Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp3334889rwd; Mon, 22 May 2023 12:06:19 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5/j9My8kWPQMrD5SMHggT4Jc0K64dNgrM1VV0/StIrc2DHEoIq5g/3KeRw3DEZ7+uVhNJb X-Received: by 2002:a05:6a00:22d4:b0:64d:3227:b806 with SMTP id f20-20020a056a0022d400b0064d3227b806mr17311861pfj.33.1684782379135; Mon, 22 May 2023 12:06:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684782379; cv=none; d=google.com; s=arc-20160816; b=in3hCI0dgXxMQDlJe9Cka3ukUi2J8HA9xyEQ138SIuft9a+ZaFLTeGrYEgpimvNLvQ mij5NkEXbW39qJMAok4vY7ago95qju9voPHbys+lclgjQVL+0qM+SKdT/17WcobGt8rx wgRrSYUkUFYPdw036GC9eaSmxlbMC0HpMPiJRh5ovPFuq5uziEfYW8eQRUEZYceePcfM P5NkwIUgrteZsVbhHF1BZBB2Q0dzxn1Jc3hf97Nv5jFr+TKFI91yiXiM9MHTRGxadabx d7dm6MNIlQL0aEYVIZMnNNVq1tEwG2lxpSFVBLXUsEcOFHDYan3yVIiPGJPgP1wED+BH eCDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=kE1YGTh9d+XFdvUdt9kLMAcbrISnJqMCKvDPYim3xk0=; b=GMzwD4+0Blw3YKlmEp6RG0jc6U4n3OdTKTRi1UQ7Es6VMAgwFRoXANmhSAwkevv3BB CUAyEXcN+p6e1U1fQXJMmIEx2PU/oIA6EKxtavgsMXYLG889anWVZ88cyzdWyM5TPatM /E7cKu9P3ogrSB1khMkez1RBsizPzWxZOCf2Hd22pSVmuioSSmhMe5zj+ihaNoSyQTsq 7cx9vf1eZ4OIKawWv4xnMyqYVI2338/ftQ1BxKUBWTXC6k79iMEhOx+1umphkB2pfSGf 7xJf1I4hihd5hwxE8vZ3/z+lJoYCrZio7YzvwHNi0nFu0uIclD8cm1YsnUMiIzss85/s jV0w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b="n2/HPeqV"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x17-20020a63b211000000b0050bfa82c23bsi421475pge.230.2023.05.22.12.06.04; Mon, 22 May 2023 12:06:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b="n2/HPeqV"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231966AbjEVShl (ORCPT + 99 others); Mon, 22 May 2023 14:37:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47670 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229916AbjEVShk (ORCPT ); Mon, 22 May 2023 14:37:40 -0400 Received: from mail-qt1-x833.google.com (mail-qt1-x833.google.com [IPv6:2607:f8b0:4864:20::833]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5B023FE for ; Mon, 22 May 2023 11:37:38 -0700 (PDT) Received: by mail-qt1-x833.google.com with SMTP id d75a77b69052e-3f389c21fe8so29540431cf.3 for ; Mon, 22 May 2023 11:37:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1684780657; x=1687372657; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=kE1YGTh9d+XFdvUdt9kLMAcbrISnJqMCKvDPYim3xk0=; b=n2/HPeqVEZWy94HrQrqzpMVvrl8ot28r4dGOugqG0lH3NmFZPilmgiPUXx/ZmabsCE pZZO+fv+LxjFa/JcmhLZrxIVO9tlxxyNJmppY8JIpZduWebGSB9u/e6ByyFEPx0eJXk9 e9fzE7yTHOyOeqBrK2VCPLjmlU/sV5fC+7pgN18LadnrXNr5+ehBkOhf+4f2R5wYNVkr 0+NwRHlKqDuN+rTSBvMWsG97KbmkoTistkEe4sBHKJ7PQqzSINJiwobu3NUBqGPBvYTV qOrsPSRCciGjoYRy/jvs7UKjSEdacvD2yV+nPEg6kOsEZTc4XoJ7zOG+5F8pI0XAaz6/ sV4Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1684780657; x=1687372657; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=kE1YGTh9d+XFdvUdt9kLMAcbrISnJqMCKvDPYim3xk0=; b=YT3CY6zvpaeVaJs1acQM8w7OeaptMRL8OHffrSU7DQfUrV6GjMdfZwkSLTdUFFRbKq tsP7w70sGxuVC317ICyt8scN1yU+3EpVgaHVzyK/Grg2kondI2G0vuGvEtujnQjbDMO7 xhSKkle2ymtbqeWqARP3c4xPkg3TeNTTUm4vbWAZPf7k4TcX7HDgKfI/UsWZeA/G8mqG +bgJxl45MpFq8tOi+E+tgnRBe90lEGeV1lIKAK2w3altoO1mLKj2o51YStfxD7L6Pcqp UgwIdr+b/atFA8lt/sIqL6LrLySpuiWhb+2jXhHR/VDEfWQCKMG3QWX43GhoNnpgkhvT FGGw== X-Gm-Message-State: AC+VfDwZ+T+pn/LSDLMfL5M96ILP4d4vZJ+MXl4M8ZlgNATnEFx7eqCL 5EP0l7bSmXw6/+Hu6LP2+iAN3yq+fmNRN17w+Aq0lQ== X-Received: by 2002:a05:622a:85:b0:3f5:3659:4901 with SMTP id o5-20020a05622a008500b003f536594901mr19532832qtw.20.1684780657335; Mon, 22 May 2023 11:37:37 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Nick Desaulniers Date: Mon, 22 May 2023 11:37:26 -0700 Message-ID: Subject: Re: Stable backport request: skbuff: Proactively round up to kmalloc bucket size To: =?UTF-8?B?RGFuaWVsIETDrWF6?= Cc: Greg Kroah-Hartman , Sasha Levin , linux- stable , open list , Kees Cook , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , "open list:NETWORKING [GENERAL]" , rientjes@google.com, vbabka@suse.cz, Sumit Semwal , clang-built-linux Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 22, 2023 at 11:24=E2=80=AFAM Daniel D=C3=ADaz wrote: > > Hello! > > Would the stable maintainers please consider backporting the following > commit to the 6.1? We are trying to build gki_defconfig (plus a few Does android's gki_defconfig fail to boot on the `android14-6.1` branch of https://android.googlesource.com/kernel/common? (i.e. downstream branch from linux stable's linux-6.1.y)? We just ran CI successfully on that branch 10 hours ago. https://github.com/ClangBuiltLinux/continuous-integration2/actions/runs/504= 2504560/jobs/9045030265 Do you have more information on the observed boot failure? (panic splat?) > extras) on Arm64 and test it under Qemu-arm64, but it fails to boot. > Bisection has pointed here. > > We have verified that cherry-picking this patch on top of v6.1.29 > applies cleanly and allows the kernel to boot. > > commit 12d6c1d3a2ad0c199ec57c201cdc71e8e157a232 > Author: Kees Cook > Date: Tue Oct 25 15:39:35 2022 -0700 > > skbuff: Proactively round up to kmalloc bucket size > > Instead of discovering the kmalloc bucket size _after_ allocation, ro= und > up proactively so the allocation is explicitly made for the full size= , > allowing the compiler to correctly reason about the resulting size of > the buffer through the existing __alloc_size() hint. > > This will allow for kernels built with CONFIG_UBSAN_BOUNDS or the > coming dynamic bounds checking under CONFIG_FORTIFY_SOURCE to gain > back the __alloc_size() hints that were temporarily reverted in commi= t > 93dd04ab0b2b ("slab: remove __alloc_size attribute from > __kmalloc_track_caller") > > Cc: "David S. Miller" > Cc: Eric Dumazet > Cc: Jakub Kicinski > Cc: Paolo Abeni > Cc: netdev@vger.kernel.org > Cc: Greg Kroah-Hartman > Cc: Nick Desaulniers > Cc: David Rientjes > Acked-by: Vlastimil Babka > Link: https://patchwork.kernel.org/project/netdevbpf/patch/2022102123= 4713.you.031-kees@kernel.org/ > Signed-off-by: Kees Cook > Link: https://lore.kernel.org/r/20221025223811.up.360-kees@kernel.org > Signed-off-by: Paolo Abeni > > > Thanks and greetings! > > Daniel D=C3=ADaz > daniel.diaz@linaro.org --=20 Thanks, ~Nick Desaulniers