From patchwork Fri May 12 19:02:18 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Chuck Lever X-Patchwork-Id: 93337 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:b0ea:0:b0:3b6:4342:cba0 with SMTP id b10csp5351782vqo; Fri, 12 May 2023 12:43:52 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5aianaKtjomBsLleX6K98613tFSF+rnVbd3uajtqKzrKMm46ZF3r/zpX9bNOi+TzxZaZMJ X-Received: by 2002:a17:90a:6349:b0:24e:246e:6454 with SMTP id v9-20020a17090a634900b0024e246e6454mr26962982pjs.33.1683920632697; Fri, 12 May 2023 12:43:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683920632; cv=none; d=google.com; s=arc-20160816; b=JURmQhjlsTKesLb6YoFfwxEZ8E7hVEzlCWK/1b5tw4tb0bfGoacd4YWlAVL2lb5IMV 8aZjQ2Lg5DvqtH4I0Sdy7245zPRh4FMgHF5oYAC+33Po9tqKV7GikwFdmPJF4/qHfb9R ToLKEWBKJ57Kl9lxqXAAv91IOgLGqoKW0l5wRyEYWE/fqGUlcpCiQ0RlhkP1lx74s87P TjpjcH5SfD+UYiUHSYYaAiKE1NpMYfiwO3Eo2+DIcjOPPjP3xNqjyvuudn7A6T6v6mPM XxCoP5tv9rsdoplLc8/Hm6i/wzHyu6kWZqphqv5g+bel0JRoR7NTMOKULJMyWk0OHNRz ITqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:message-id:date:cc:to:from:subject:dkim-signature; bh=yY4d6vwh0xC0ZfTmYEWLFzoS2ClDKn2SX9+7JF1UWAY=; b=y5EZ5efweDjU3CEzlYkDXqKDRYpRuONJ7xUu6UXBWSd4bQgEcjYrdiwaUUvqcwGqlI qMa13L0fNVzoEorQ3NtQKjb2f4QjER7TWizR3qR8QSMAXG2zrKLLqYP+uIpxAYtdQ+YY RLvvhBcWs9CCW3CzRkcGUtT93uF10eZ5GLfeNB49Q/1s7taZD34kT0sr4qvrX0dfMOhd E77A5ZTCe+UKtvPYuNT0EMaUItIuDL7fUhSwbIIPWoNIxqvMdghRL1pgi0SXMMGXYJga 7rwfS/Ep9tO1Rt+WZ/4SUBZARPN4E18KW7UT38/P96/mro/Zt8uZfNUun3NTNDIrBnRC JLdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=swObnCJr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ne11-20020a17090b374b00b002509203c8b2si11878186pjb.47.2023.05.12.12.43.38; Fri, 12 May 2023 12:43:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=swObnCJr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239211AbjELTCd (ORCPT + 99 others); Fri, 12 May 2023 15:02:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36128 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238302AbjELTCb (ORCPT ); Fri, 12 May 2023 15:02:31 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D85872724 for ; Fri, 12 May 2023 12:02:30 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 64B5963B29 for ; Fri, 12 May 2023 19:02:30 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9BBFEC433EF; Fri, 12 May 2023 19:02:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1683918149; bh=E2Npg22ZaCIioNRTqxsE8ZqPL1p1Do3YiLBJa9YilwI=; h=Subject:From:To:Cc:Date:From; b=swObnCJrKWQTTbkgruSjzkaAEhcaI4scadHHrUbDw5GsPbkwQMBYcb+kEPQU4aB03 0+SZoogggMv0bf9wOV/eHGeHNM9loGBMbOSz96jysAfdLMTNU96UoT8gisTFDBmbIQ VvgDZitaETE5AtCDcvtdNS2dEzG5YeLMh2uuFxpun3dK/CDaB93kX0AN37l5ZSkgtE GPlUNiJGhxIyfQuCbbpf0CLq+I4BzOTx46QiHcuKEUS2NSgTOy2EDXd2d6+yTzmKmz SZ1Mf3rCwkXvdoLm1JCeWL0Pl0tUMEkvxAqfDRQX0OQrBfRfhbyt3MEoMlHEnclzDh pi3XsWv9jkFgQ== Subject: [PATCH] net/handshake: Squelch allocation warning during Kunit test From: Chuck Lever To: naresh.kamboju@linaro.org Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, kasan-dev@googlegroups.com, kunit-dev@googlegroups.com, lkft-triage@lists.linaro.org, elver@google.com, akpm@linux-foundation.org, mgorman@techsingularity.net, aryabinin@virtuozzo.com Date: Fri, 12 May 2023 15:02:18 -0400 Message-ID: <168391812685.21298.13859211358278163731.stgit@91.116.238.104.host.secureserver.net> User-Agent: StGit/1.5 MIME-Version: 1.0 X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1765718761484553315?= X-GMAIL-MSGID: =?utf-8?q?1765718761484553315?= From: Chuck Lever The "handshake_req_alloc excessive privsize" kunit test is intended to check what happens when the maximum privsize is exceeded. The WARN_ON_ONCE_GFP at mm/page_alloc.c:4744 can be disabled safely for this allocator call site. Reported-by: Linux Kernel Functional Testing Fixes: 88232ec1ec5e ("net/handshake: Add Kunit tests for the handshake consumer API") Signed-off-by: Chuck Lever --- net/handshake/request.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/net/handshake/request.c b/net/handshake/request.c index d78d41abb3d9..24097cccd158 100644 --- a/net/handshake/request.c +++ b/net/handshake/request.c @@ -120,7 +120,8 @@ struct handshake_req *handshake_req_alloc(const struct handshake_proto *proto, if (!proto->hp_accept || !proto->hp_done) return NULL; - req = kzalloc(struct_size(req, hr_priv, proto->hp_privsize), flags); + req = kzalloc(struct_size(req, hr_priv, proto->hp_privsize), + flags | __GFP_NOWARN); if (!req) return NULL;