Received: by 2002:ac0:8c8e:0:0:0:0:0 with SMTP id r14csp343048ima; Wed, 6 Feb 2019 00:40:00 -0800 (PST) X-Google-Smtp-Source: AHgI3IYs8l3wE+KAm2QTwQUgsXFgcjTT1xAWq0zEt8DKFa5vCoxr0HQ8BmW0dXHIYGOF+7ijcf1L X-Received: by 2002:a17:902:2c03:: with SMTP id m3mr9884438plb.125.1549442400504; Wed, 06 Feb 2019 00:40:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549442400; cv=none; d=google.com; s=arc-20160816; b=LYIbYOduOa0V4HBD9R0EJMJS4sElOcKYGZlSSrvqeUq2zeyNaboY5k02cknyguC7C7 JHpi4SvBhadR9+lolHOC0lAuRfN5cAX+PSocEJRXO+pFqJBQjdy3+hvOXIWGoJpt6fMO Loo0lSc/Vmhhy/dRQFqNGDN2QRt8tbbt9Lq1ipIWKJbrDUQihxkksDk6naVBLx+05+QC SpjyXitsCHWpeWRoYAz59oungLxaH5KL0u9T6erH7/A0ef8R69rM5yS7yNsXje7eMgJ2 5ceKo1LlpahZatcVW0BGC8cjVfdg4CmrBj7lUKdt7s3G3HCJUAn+2YcgEHAr6sa32O/s 96JQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:openpgp:from:references:cc:to:subject; bh=VeHjZrvFlStQ171kAASSijcDemSk+X0UNUIeb4w50es=; b=SUPI+bRBZOpEdYU2tPdh9y1XkLGrJVrqJduYoZmlCwtuvOvybp6H7ISVFkXlgF/STC Y5cm7sDFmRTkhPHhWZvM5XwD2IUOnO1lv3snDztLqfhlvEjjMl4LGyYzzv2KRuoVivb+ YX8vNhdMUhNPHoCc5aw3ECpYwM65F1BFaBeDnVOPvTgmgdJWep95lRF6BN0Vc2ycEKqU 5PVx0dg9CngP+iHkHc2gUjlc+5cbAgKWo9suorYCu1hpYK11S8uViygkyK9ncH1ID3ee oYO+1Pvz9dKlZ1DO9g4WXXMl0BPNal6MQ5xKP3CQRo3O1NiajaxuoXfh8Hb+TBi+GM/m C76A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q24si5392565pgi.334.2019.02.06.00.39.44; Wed, 06 Feb 2019 00:40:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728018AbfBFIhm (ORCPT + 99 others); Wed, 6 Feb 2019 03:37:42 -0500 Received: from mx2.suse.de ([195.135.220.15]:60054 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726721AbfBFIhm (ORCPT ); Wed, 6 Feb 2019 03:37:42 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id B9A79B685; Wed, 6 Feb 2019 08:37:40 +0000 (UTC) Subject: Re: [PATCH] bcache: use kmemdup_nul for CACHED_LABEL buffer To: Geliang Tang Cc: Kent Overstreet , linux-bcache@vger.kernel.org, linux-kernel@vger.kernel.org References: <04ff7c6d5cdd8b389d471989704c2f9dc3def554.1548840161.git.geliangtang@gmail.com> From: Coly Li Openpgp: preference=signencrypt Organization: SUSE Labs Message-ID: <04ebd070-3c9c-0cd4-f2d8-d7b078ea2582@suse.de> Date: Wed, 6 Feb 2019 16:37:36 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.4.0 MIME-Version: 1.0 In-Reply-To: <04ff7c6d5cdd8b389d471989704c2f9dc3def554.1548840161.git.geliangtang@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019/1/30 5:29 下午, Geliang Tang wrote: > This patch uses kmemdup_nul to create a NUL-terminated string from > dc->sb.label. This is better than open coding it. > > With this, we can move env[2] initialization into env[] array to make > code more elegant. > > Signed-off-by: Geliang Tang Hi Geliang, In general I am OK with your idea. But I feel there might be some regression with your change. I comment your patch in line, correct me if I am wrong. > --- > drivers/md/bcache/super.c | 10 ++++------ > 1 file changed, 4 insertions(+), 6 deletions(-) > > diff --git a/drivers/md/bcache/super.c b/drivers/md/bcache/super.c > index 4dee119c3664..84ab241c8516 100644 > --- a/drivers/md/bcache/super.c > +++ b/drivers/md/bcache/super.c > @@ -906,21 +906,18 @@ static int cached_dev_status_update(void *arg) > void bch_cached_dev_run(struct cached_dev *dc) > { > struct bcache_device *d = &dc->disk; > - char buf[SB_LABEL_SIZE + 1]; > + char *buf = kmemdup_nul(dc->sb.label, SB_LABEL_SIZE, GFP_KERNEL); If kdumdup_null() is failed, buf will be NULL. > char *env[] = { > "DRIVER=bcache", > kasprintf(GFP_KERNEL, "CACHED_UUID=%pU", dc->sb.uuid), > - NULL, > + kasprintf(GFP_KERNEL, "CACHED_LABEL=%s", buf ? : ""), If buf is NULL, env[2] here is pointed to "" which is allocated in read-only data segment, and not a dynamic memory. > NULL, > }; > > - memcpy(buf, dc->sb.label, SB_LABEL_SIZE); > - buf[SB_LABEL_SIZE] = '\0'; > - env[2] = kasprintf(GFP_KERNEL, "CACHED_LABEL=%s", buf); > - > if (atomic_xchg(&dc->running, 1)) { > kfree(env[1]); > kfree(env[2]); Then kfree() here will try to release a read-only memory segment. I guess this is problematic. > + kfree(buf); > return; > } > > @@ -944,6 +941,7 @@ void bch_cached_dev_run(struct cached_dev *dc) > kobject_uevent_env(&disk_to_dev(d->disk)->kobj, KOBJ_CHANGE, env); > kfree(env[1]); > kfree(env[2]); Same problem might happen here for env[2]. > + kfree(buf); > > if (sysfs_create_link(&d->kobj, &disk_to_dev(d->disk)->kobj, "dev") || > sysfs_create_link(&disk_to_dev(d->disk)->kobj, &d->kobj, "bcache")) > -- Coly Li