linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: Suren Baghdasaryan <surenb@google.com>
To: Vlastimil Babka <vbabka@suse.cz>
Cc: ranxiaokai627@163.com, akpm@linux-foundation.org, cl@gentwo.org,
	 rientjes@google.com, roman.gushchin@linux.dev,
	harry.yoo@oracle.com,  usamaarif642@gmail.com,
	shakeel.butt@linux.dev, hannes@cmpxchg.org,
	 linux-kernel@vger.kernel.org, linux-mm@kvack.org,
	ran.xiaokai@zte.com.cn
Subject: Re: [PATCH linux-next] alloc_tag: Fix boot failure due to NULL pointer dereference
Date: Fri, 26 Sep 2025 08:36:11 -0700	[thread overview]
Message-ID: <CAJuCfpHhOohLKDkVKiY11tHnuKLr1C=ffVqUY3BpV+30kDZjgQ@mail.gmail.com> (raw)
In-Reply-To: <96d00a94-1a4b-4378-8d89-0554f89778e1@suse.cz>

On Fri, Sep 26, 2025 at 5:48 AM Vlastimil Babka <vbabka@suse.cz> wrote:
>
> On 9/26/25 10:06, ranxiaokai627@163.com wrote:
> > From: Ran Xiaokai <ran.xiaokai@zte.com.cn>
> >
> > There is a boot failure when both CONFIG_DEBUG_KMEMLEAK and
> > CONFIG_MEM_ALLOC_PROFILING are enabled.
> >
> > BUG: kernel NULL pointer dereference, address: 0000000000000000
> > RIP: 0010:__alloc_tagging_slab_alloc_hook+0x181/0x2f0
> > Call Trace:
> >  kmem_cache_alloc_noprof+0x1c8/0x5c0
> >  __alloc_object+0x2f/0x290
> >  __create_object+0x22/0x80
> >  kmemleak_init+0x122/0x190
> >  mm_core_init+0xb6/0x160
> >  start_kernel+0x39f/0x920
> >  x86_64_start_reservations+0x18/0x30
> >  x86_64_start_kernel+0x104/0x120
> >  common_startup_64+0x12c/0x138
> >
> > In kmemleak, mem_pool_alloc() directly calls kmem_cache_alloc_noprof(),
> > as a result, the alloc_tag structure associated with object_cache is not
> > defined neither initialized. So current->alloc_tag is NULL,
> > leading to a null pointer dereference.
>
> Agree with Harry. This should be enough:
>
> "as a result, current->alloc_tag is NULL, leading to a null pointer
> dereference."

Yes, that's much more clear.

>
> > Move the checks for SLAB_NO_OBJ_EXT, SLAB_NOLEAKTRACE, and
> > __GFP_NO_OBJ_EXT to the parent function __alloc_tagging_slab_alloc_hook()
> > to fix this.
> >
> > Also this distinguishes the SLAB_NOLEAKTRACE case between the actual memory
> > allocation failures case, make CODETAG_FLAG_INACCURATE more accurate.

Awsome!

>
> Good point.
>
> > Fixes: b9e2f58ffb84 ("alloc_tag: mark inaccurate allocation counters in /proc/allocinfo output")
>
> That's in mm-stable so the fix should go there (probably too late to fold
> now) if it's to be in the merge window PR.
>
> > Signed-off-by: Ran Xiaokai <ran.xiaokai@zte.com.cn>
>
> Acked-by: Vlastimil Babka <vbabka@suse.cz>

Reviewed-by: Suren Baghdasaryan <surenb@google.com>

Thanks for the fix!

>
> > ---
> >  mm/slub.c | 18 +++++++++---------
> >  1 file changed, 9 insertions(+), 9 deletions(-)
> >
> > diff --git a/mm/slub.c b/mm/slub.c
> > index 867a07260acf..09cbe580842c 100644
> > --- a/mm/slub.c
> > +++ b/mm/slub.c
> > @@ -2197,15 +2197,6 @@ prepare_slab_obj_exts_hook(struct kmem_cache *s, gfp_t flags, void *p)
> >  {
> >       struct slab *slab;
> >
> > -     if (!p)
> > -             return NULL;
> > -
> > -     if (s->flags & (SLAB_NO_OBJ_EXT | SLAB_NOLEAKTRACE))
> > -             return NULL;
> > -
> > -     if (flags & __GFP_NO_OBJ_EXT)
> > -             return NULL;
> > -
> >       slab = virt_to_slab(p);
> >       if (!slab_obj_exts(slab) &&
> >           alloc_slab_obj_exts(slab, s, flags, false)) {
> > @@ -2223,6 +2214,15 @@ __alloc_tagging_slab_alloc_hook(struct kmem_cache *s, void *object, gfp_t flags)
> >  {
> >       struct slabobj_ext *obj_exts;
> >
> > +     if (!object)
> > +             return;
> > +
> > +     if (s->flags & (SLAB_NO_OBJ_EXT | SLAB_NOLEAKTRACE))
> > +             return;
> > +
> > +     if (flags & __GFP_NO_OBJ_EXT)
> > +             return;
> > +
> >       obj_exts = prepare_slab_obj_exts_hook(s, flags, object);
> >       /*
> >        * Currently obj_exts is used only for allocation profiling.
>


      reply	other threads:[~2025-09-26 15:36 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-09-26  8:06 ranxiaokai627
2025-09-26  8:54 ` Harry Yoo
2025-09-26 12:48 ` Vlastimil Babka
2025-09-26 15:36   ` Suren Baghdasaryan [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAJuCfpHhOohLKDkVKiY11tHnuKLr1C=ffVqUY3BpV+30kDZjgQ@mail.gmail.com' \
    --to=surenb@google.com \
    --cc=akpm@linux-foundation.org \
    --cc=cl@gentwo.org \
    --cc=hannes@cmpxchg.org \
    --cc=harry.yoo@oracle.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=ran.xiaokai@zte.com.cn \
    --cc=ranxiaokai627@163.com \
    --cc=rientjes@google.com \
    --cc=roman.gushchin@linux.dev \
    --cc=shakeel.butt@linux.dev \
    --cc=usamaarif642@gmail.com \
    --cc=vbabka@suse.cz \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox