From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752080AbeEVKPC (ORCPT ); Tue, 22 May 2018 06:15:02 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:45382 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751760AbeEVKIC (ORCPT ); Tue, 22 May 2018 06:08:02 -0400 From: David Hildenbrand To: linux-mm@kvack.org Cc: linux-kernel@vger.kernel.org, David Hildenbrand , Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , kasan-dev@googlegroups.com (open list:KASAN) Subject: [PATCH v2 1/2] kasan: free allocated shadow memory on MEM_CANCEL_ONLINE Date: Tue, 22 May 2018 12:07:55 +0200 Message-Id: <20180522100756.18478-2-david@redhat.com> In-Reply-To: <20180522100756.18478-1-david@redhat.com> References: <20180522100756.18478-1-david@redhat.com> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We have to free memory again when we cancel onlining, otherwise a later onlining attempt will fail. Signed-off-by: David Hildenbrand --- mm/kasan/kasan.c | 1 + 1 file changed, 1 insertion(+) diff --git a/mm/kasan/kasan.c b/mm/kasan/kasan.c index 135ce2838c89..53564229674b 100644 --- a/mm/kasan/kasan.c +++ b/mm/kasan/kasan.c @@ -867,6 +867,7 @@ static int __meminit kasan_mem_notifier(struct notifier_block *nb, kmemleak_ignore(ret); return NOTIFY_OK; } + case MEM_CANCEL_ONLINE: case MEM_OFFLINE: { struct vm_struct *vm; -- 2.17.0