Andrey Konovalov
authored
Commit 29d7355a ("kasan: save alloc stack traces for mempool") messed up one of the calls to unpoison_slab_object: the last two arguments are supposed to be GFP flags and whether to init the object memory. Fix the call. Without this fix, __kasan_mempool_unpoison_object provides the object's size as GFP flags to unpoison_slab_object, which can cause LOCKDEP reports (and probably other issues). Link: https://lkml.kernel.org/r/20240614143238.60323-1-andrey.konovalov@linux.dev Fixes: 29d7355a ("kasan: save alloc stack traces for mempool") Signed-off-by:Andrey Konovalov <andreyknvl@gmail.com> Reported-by:
Brad Spengler <spender@grsecurity.net> Acked-by:
Marco Elver <elver@google.com> Cc: <stable@vger.kernel.org> Signed-off-by:
Andrew Morton <akpm@linux-foundation.org>
Name | Last commit | Last update |
---|---|---|
.. | ||
Makefile | ||
common.c | ||
generic.c | ||
hw_tags.c | ||
init.c | ||
kasan.h | ||
kasan_test.c | ||
kasan_test_module.c | ||
quarantine.c | ||
report.c | ||
report_generic.c | ||
report_hw_tags.c | ||
report_sw_tags.c | ||
report_tags.c | ||
shadow.c | ||
sw_tags.c | ||
tags.c |