Patch "slub/kunit: fix a WARNING due to unwrapped __kmalloc_cache_noprof" has been added to the 6.11-stable tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This is a note to let you know that I've just added the patch titled

    slub/kunit: fix a WARNING due to unwrapped __kmalloc_cache_noprof

to the 6.11-stable tree which can be found at:
    http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary

The filename of the patch is:
     slub-kunit-fix-a-warning-due-to-unwrapped-__kmalloc_.patch
and it can be found in the queue-6.11 subdirectory.

If you, or anyone else, feels it should not be added to the stable tree,
please let <stable@xxxxxxxxxxxxxxx> know about it.



commit da719a7ef62a08aadd760b6f0cd966fd63242629
Author: Pei Xiao <xiaopei01@xxxxxxxxxx>
Date:   Wed Oct 23 14:21:17 2024 +0800

    slub/kunit: fix a WARNING due to unwrapped __kmalloc_cache_noprof
    
    [ Upstream commit 2b059d0d1e624adc6e69a754bc48057f8bf459dc ]
    
    'modprobe slub_kunit' will have a warning as shown below. The root cause
    is that __kmalloc_cache_noprof was directly used, which resulted in no
    alloc_tag being allocated. This caused current->alloc_tag to be null,
    leading to a warning in alloc_tag_add_check.
    
    Let's add an alloc_hook layer to __kmalloc_cache_noprof specifically
    within lib/slub_kunit.c, which is the only user of this internal slub
    function outside kmalloc implementation itself.
    
    [58162.947016] WARNING: CPU: 2 PID: 6210 at
    ./include/linux/alloc_tag.h:125 alloc_tagging_slab_alloc_hook+0x268/0x27c
    [58162.957721] Call trace:
    [58162.957919]  alloc_tagging_slab_alloc_hook+0x268/0x27c
    [58162.958286]  __kmalloc_cache_noprof+0x14c/0x344
    [58162.958615]  test_kmalloc_redzone_access+0x50/0x10c [slub_kunit]
    [58162.959045]  kunit_try_run_case+0x74/0x184 [kunit]
    [58162.959401]  kunit_generic_run_threadfn_adapter+0x2c/0x4c [kunit]
    [58162.959841]  kthread+0x10c/0x118
    [58162.960093]  ret_from_fork+0x10/0x20
    [58162.960363] ---[ end trace 0000000000000000 ]---
    
    Signed-off-by: Pei Xiao <xiaopei01@xxxxxxxxxx>
    Fixes: a0a44d9175b3 ("mm, slab: don't wrap internal functions with alloc_hooks()")
    Signed-off-by: Vlastimil Babka <vbabka@xxxxxxx>
    Signed-off-by: Sasha Levin <sashal@xxxxxxxxxx>

diff --git a/lib/slub_kunit.c b/lib/slub_kunit.c
index e6667a28c0149..af5b9c41d5b30 100644
--- a/lib/slub_kunit.c
+++ b/lib/slub_kunit.c
@@ -140,7 +140,7 @@ static void test_kmalloc_redzone_access(struct kunit *test)
 {
 	struct kmem_cache *s = test_kmem_cache_create("TestSlub_RZ_kmalloc", 32,
 				SLAB_KMALLOC|SLAB_STORE_USER|SLAB_RED_ZONE);
-	u8 *p = __kmalloc_cache_noprof(s, GFP_KERNEL, 18);
+	u8 *p = alloc_hooks(__kmalloc_cache_noprof(s, GFP_KERNEL, 18));
 
 	kasan_disable_current();
 




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux