Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp3179009imw; Mon, 11 Jul 2022 03:40:09 -0700 (PDT) X-Google-Smtp-Source: AGRyM1tZuVTVWjrC9UOUJeuq0q8HV9dZsIOwhF61xXcCrDs/uAyI3t1ZQMiVDwtpd1MIbg0zy5xp X-Received: by 2002:a17:907:7d88:b0:726:2adb:2073 with SMTP id oz8-20020a1709077d8800b007262adb2073mr18065293ejc.466.1657536009431; Mon, 11 Jul 2022 03:40:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657536009; cv=none; d=google.com; s=arc-20160816; b=V5DssEcVHplyPxLE0WZ+rCbdK19NueVCd31bbG/LNG472K4gGq/udUnl36Hud6ijO7 L6pdaTZZiINbJNOAaKU4Sf99Bpg4q5yLhIfeRVhaTw3vbzV0UpMd3OUL/PdlfEl/l3T1 i0idjkJZD75UwmLi9/P9NdpRUYLwIHxnLHLPkunj2BL1+Qx47g+ceH6GkHqzmQ6V0anu WvewJrddSaDnrPBgz8F40IWh5REmqDmdC3Ipel7JBNQ+B3X3OOnnZJg5Yf9LpLEj9iT1 su2QGz8jjLQmw4HLcLlvToMXZ/Wq+7oEwF6pmZowHP30GNS27s9kYIiXSzCB1CZzjFwY Y69A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=RFY70S8hjmqU4/6VBXkwCK2TGeXEE4gqTwKKaTVFlLA=; b=wB91JgOIEDMORxqamnokOTAcgvLThPZaRcJjGPkDksj5eIc2I63JkZ29jUiMBlT+Td QiTyJhXBfFSHC6v/PATmu0CAIIierKSdD5PwjJRqgXELIFyMQN6E2MlRsElsMICIqk2q BxUn+uG5sxObNRkeQesPdBRQdfWFD/gVf8p1Br+diQze44SNjrp530CqUHJfCOaQ4TuV U1ZIjq2S3bNfa/JdWXAvmb7cQaZVFQ7awg6n5XwsIsDDsHYOczT5jBEeUwswKHFy9d6e uEa4V7+4x4+ZPHjMXwOZg/btm1fpGEXyrVv4tK0ALVblSXVEK6e1wzfLaqMRmikWCchz +JAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ycWu1bgb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q27-20020a056402033b00b0043a6e94d22fsi7663710edw.271.2022.07.11.03.39.44; Mon, 11 Jul 2022 03:40:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ycWu1bgb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229904AbiGKJMm (ORCPT + 99 others); Mon, 11 Jul 2022 05:12:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46774 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231236AbiGKJLx (ORCPT ); Mon, 11 Jul 2022 05:11:53 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F188D252B6; Mon, 11 Jul 2022 02:09:16 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 0E5196118F; Mon, 11 Jul 2022 09:09:16 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 21033C36AE2; Mon, 11 Jul 2022 09:09:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1657530555; bh=p7Eab160yQGOQfojhbMWmzyaYKJ94lupJbD+g6sDDAk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ycWu1bgbpy4zfg6XvKumelQJpljnG6bcFLlYp9E67NNhpjpuAJ2eoLPjLLhGQXrJS lNXTISpYjA7KtRu1roMAKVdJxNj5w6t8zhR5qat/7PThTGsCivWD056MzIJ2SENRqg by0VDxR8B60dL4AZS0G+5x+bQkzmvenXs2KcAB/s= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Itay Iellin , Matthew Wilcox , Linus Torvalds Subject: [PATCH 4.19 27/31] ida: dont use BUG_ON() for debugging Date: Mon, 11 Jul 2022 11:07:06 +0200 Message-Id: <20220711090538.648147293@linuxfoundation.org> X-Mailer: git-send-email 2.37.0 In-Reply-To: <20220711090537.841305347@linuxfoundation.org> References: <20220711090537.841305347@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linus Torvalds commit fc82bbf4dede758007763867d0282353c06d1121 upstream. This is another old BUG_ON() that just shouldn't exist (see also commit a382f8fee42c: "signal handling: don't use BUG_ON() for debugging"). In fact, as Matthew Wilcox points out, this condition shouldn't really even result in a warning, since a negative id allocation result is just a normal allocation failure: "I wonder if we should even warn here -- sure, the caller is trying to free something that wasn't allocated, but we don't warn for kfree(NULL)" and goes on to point out how that current error check is only causing people to unnecessarily do their own index range checking before freeing it. This was noted by Itay Iellin, because the bluetooth HCI socket cookie code does *not* do that range checking, and ends up just freeing the error case too, triggering the BUG_ON(). The HCI code requires CAP_NET_RAW, and seems to just result in an ugly splat, but there really is no reason to BUG_ON() here, and we have generally striven for allocation models where it's always ok to just do free(alloc()); even if the allocation were to fail for some random reason (usually obviously that "random" reason being some resource limit). Fixes: 88eca0207cf1 ("ida: simplified functions for id allocation") Reported-by: Itay Iellin Suggested-by: Matthew Wilcox Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- lib/idr.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) --- a/lib/idr.c +++ b/lib/idr.c @@ -573,7 +573,9 @@ void ida_free(struct ida *ida, unsigned { unsigned long flags; - BUG_ON((int)id < 0); + if ((int)id < 0) + return; + xa_lock_irqsave(&ida->ida_rt, flags); ida_remove(ida, id); xa_unlock_irqrestore(&ida->ida_rt, flags);