Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3714628imu; Mon, 28 Jan 2019 09:30:28 -0800 (PST) X-Google-Smtp-Source: ALg8bN4+cdjhifVawBThBSlDTSJ2AgqgH7+TBLOXBr5puDceqGv2g6DyF6ILZVN3TubczdxxMyXR X-Received: by 2002:a63:b543:: with SMTP id u3mr20475963pgo.420.1548696628711; Mon, 28 Jan 2019 09:30:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548696628; cv=none; d=google.com; s=arc-20160816; b=bNprs2MOsrQS4DZSbaA8l5EdCiZNekE5620NK7t8URYzU8tdNZchqnfSomThDXRsYz IQnawfxDCIGAejjq6Wmw+YLGVrvG/JzMKxrYwte7gB4Nmlwicq6+sgRE8CTzVCe1R7dV FnfWkopYswCTZqIpiRdamCt/qgOKHmVQFMRZTcq5YzoB4QfWVuXEDWs8n93XiiXREgo+ ncYAg+/A0YTR6hEO/dtFHouWZlmYO/AnX44k0RJaOusX/NlTOn7t9wTP7bIKpGVEHXwD eQcSwiiY3HwuiwyfBc+yqz8dJCAz2erm6yICEebkQ2qhgittL8OU2ly8FS1tnO46miHf n3Xw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=LflYKAoiMrtqSh0C/OKSC69vi4YM6dK8aK9/UB+Yevw=; b=GFEpYQDfhjiXv+zv+hSvIf/1yDWkXHiQsKUTEi2ycInISDGTOCXAwxcqXyM2x61aVF LeaB9fMHyeS5yR78X/poKQK7wBXq644+KIG9WjoEkkoRSFVUE60O09UUlQ3MFDAmuiiG O5nH4bDsKMRg/JSwQ7RQhZQ0UycU0oN3mQek79NdmpXDGM8TBYglVtLIS/Wdfn355pc3 Q6k/t04IYw3SsOI9BbB3HUOE/F1CsLRutIsyqiIiMRqLL9jtMjWts4HVNokbOdaDX+Z4 l7CTzWNZrVrQT0Bg8yXGyZ93E3pdfGPSLQmIxyjILs5XxgG/0GAEARfFFw1P0HjOGVaF 7spA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z123si28413608pfb.104.2019.01.28.09.30.13; Mon, 28 Jan 2019 09:30:28 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731138AbfA1R2S (ORCPT + 99 others); Mon, 28 Jan 2019 12:28:18 -0500 Received: from mx2.suse.de ([195.135.220.15]:41742 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730549AbfA1R2R (ORCPT ); Mon, 28 Jan 2019 12:28:17 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 5DB63AF0D; Mon, 28 Jan 2019 17:28:15 +0000 (UTC) Date: Mon, 28 Jan 2019 18:28:14 +0100 (CET) From: Miroslav Benes To: Sasha Levin cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Nicholas Mc Guire , Jiri Kosina , live-patching@vger.kernel.org Subject: Re: [PATCH AUTOSEL 4.19 174/258] livepatch: check kzalloc return values In-Reply-To: <20190128155924.51521-174-sashal@kernel.org> Message-ID: References: <20190128155924.51521-1-sashal@kernel.org> <20190128155924.51521-174-sashal@kernel.org> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 28 Jan 2019, Sasha Levin wrote: > From: Nicholas Mc Guire > > [ Upstream commit 5f30b2e823484ce6a79f2b59901b6351c15effa6 ] > > kzalloc() return should always be checked - notably in example code > where this may be seen as reference. On failure of allocation in > livepatch_fix1_dummy_alloc() respectively dummy_alloc() previous > allocation is freed (thanks to Petr Mladek for > catching this) and NULL returned. > > Signed-off-by: Nicholas Mc Guire > Fixes: 439e7271dc2b ("livepatch: introduce shadow variable API") > Acked-by: Joe Lawrence > Reviewed-by: Petr Mladek > Acked-by: Miroslav Benes > Signed-off-by: Jiri Kosina > Signed-off-by: Sasha Levin Hi Sasha, I am not sure what stable policy is, but the patch is for samples/ directory and I do not think it is something which should necessarily go to stable. It is your call though. Regards, Miroslav > --- > samples/livepatch/livepatch-shadow-fix1.c | 5 +++++ > samples/livepatch/livepatch-shadow-mod.c | 4 ++++ > 2 files changed, 9 insertions(+) > > diff --git a/samples/livepatch/livepatch-shadow-fix1.c b/samples/livepatch/livepatch-shadow-fix1.c > index 49b13553eaae..e8f1bd6b29b1 100644 > --- a/samples/livepatch/livepatch-shadow-fix1.c > +++ b/samples/livepatch/livepatch-shadow-fix1.c > @@ -89,6 +89,11 @@ struct dummy *livepatch_fix1_dummy_alloc(void) > * pointer to handle resource release. > */ > leak = kzalloc(sizeof(int), GFP_KERNEL); > + if (!leak) { > + kfree(d); > + return NULL; > + } > + > klp_shadow_alloc(d, SV_LEAK, sizeof(leak), GFP_KERNEL, > shadow_leak_ctor, leak); > > diff --git a/samples/livepatch/livepatch-shadow-mod.c b/samples/livepatch/livepatch-shadow-mod.c > index 4c54b250332d..4aa8a88d3cd6 100644 > --- a/samples/livepatch/livepatch-shadow-mod.c > +++ b/samples/livepatch/livepatch-shadow-mod.c > @@ -118,6 +118,10 @@ noinline struct dummy *dummy_alloc(void) > > /* Oops, forgot to save leak! */ > leak = kzalloc(sizeof(int), GFP_KERNEL); > + if (!leak) { > + kfree(d); > + return NULL; > + } > > pr_info("%s: dummy @ %p, expires @ %lx\n", > __func__, d, d->jiffies_expire); > -- > 2.19.1 >