Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp1217651iog; Sat, 18 Jun 2022 03:59:28 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vcoI19//G6HPV10svPGvHFYgIAThFRJKP8AI74XORRoO4lD7SG36dsQf4zkJs9vz+0vqdi X-Received: by 2002:a63:4f09:0:b0:3fd:3479:7624 with SMTP id d9-20020a634f09000000b003fd34797624mr12869610pgb.425.1655549968095; Sat, 18 Jun 2022 03:59:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655549968; cv=none; d=google.com; s=arc-20160816; b=lcQm7UvByxYN8Rvd8jzqRApRhHQwxfAwofHLNwT2JIqZxKQDNqIr9SPEJQywbm7FMp YVgIYPeelb5er1I7sPcevIj91+c3U4A9rwyU/H1mqZwulrTHv0XBbeQbAHLrS6V9Br5E sCgIFQtdQRJNOVo7ysZa/sCS5KryZUebvqItgFIPhshEJrElTaql8Fu2vpAkOaVLmrXb ozLwhSjmJfuMAF6pmje9kH81IsUQ9DkWFNR3QuxJmdqQGqZgLzutbYHWRKsnldq3WQwg FxUwrjDF3dujstImlSUyzMybl398h92wf8C+kH/ouCFcMaEL5Zr4R/ukCRmQLxyRjNWb WtAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=3j61tFl/S0JaCu6HXkEbtaFt5zENR9R2dbDxl4/S+T8=; b=HWcOM35WL6IhQQKKlM0PwygImkQVsJmi+XnhuOX6ul0OYtmlofC8B10sydZdF1nJJ2 4XpSHhg+dvNl5DJLQtxtlSJ0euzJPPVZe0Y+i9TsUkdggsuxk8pT8dP9xCfCrobBrb3U SJYGMiebguwjUC9qJW/2cgzeSS3aCbT2/9yav5oUcItfW35KcwWHgRo2WnZUZ1VKJKxZ iVAoOf2ecQP+gkrJsmlPq7bWZJ7QUDSC1mMmEP1Ts2ciMW+YOEPdQDKzb5wUnfQ8IsT+ YW9MwSSXYYt7ppLxgh29vNgegwPQciapoOJ44r9mrnjKdWaK98bofbg/omYUElnS/Rj7 EOXg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h1-20020a635301000000b003fe30cc898bsi5824842pgb.664.2022.06.18.03.59.13; Sat, 18 Jun 2022 03:59:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232514AbiFRKtd (ORCPT + 99 others); Sat, 18 Jun 2022 06:49:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52580 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229721AbiFRKtb (ORCPT ); Sat, 18 Jun 2022 06:49:31 -0400 Received: from jabberwock.ucw.cz (jabberwock.ucw.cz [46.255.230.98]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2595617585; Sat, 18 Jun 2022 03:49:29 -0700 (PDT) Received: by jabberwock.ucw.cz (Postfix, from userid 1017) id 2526A1C0B8F; Sat, 18 Jun 2022 12:49:26 +0200 (CEST) Date: Sat, 18 Jun 2022 12:49:25 +0200 From: Pavel Machek To: Naresh Kamboju , baijiaju1990@gmail.com, oslab@tsinghua.edu.cn, colyli@suse.de, axboe@kernel.dk Cc: Greg Kroah-Hartman , linux-kernel@vger.kernel.org, stable@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, slade@sladewatkins.com, Daniel Latypov , Brendan Higgins , kunit-dev@googlegroups.com, "open list:KERNEL SELFTEST FRAMEWORK" Subject: Re: [PATCH 5.17 000/772] 5.17.14-rc1 review Message-ID: <20220618104925.GA3644@duo.ucw.cz> References: <20220607164948.980838585@linuxfoundation.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="fdj2RfSjLxBAspz7" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-1.1 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_NEUTRAL,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --fdj2RfSjLxBAspz7 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! > > > > > > This is the start of the stable review cycle for the 5.17.14 release. > > > There are 772 patches in this series, all will be posted as a response > > > to this one. If anyone has any issues with these being applied, plea= se > > > let me know. > > > > > > Responses should be made by Thu, 09 Jun 2022 16:48:02 +0000. > > > Anything received after that time might be too late. > > > > > > The whole patch series can be found in one patch at: > > > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/pa= tch-5.17.14-rc1.gz > > > or in the git tree and branch at: > > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-st= able-rc.git linux-5.17.y > > > and the diffstat can be found below. > > > =2E.. > > We will bisect and let you know more details about this reported proble= m. >=20 > The bisect script pointed me to this commit and reverted and tested and > confirmed. Can you add some printks into that? Because I'm pretty sure this patch does not break anything. (It should not fix much, either.) > commit 1883088ed4a0d5cc9cea500ca4e89a354ab32c11 > Author: Jia-Ju Bai > md: bcache: check the return value of kzalloc() in detached_dev_do_re= quest() >=20 > commit 40f567bbb3b0639d2ec7d1c6ad4b1b018f80cf19 upstream. >=20 > The function kzalloc() in detached_dev_do_request() can fail, so its > return value should be checked. >=20 > Fixes: bc082a55d25c ("bcache: fix inaccurate io state for detached =2E.. > +++ b/drivers/md/bcache/request.c > @@ -1107,6 +1107,12 @@ static void detached_dev_do_request(struct > bcache_device *d, struct bio *bio, > * which would call closure_get(&dc->disk.cl) > */ > ddip =3D kzalloc(sizeof(struct detached_dev_io_private), GFP_NOIO= ); > + if (!ddip) { > + bio->bi_status =3D BLK_STS_RESOURCE; > + bio->bi_end_io(bio); > + return; > + } > + > ddip->d =3D d; > /* Count on the bcache device */ > ddip->orig_bdev =3D orig_bdev; >=20 So... for patch to make any difference, memory allocation has to fail and ddip has to be NULL. Before the patch, it would oops in "ddip->d =3D d;". With the patch, you do some kind of error handling. Even if it is buggy, it should not do more harm than immediate oops. Best regards, Pavel --=20 DENX Software Engineering GmbH, Managing Director: Wolfgang Denk HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany --fdj2RfSjLxBAspz7 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQRPfPO7r0eAhk010v0w5/Bqldv68gUCYq2ttQAKCRAw5/Bqldv6 8oHGAJ9pEIvr/YXimrgyUF20plQSfIVzMwCZAVwuSN3MVMeBOt0SNNBc4rygDCc= =l+d7 -----END PGP SIGNATURE----- --fdj2RfSjLxBAspz7--