min_t(unsigned int, size, tbl->size >> 1);
>
> if (sizeof(spinlock_t) != 0) {
> + tbl->locks = NULL;
> #ifdef CONFIG_NUMA
> if (size * sizeof(spinlock_t) > PAGE_SIZE &&
> gfp == GFP_KERNEL)
> tbl->locks = vmalloc(size * sizeof(spinlock_t));
> - else
> #endif
Argh.
Thanks Eric for fixing this :-/
Powered by blists - more mailing lists