My Greetings,
My name's Hon. Barrister Matthias, I am sending this brief letter to
solicit your support. I had a client who is an Indian and his name is
Mr. Gurbhagat Singh Bhatti , he was a dealer in magnesite minerals
here in Austria and also a Gas dealer in Russia. He died six years
ago in Russia after a Gas explosion in one of his dealing offices
which led to the death of both him and his wife.
He deposited the sum of 4.5 million euro in one of the legendary banks
here in Austria. I have tried all I could to get in touch with any of
his friends or family members but, no way because he had no child. And
the recent death of Covid 19 killed his only brothers in India last
year.
So I want you to apply to the bank as his Business partner so that the
bank can release Mr. Gurbhagat Singh Bhatti funds into your bank
account. I will provide you the guidelines on how to contact the bank
and we have to do this with trust, because I don't want the bank to
transfer the fund into Government treasury account as an unclaimed
fund, so i need your response
Warm Regards,
Hon. Barrister Matthias
We were failing to call kasan_malloc() from __kmalloc_*track_caller()
which was causing us to sometimes fail to produce KASAN error reports
for allocations made using e.g. devm_kcalloc(), as the KASAN poison was
not being initialized. Fix it.
Signed-off-by: Peter Collingbourne <pcc(a)google.com>
Cc: <stable(a)vger.kernel.org> # 5.15
---
The same problem is being fixed upstream in:
https://lore.kernel.org/all/20220817101826.236819-6-42.hyeyoo@gmail.com/
as part of a larger patch series, but this more targeted fix seems
more suitable for the stable kernel. Hyeonggon, maybe you can add
this patch to the start of your series and it can be picked up
by the stable maintainers.
mm/slub.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/mm/slub.c b/mm/slub.c
index 862dbd9af4f5..875c569c5cbe 100644
--- a/mm/slub.c
+++ b/mm/slub.c
@@ -4926,6 +4926,8 @@ void *__kmalloc_track_caller(size_t size, gfp_t gfpflags, unsigned long caller)
/* Honor the call site pointer we received. */
trace_kmalloc(caller, ret, s, size, s->size, gfpflags);
+ ret = kasan_kmalloc(s, ret, size, gfpflags);
+
return ret;
}
EXPORT_SYMBOL(__kmalloc_track_caller);
@@ -4957,6 +4959,8 @@ void *__kmalloc_node_track_caller(size_t size, gfp_t gfpflags,
/* Honor the call site pointer we received. */
trace_kmalloc_node(caller, ret, s, size, s->size, gfpflags, node);
+ ret = kasan_kmalloc(s, ret, size, gfpflags);
+
return ret;
}
EXPORT_SYMBOL(__kmalloc_node_track_caller);
--
2.37.2.789.g6183377224-goog