Re: FAILED: patch "[PATCH] mm: kfence: fix using kfence_metadata without initialization" failed to apply to 5.15-stable tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> On Mar 28, 2023, at 21:19, Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx> wrote:
> 
> On Tue, Mar 28, 2023 at 09:02:27PM +0800, Muchun Song wrote:
>> 
>> 
>> On 2023/3/28 20:01, gregkh@xxxxxxxxxxxxxxxxxxx wrote:
>>> The patch below does not apply to the 5.15-stable tree.
>>> If someone wants it applied there, or to any other stable or longterm
>>> tree, then please email the backport, including the original git commit
>>> id to <stable@xxxxxxxxxxxxxxx>.
>>> 
>>> To reproduce the conflict and resubmit, you may use the following commands:
>>> 
>>> git fetch https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/ linux-5.15.y
>>> git checkout FETCH_HEAD
>>> git cherry-pick -x 1c86a188e03156223a34d09ce290b49bd4dd0403
>>> # <resolve conflicts, build, test, etc.>
>>> git commit -s
>>> git send-email --to '<stable@xxxxxxxxxxxxxxx>' --in-reply-to '16800049118459@xxxxxxxxx' --subject-prefix 'PATCH 5.15.y' HEAD^..
>>> 
>>> Possible dependencies:
>>> 
>>> 1c86a188e031 ("mm: kfence: fix using kfence_metadata without initialization in show_object()")
>>> b33f778bba5e ("kfence: alloc kfence_pool after system startup")
>>> 698361bca2d5 ("kfence: allow re-enabling KFENCE after system startup")
>>> 07e8481d3c38 ("kfence: always use static branches to guard kfence_alloc()")
>>> 08f6b10630f2 ("kfence: limit currently covered allocations when pool nearly full")
>>> a9ab52bbcb52 ("kfence: move saving stack trace of allocations into __kfence_alloc()")
>>> 9a19aeb56650 ("kfence: count unexpectedly skipped allocations")
>>> 
>>> thanks,
>>> 
>>> greg k-h
>>> 
>>> ------------------ original commit in Linus's tree ------------------
>>> 
>>> From 1c86a188e03156223a34d09ce290b49bd4dd0403 Mon Sep 17 00:00:00 2001
>>> From: Muchun Song <muchun.song@xxxxxxxxx>
>>> Date: Wed, 15 Mar 2023 11:44:41 +0800
>>> Subject: [PATCH] mm: kfence: fix using kfence_metadata without initialization
>>>  in show_object()
>>> 
>>> The variable kfence_metadata is initialized in kfence_init_pool(), then,
>>> it is not initialized if kfence is disabled after booting.  In this case,
>>> kfence_metadata will be used (e.g.  ->lock and ->state fields) without
>>> initialization when reading /sys/kernel/debug/kfence/objects.  There will
>>> be a warning if you enable CONFIG_DEBUG_SPINLOCK.  Fix it by creating
>>> debugfs files when necessary.
>>> 
>>> Link: https://lkml.kernel.org/r/20230315034441.44321-1-songmuchun@xxxxxxxxxxxxx
>>> Fixes: 0ce20dd84089 ("mm: add Kernel Electric-Fence infrastructure")
>>> Signed-off-by: Muchun Song <songmuchun@xxxxxxxxxxxxx>
>>> Tested-by: Marco Elver <elver@xxxxxxxxxx>
>>> Reviewed-by: Marco Elver <elver@xxxxxxxxxx>
>>> Cc: Alexander Potapenko <glider@xxxxxxxxxx>
>>> Cc: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
>>> Cc: Jann Horn <jannh@xxxxxxxxxx>
>>> Cc: SeongJae Park <sjpark@xxxxxxxxx>
>>> Cc: <stable@xxxxxxxxxxxxxxx>
>>> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
>>> 
>>> diff --git a/mm/kfence/core.c b/mm/kfence/core.c
>>> index 5349c37a5dac..79c94ee55f97 100644
>>> --- a/mm/kfence/core.c
>>> +++ b/mm/kfence/core.c
>>> @@ -726,10 +726,14 @@ static const struct seq_operations objects_sops = {
>>>  };
>>>  DEFINE_SEQ_ATTRIBUTE(objects);
>>> -static int __init kfence_debugfs_init(void)
>>> +static int kfence_debugfs_init(void)
>>>  {
>>> - struct dentry *kfence_dir = debugfs_create_dir("kfence", NULL);
>>> + struct dentry *kfence_dir;
>>> + if (!READ_ONCE(kfence_enabled))
>>> + return 0;
>>> +
>>> + kfence_dir = debugfs_create_dir("kfence", NULL);
>>>   debugfs_create_file("stats", 0444, kfence_dir, NULL, &stats_fops);
>>>   debugfs_create_file("objects", 0400, kfence_dir, NULL, &objects_fops);
>>>   return 0;
>>> @@ -883,6 +887,8 @@ static int kfence_init_late(void)
>>>   }
>>>   kfence_init_enable();
>>> + kfence_debugfs_init();
>>> +
>>>   return 0;
>>>  }
>> 
>> I have implemented a following patch based on v5.15 branch.
>> 
>> From ba26f344fa3e477456a3cc60488a7b8e5af0e88d Mon Sep 17 00:00:00 2001
>> From: Muchun Song <songmuchun@xxxxxxxxxxxxx>
>> Date: Wed, 15 Mar 2023 11:44:41 +0800
>> Subject: [PATCH] mm: kfence: fix using kfence_metadata without
>> initialization
>>  in show_object()
>> 
>> The variable kfence_metadata is initialized in kfence_init_pool(), then,
>> it is not initialized if kfence is disabled after booting.  In this case,
>> kfence_metadata will be used (e.g.  ->lock and ->state fields) without
>> initialization when reading /sys/kernel/debug/kfence/objects.  There will
>> be a warning if you enable CONFIG_DEBUG_SPINLOCK.  Fix it by creating
>> debugfs files when necessary.
>> 
>> Link:
>> https://lkml.kernel.org/r/20230315034441.44321-1-songmuchun@xxxxxxxxxxxxx
>> Fixes: 0ce20dd84089 ("mm: add Kernel Electric-Fence infrastructure")
>> Signed-off-by: Muchun Song <songmuchun@xxxxxxxxxxxxx>
>> Tested-by: Marco Elver <elver@xxxxxxxxxx>
>> Reviewed-by: Marco Elver <elver@xxxxxxxxxx>
>> Cc: Alexander Potapenko <glider@xxxxxxxxxx>
>> Cc: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
>> Cc: Jann Horn <jannh@xxxxxxxxxx>
>> Cc: SeongJae Park <sjpark@xxxxxxxxx>
>> Cc: <stable@xxxxxxxxxxxxxxx>
>> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
>> ---
>>  mm/kfence/core.c | 8 ++++++--
>>  1 file changed, 6 insertions(+), 2 deletions(-)
>> 
>> diff --git a/mm/kfence/core.c b/mm/kfence/core.c
>> index 39a6c434e355..573f34e6af0b 100644
>> --- a/mm/kfence/core.c
>> +++ b/mm/kfence/core.c
>> @@ -678,10 +678,14 @@ static const struct file_operations objects_fops = {
>>      .release = seq_release,
>>  };
>> 
> 
> Patch is corrupted with the whitespace eaten by your email client.  Can
> you resend this in a format that it can be applied?

I attach it here. Could you apply it? Thanks.

Attachment: 0001-mm-kfence-fix-using-kfence_metadata-without-initiali.patch
Description: Binary data

> 
> thanks,
> 
> greg k-h



[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux