mirror of
https://github.com/torvalds/linux.git
synced 2024-11-28 15:11:31 +00:00
slub: fix kmemcheck calls to match ksize() hints
Recent use of ksize() in network stack (commit ca44ac38
: net: don't
reallocate skb->head unless the current one hasn't the needed extra size
or is shared) triggers kmemcheck warnings, because ksize() can return
more space than kmemcheck is aware of.
Pekka Enberg noticed SLAB+kmemcheck is doing the right thing, while SLUB
+kmemcheck doesnt.
Bugzilla reference #27212
Reported-by: Christian Casteyde <casteyde.christian@free.fr>
Suggested-by: Pekka Enberg <penberg@kernel.org>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Acked-by: David S. Miller <davem@davemloft.net>
Acked-by: David Rientjes <rientjes@google.com>
Acked-by: Christoph Lameter <cl@linux.com>
CC: Changli Gao <xiaosuo@gmail.com>
CC: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Pekka Enberg <penberg@kernel.org>
This commit is contained in:
parent
63310467a3
commit
b3d41885d9
49
mm/slub.c
49
mm/slub.c
@ -797,10 +797,34 @@ static inline int slab_pre_alloc_hook(struct kmem_cache *s, gfp_t flags)
|
|||||||
return should_failslab(s->objsize, flags, s->flags);
|
return should_failslab(s->objsize, flags, s->flags);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static inline size_t slab_ksize(const struct kmem_cache *s)
|
||||||
|
{
|
||||||
|
#ifdef CONFIG_SLUB_DEBUG
|
||||||
|
/*
|
||||||
|
* Debugging requires use of the padding between object
|
||||||
|
* and whatever may come after it.
|
||||||
|
*/
|
||||||
|
if (s->flags & (SLAB_RED_ZONE | SLAB_POISON))
|
||||||
|
return s->objsize;
|
||||||
|
|
||||||
|
#endif
|
||||||
|
/*
|
||||||
|
* If we have the need to store the freelist pointer
|
||||||
|
* back there or track user information then we can
|
||||||
|
* only use the space before that information.
|
||||||
|
*/
|
||||||
|
if (s->flags & (SLAB_DESTROY_BY_RCU | SLAB_STORE_USER))
|
||||||
|
return s->inuse;
|
||||||
|
/*
|
||||||
|
* Else we can use all the padding etc for the allocation
|
||||||
|
*/
|
||||||
|
return s->size;
|
||||||
|
}
|
||||||
|
|
||||||
static inline void slab_post_alloc_hook(struct kmem_cache *s, gfp_t flags, void *object)
|
static inline void slab_post_alloc_hook(struct kmem_cache *s, gfp_t flags, void *object)
|
||||||
{
|
{
|
||||||
flags &= gfp_allowed_mask;
|
flags &= gfp_allowed_mask;
|
||||||
kmemcheck_slab_alloc(s, flags, object, s->objsize);
|
kmemcheck_slab_alloc(s, flags, object, slab_ksize(s));
|
||||||
kmemleak_alloc_recursive(object, s->objsize, 1, s->flags, flags);
|
kmemleak_alloc_recursive(object, s->objsize, 1, s->flags, flags);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2690,7 +2714,6 @@ EXPORT_SYMBOL(__kmalloc_node);
|
|||||||
size_t ksize(const void *object)
|
size_t ksize(const void *object)
|
||||||
{
|
{
|
||||||
struct page *page;
|
struct page *page;
|
||||||
struct kmem_cache *s;
|
|
||||||
|
|
||||||
if (unlikely(object == ZERO_SIZE_PTR))
|
if (unlikely(object == ZERO_SIZE_PTR))
|
||||||
return 0;
|
return 0;
|
||||||
@ -2701,28 +2724,8 @@ size_t ksize(const void *object)
|
|||||||
WARN_ON(!PageCompound(page));
|
WARN_ON(!PageCompound(page));
|
||||||
return PAGE_SIZE << compound_order(page);
|
return PAGE_SIZE << compound_order(page);
|
||||||
}
|
}
|
||||||
s = page->slab;
|
|
||||||
|
|
||||||
#ifdef CONFIG_SLUB_DEBUG
|
return slab_ksize(page->slab);
|
||||||
/*
|
|
||||||
* Debugging requires use of the padding between object
|
|
||||||
* and whatever may come after it.
|
|
||||||
*/
|
|
||||||
if (s->flags & (SLAB_RED_ZONE | SLAB_POISON))
|
|
||||||
return s->objsize;
|
|
||||||
|
|
||||||
#endif
|
|
||||||
/*
|
|
||||||
* If we have the need to store the freelist pointer
|
|
||||||
* back there or track user information then we can
|
|
||||||
* only use the space before that information.
|
|
||||||
*/
|
|
||||||
if (s->flags & (SLAB_DESTROY_BY_RCU | SLAB_STORE_USER))
|
|
||||||
return s->inuse;
|
|
||||||
/*
|
|
||||||
* Else we can use all the padding etc for the allocation
|
|
||||||
*/
|
|
||||||
return s->size;
|
|
||||||
}
|
}
|
||||||
EXPORT_SYMBOL(ksize);
|
EXPORT_SYMBOL(ksize);
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user