Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp6093941rwn; Mon, 12 Sep 2022 21:18:00 -0700 (PDT) X-Google-Smtp-Source: AA6agR4KM7Zm6ftYG4jHUisfffov+jtoQcf7iWi2AGAZZEr2boEKgsFlBwynieigm2qT05FzCOJq X-Received: by 2002:a17:90b:254a:b0:200:53f:891d with SMTP id nw10-20020a17090b254a00b00200053f891dmr1923401pjb.168.1663042679867; Mon, 12 Sep 2022 21:17:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663042679; cv=none; d=google.com; s=arc-20160816; b=ydcUU2FRxWg1kO7DV/n4ffWqF4Ju0GB5ACY5p6XM7wvXX0bUVboAMOJu2HJ/kcK7iY I8y1FuqPY0JYQq3RXM3utE6eVxx19sU+Hn1en1PZ9uCLIPCf5G1ELBruuH0qRT3hu6kZ ZWmrfmtV1yIDz89sN3e2Nnft9f9Wn53s99oK1lYvOJClLk2Oo6xU3zSITYZK/Z8BojLD JkjBgFUpur4/mIx1nggohNEhmMR8vkNCG+2gldrWQQ6B5bd2QHGv3/8G9Wv5TBCZ94OC LuGkdPUPwmw8RzO1FdzmV6ZoSNr224NtLNuPOsRp+hs/kZw6ojWQggXTdm2lMtGl2eqw rasg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=/FPxtsbdI4azn33/vL0P4c95Rw+66XO95lRy745bJyU=; b=uBPLGW0QluCQgArjB6FXpx7h41BXTliefikRSUxBTEoaEAI+FLH6PH1jm0SquBgUjx XiYe9yYC11LdWBLJ/Rxb2TCpsr/FVwpMO9Z/RGPdWtDLQ/gya6CZaGGGy2AOuRnHsm7v N4zJys+bvRTH1gGQqna34VJlPIVO61Gt5TNiq19x57K9m0s7f4u0IAgRe4Qvr0CrOuSC du7NLw1ZkHr2HKXZ4DMtT3Lq2kyCrWjEPu+9XNFrJC5UEKdGXUyF3x/cpLlIhqfXef1Y xkan9CPXK//6szR5RbEbdKTJcQSmR/kuYFjatKTIKZezx/MvmOhpJgsEgawjTOFdjAw8 f01w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=EQ7adyot; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g8-20020a170902740800b001768876fc87si10654835pll.362.2022.09.12.21.17.46; Mon, 12 Sep 2022 21:17:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=EQ7adyot; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229876AbiIMDmS (ORCPT + 99 others); Mon, 12 Sep 2022 23:42:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33398 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229610AbiIMDmP (ORCPT ); Mon, 12 Sep 2022 23:42:15 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 85A0513D31 for ; Mon, 12 Sep 2022 20:42:14 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 1ECA9B80CB1 for ; Tue, 13 Sep 2022 03:42:13 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C2227C433C1; Tue, 13 Sep 2022 03:42:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1663040531; bh=VUeq6MUzXB3MhRWXQ1REV1K4QwHMVaOsxFDEM74s2JM=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=EQ7adyotaOphDX46uv9SLP9FXSj7XTK0+OvL+hiaeepzepf6FMmqcAZJuORYxsoqL QGKm+7lx121CEUPtZ6WN21dExX2Ju8x2yQ60Nx7xcP6obu3F6QerPdFMyXPyXQsXXQ VwcSjxRwCkWCkj3SZdqV2MGXjUaXtdLW4cQ5q6ZabcLYDZx+NuswOALS4ALnihXCSQ bAYATikAnNwroYqQ3LDlXlPAJm58OycpOnN5RWm0u4R9JjmIzdVYDcg/AncOVws4Ft 91/nAde33ArG3aT5zPxKXYRn4kXXG8b0/Rbx2ZiyYihQ6kqKxQYQ6AwhGiEMi44/XM 6yE/2b/TtQW4g== Message-ID: Date: Tue, 13 Sep 2022 11:42:04 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: [PATCH] mm/slub: fix to return errno if kmalloc() fails Content-Language: en-US To: Christophe JAILLET , "Vlastimil Babka (SUSE)" , linux-mm@kvack.org Cc: akpm@linux-foundation.org, linux-kernel@vger.kernel.org, Chao Yu , muchun.song@linux.dev References: <20220830141009.150075-1-chao@kernel.org> <2025305d-16db-abdf-6cd3-1fb93371c2b4@wanadoo.fr> From: Chao Yu In-Reply-To: <2025305d-16db-abdf-6cd3-1fb93371c2b4@wanadoo.fr> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-9.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022/9/10 0:47, Christophe JAILLET wrote: > Le 30/08/2022 à 16:10, Chao Yu a écrit : >> From: Chao Yu >> >> In create_unique_id(), kmalloc(, GFP_KERNEL) can fail due to >> out-of-memory, if it fails, return errno correctly rather than >> triggering panic via BUG_ON(); >> >> kernel BUG at mm/slub.c:5893! >> Internal error: Oops - BUG: 0 [#1] PREEMPT SMP >> >> Call trace: >>   sysfs_slab_add+0x258/0x260 mm/slub.c:5973 >>   __kmem_cache_create+0x60/0x118 mm/slub.c:4899 >>   create_cache mm/slab_common.c:229 [inline] >>   kmem_cache_create_usercopy+0x19c/0x31c mm/slab_common.c:335 >>   kmem_cache_create+0x1c/0x28 mm/slab_common.c:390 >>   f2fs_kmem_cache_create fs/f2fs/f2fs.h:2766 [inline] >>   f2fs_init_xattr_caches+0x78/0xb4 fs/f2fs/xattr.c:808 >>   f2fs_fill_super+0x1050/0x1e0c fs/f2fs/super.c:4149 >>   mount_bdev+0x1b8/0x210 fs/super.c:1400 >>   f2fs_mount+0x44/0x58 fs/f2fs/super.c:4512 >>   legacy_get_tree+0x30/0x74 fs/fs_context.c:610 >>   vfs_get_tree+0x40/0x140 fs/super.c:1530 >>   do_new_mount+0x1dc/0x4e4 fs/namespace.c:3040 >>   path_mount+0x358/0x914 fs/namespace.c:3370 >>   do_mount fs/namespace.c:3383 [inline] >>   __do_sys_mount fs/namespace.c:3591 [inline] >>   __se_sys_mount fs/namespace.c:3568 [inline] >>   __arm64_sys_mount+0x2f8/0x408 fs/namespace.c:3568 >> >> Cc: >> Reported-by: syzbot+81684812ea68216e08c5@syzkaller.appspotmail.com >> Signed-off-by: Chao Yu >> --- >>   mm/slub.c | 5 ++++- >>   1 file changed, 4 insertions(+), 1 deletion(-) >> >> diff --git a/mm/slub.c b/mm/slub.c >> index 862dbd9af4f5..e6f3727b9ad2 100644 >> --- a/mm/slub.c >> +++ b/mm/slub.c >> @@ -5890,7 +5890,8 @@ static char *create_unique_id(struct kmem_cache *s) >>       char *name = kmalloc(ID_STR_LENGTH, GFP_KERNEL); > > Hi, > > looks that ID_STR_LENGTH could even be reduced to 32 or 16. > > The 2nd BUG_ON at the end of the function could certainly be just removed as well or remplaced by a: >        if (p > name + ID_STR_LENGTH - 1) { >         kfree(name); >         return -E; >     } Hi Christophe, Vlastimil, Should I include this in v3? or may be in another patch? Thanks, > > Just my 2c, > > CJ > >>       char *p = name; >> -    BUG_ON(!name); >> +    if (!name) >> +        return ERR_PTR(-ENOMEM); >>       *p++ = ':'; >>       /* >> @@ -5948,6 +5949,8 @@ static int sysfs_slab_add(struct kmem_cache *s) >>            * for the symlinks. >>            */ >>           name = create_unique_id(s); >> +        if (IS_ERR(name)) >> +            return PTR_ERR(name); >>       } >>       s->kobj.kset = kset; >