Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp3554881rwb; Sun, 25 Sep 2022 08:26:08 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6yaYSKp36fC05w4XCik9OY20oI4WmhB0d6K4AUDs98J73aulfnrNQaO2Mtg6Q1w6Mtx0Ue X-Received: by 2002:a17:907:3ea7:b0:782:fe85:a2e with SMTP id hs39-20020a1709073ea700b00782fe850a2emr5764970ejc.550.1664119567816; Sun, 25 Sep 2022 08:26:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664119567; cv=none; d=google.com; s=arc-20160816; b=WEclk57DIn9gWUMm2i7kYg5Vyli5AbQAQ0gu64FBdFUmmja6AWNCXHLPcMG8a/QED6 nQAF1/HJPq9EzwVFcWE14p0+XslAgc1p+j+FUgtwWwk8YVqTkkYbwlCMS8aNjvHfVQQb G3OsFMnCO0HD7BHbLwCSQE2Jss0QqqaVe9p1jebjSJ9nYMbMAVEThUXJw96VPFMF9sqT IFEji4SUNejxmBO6wucTjboQgBx218kvc+eT8ATkRVUfYiXq0ELuAwKAQ1/zJcsonl72 /EITo8shJPfpYXzyeU1hfJdientv5l8iup9vGYZ8dXSMfQMOM4p/uH5DOGmmfm42/buI lqog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=I2YrKj0KZ6PK0i8HF3ExRdsWzEEndu4M3H7TwG0i8Ao=; b=xYxUDg8uRlMYfhFJjjnWVP9IIKQET23veaVZ92n2hbWUcSGJudsWKn9lpscX83H/wN +Kp55f04vEnGY9kVQaGKwB+KWC4gkeLqt+izIafD+Z97Rd1NNYnGDlFGy60zIeTAxviS 1LXVMlfUJzvsujnElrSezEOYALlRVwo177T3Im39VCybJ4/UbXc0cbDsd0SerAf9Dgsy L6CNI+Rfk0gjkfL1IQv+94/ZDLmmiKfRITZ47Zg7OFf0V5J/oNaOJPmKrpg+uKgPa5TU 9Ys3PdB13r4EbZdzQSh6Z7YHwniP95qkddWzbyvX5mn6L5WGxrQeYdXMSTIyz37P4zgx uzag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pGG7sCCh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z19-20020a056402275300b004515bc0d76dsi17122263edd.44.2022.09.25.08.25.42; Sun, 25 Sep 2022 08:26:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pGG7sCCh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230411AbiIYPXW (ORCPT + 99 others); Sun, 25 Sep 2022 11:23:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49074 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229915AbiIYPXT (ORCPT ); Sun, 25 Sep 2022 11:23:19 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 642242DA96 for ; Sun, 25 Sep 2022 08:23:18 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 1C5A5B80A07 for ; Sun, 25 Sep 2022 15:23:17 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7F0A3C433C1; Sun, 25 Sep 2022 15:23:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1664119395; bh=mNE9p5/mRNRoN586/wzug966NONIBtlU0EfERJqekg8=; h=From:To:Cc:Subject:Date:From; b=pGG7sCChzjYrQ3TP6zxfy15lEwow248ybUpqJQRJnKuoKixP2lG/l8XhtDjX1T2KP A5LCCwlU5gft2m/+TWcFOexoy9dzW4LB1PJSUeFkeaGIoCc7aPM98+WuxXdRMF2wFX BPpjV+d0vi4oZUfp5KWuDM5Rj7soCIX1GEtjdbsGwQGtXpJKx27L81Nr3vD9mscxEd r/UkXDnr8nPsMP87zVmPLtYG+xXgMlkrwOR2ZbwFOJqRtJIb9lY0oji7UNNFMew/Ew knY5cIpiet6Pu1wueiJqi8S+jgxF1JIYRGVjmLy2Mm1Xz5/Yb3dimmdMwjgsLVb8JJ USChfrPalDuow== From: Chao Yu To: Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Andrew Morton , Vlastimil Babka , Hugh Dickins Cc: chao@kernel.org, Chao Yu , Christophe JAILLET , Hyeonggon Yoo <42.hyeyoo@gmail.com>, Roman Gushchin , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [PATCH v2] mm/slub: clean up create_unique_id() Date: Sun, 25 Sep 2022 15:12:07 +0800 Message-Id: <20220925071207.13183-1-chao@kernel.org> X-Mailer: git-send-email 2.36.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-5.6 required=5.0 tests=BAYES_00,DATE_IN_PAST_06_12, DKIMWL_WL_HIGH,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Chao Yu As Christophe JAILLET suggested: In create_unique_id(), "looks that ID_STR_LENGTH could even be reduced to 32 or 16. The 2nd BUG_ON at the end of the function could certainly be just removed as well or remplaced by a: if (p > name + ID_STR_LENGTH - 1) { kfree(name); return -E; } " According to above suggestion, let's do below cleanups: 1. reduce ID_STR_LENGTH to 32, as the buffer size should be enough; 2. use WARN_ON instead of BUG_ON() and return error if check condition is true; 3. use snprintf instead of sprintf to avoid overflow. Link: https://lore.kernel.org/linux-mm/2025305d-16db-abdf-6cd3-1fb93371c2b4@wanadoo.fr/ Fixes: 81819f0fc828 ("SLUB core") Suggested-by: Christophe JAILLET Reviewed-by: Hyeonggon Yoo <42.hyeyoo@gmail.com> Signed-off-by: Chao Yu --- v2: - add WARN_ON() instead of return error silently; - use snprintf instead of sprintf to avoid overflow. mm/slub.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/mm/slub.c b/mm/slub.c index 4b98dff9be8e..3d37a8a7b965 100644 --- a/mm/slub.c +++ b/mm/slub.c @@ -5890,7 +5890,7 @@ static inline struct kset *cache_kset(struct kmem_cache *s) return slab_kset; } -#define ID_STR_LENGTH 64 +#define ID_STR_LENGTH 32 /* Create a unique string id for a slab cache: * @@ -5924,9 +5924,13 @@ static char *create_unique_id(struct kmem_cache *s) *p++ = 'A'; if (p != name + 1) *p++ = '-'; - p += sprintf(p, "%07u", s->size); + p += snprintf(p, ID_STR_LENGTH - 1 - (p - name), "%07u", s->size); - BUG_ON(p > name + ID_STR_LENGTH - 1); + if (p > name + ID_STR_LENGTH - 1) { + WARN_ON(1); + kfree(name); + return ERR_PTR(-EINVAL); + } return name; } -- 2.36.1