[PW_SID:1066745] [bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE#1610
[PW_SID:1066745] [bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE#1610linux-riscv-bot wants to merge 1 commit intoworkflow__riscv__fixesfrom
Conversation
kmalloc_nolock always fails for architectures that lack cmpxchg16b. For example, this causes bpf_task_storage_get with flag BPF_LOCAL_STORAGE_GET_F_CREATE to fails on riscv64 6.19 kernel. Fix it by enabling use_kmalloc_nolock only when HAVE_CMPXCHG_DOUBLE. But leave the PREEMPT_RT case as is because it requires kmalloc_nolock for correctness. Add a comment about this limitation that architecture's lack of CMPXCHG_DOUBLE combined with PREEMPT_RT could make bpf_local_storage_alloc always fail. Fixes: f484f4a ("bpf: Replace bpf memory allocator with kmalloc_nolock() in local storage") Cc: stable@vger.kernel.org Signed-off-by: Levi Zim <rsworktech@outlook.com> Signed-off-by: Linux RISC-V bot <linux.riscv.bot@gmail.com>
|
Patch 1: "[bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE" |
|
Patch 1: "[bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE" |
|
Patch 1: "[bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE" |
|
Patch 1: "[bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE" |
|
Patch 1: "[bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE" |
|
Patch 1: "[bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE" |
|
Patch 1: "[bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE" |
|
Patch 1: "[bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE" |
|
Patch 1: "[bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE" |
|
Patch 1: "[bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE" |
|
Patch 1: "[bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE" |
|
Patch 1: "[bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE" |
PR for series 1066745 applied to workflow__riscv__fixes
Name: [bpf,v3] bpf: do not use kmalloc_nolock when !HAVE_CMPXCHG_DOUBLE
URL: https://patchwork.kernel.org/project/linux-riscv/list/?series=1066745
Version: 3