Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp1275701rdh; Fri, 24 Nov 2023 08:43:02 -0800 (PST) X-Google-Smtp-Source: AGHT+IEfqRrTFmzoB8vYRxPGoqKwVhUr3bedAoJ28THSxUkhFvszV7P+bzxL7qCyAIfoc6j2XJYQ X-Received: by 2002:a05:6a20:42a1:b0:18b:826d:1e89 with SMTP id o33-20020a056a2042a100b0018b826d1e89mr3888304pzj.12.1700844182102; Fri, 24 Nov 2023 08:43:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700844182; cv=none; d=google.com; s=arc-20160816; b=KNtXuBGSFinrSgZ+XlujKGOlmzdyQt7OcJR/yvO1vsGdvj4rIcATPH4rnkPpBQO6yB gU6pX1Ja+EFjxryNS286lrffLMGYriAAjYBNyWlU/EHUfUGRMGljYLBtPvbCjLMkjWgO We5xgGRvxHP09GlJ1HuFVfVi4uWxDyuVFMamA9yTQftNlc8ofuMl9RV5cQfInGqmWFu4 fBHruLo43UeoubsBLtwrFvVjW/vZQ8iijAOLM9UYmX+H+tIx+412kFt70UWZTNdIISmy MeKqZg1SwwYCQEkJCqZYWxGqGR432srkcWEKXyN6F2vhldXhWbVuC8HTQZ9R7PI6O13v E/rQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version; bh=Gg/BaWt+15gVKoUShl2jc0I9Ay9Vf6aYA9RxpPbpJrw=; fh=9kh36mgGmtOzFEUk2Rq2kBQ5H5kobsDQtn333gVRiK0=; b=HJTVO+YC5TzmNhagVvM1ek0CA7PMZsltkxZQSdU9PSvCVf0Pfhl4hnTSsFTCXnDoPg UGS3QMu1XOu2japghGHGe/Qxkecbb5UJwhomygKv25oykcHz3B+kW6IsqWjsvHlSKo5V YdRARkiU0gsb4ugCcUCAxsIVRzZ0ezpO8TjaKrvDpsqBbWBEnLwcjGAwk93EJj/F9gfU BJBA/oCp9KZey7iIArH2MGjih+dDnxB6idX+zZXAa3l91w8LvWd/GpEnxEhVI0xKDDJ6 bGGM6AJEdltQpM8TarMcCKELBZVH82wvyjuHKiGWy0Y0KAuL7yGLvi3gbld9wBAuSyKi YYNg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id cm4-20020a056a020a0400b005be264316d6si3573993pgb.598.2023.11.24.08.43.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Nov 2023 08:43:02 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id E86B0814230E; Fri, 24 Nov 2023 08:42:58 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345407AbjKXQmk convert rfc822-to-8bit (ORCPT + 99 others); Fri, 24 Nov 2023 11:42:40 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46510 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231285AbjKXQmj (ORCPT ); Fri, 24 Nov 2023 11:42:39 -0500 Received: from smtp-out2.suse.de (smtp-out2.suse.de [IPv6:2a07:de40:b251:101:10:150:64:2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 04653199A; Fri, 24 Nov 2023 08:42:44 -0800 (PST) Received: from imap2.dmz-prg2.suse.org (imap2.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:98]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 72B201FDF6; Fri, 24 Nov 2023 16:42:42 +0000 (UTC) Received: from imap2.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap2.dmz-prg2.suse.org (Postfix) with ESMTPS id EDA38132E2; Fri, 24 Nov 2023 16:42:38 +0000 (UTC) Received: from dovecot-director2.suse.de ([10.150.64.162]) by imap2.dmz-prg2.suse.org with ESMTPSA id rLxzJ37SYGU5SQAAn2gu4w (envelope-from ); Fri, 24 Nov 2023 16:42:38 +0000 Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.200.91.1.1\)) Subject: Re: [PATCH] bcache: revert replacing IS_ERR_OR_NULL with IS_ERR From: Coly Li In-Reply-To: <11a7d768-c6e7-4a6e-875d-87858bf023a5@kernel.dk> Date: Sat, 25 Nov 2023 00:42:21 +0800 Cc: Markus Weippert , Bcache Linux , Thorsten Leemhuis , Zheng Wang , linux-kernel@vger.kernel.org, =?utf-8?Q?Stefan_F=C3=B6rster?= , Greg Kroah-Hartman , "stable@vger.kernel.org" , Linux kernel regressions list Content-Transfer-Encoding: 8BIT Message-Id: <640974BB-8D2A-4B64-B8F6-C59E931DDFE4@suse.de> References: <71576a9ff7398bfa4b8c0a1a1a2523383b056168.camel@gekmihesg.de> <989C39B9-A05D-4E4F-A842-A4943A29FFD6@suse.de> <1c2a1f362d667d36d83a5ba43218bad199855b11.camel@gekmihesg.de> <3DF4A87A-2AC1-4893-AE5F-E921478419A9@suse.de> <54706535-208b-43b5-814f-570ffa7b29bb@kernel.dk> <910112B4-168D-4ECC-B374-7E6668B778F9@suse.de> <11a7d768-c6e7-4a6e-875d-87858bf023a5@kernel.dk> To: Jens Axboe X-Mailer: Apple Mail (2.3774.200.91.1.1) X-Spamd-Bar: +++++++++++++ Authentication-Results: smtp-out2.suse.de; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=suse.de (policy=none); spf=softfail (smtp-out2.suse.de: 2a07:de40:b281:104:10:150:64:98 is neither permitted nor denied by domain of colyli@suse.de) smtp.mailfrom=colyli@suse.de X-Rspamd-Server: rspamd2 X-Spamd-Result: default: False [13.70 / 50.00]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; MV_CASE(0.50)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; FREEMAIL_ENVRCPT(0.00)[163.com]; R_SPF_SOFTFAIL(4.60)[~all:c]; BAYES_HAM(-0.09)[64.76%]; RCVD_COUNT_THREE(0.00)[3]; NEURAL_SPAM_SHORT(3.00)[1.000]; MX_GOOD(-0.01)[]; NEURAL_SPAM_LONG(3.50)[1.000]; RCPT_COUNT_SEVEN(0.00)[10]; DBL_BLOCKED_OPENRESOLVER(0.00)[suse.de:email,gekmihesg.de:email,kernel.dk:email]; FUZZY_BLOCKED(0.00)[rspamd.com]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(2.20)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_CC(0.00)[gekmihesg.de,vger.kernel.org,leemhuis.info,163.com,incertum.net,linuxfoundation.org,lists.linux.dev]; RCVD_TLS_ALL(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; DMARC_POLICY_SOFTFAIL(0.10)[suse.de : No valid SPF, No valid DKIM,none] X-Spam-Score: 13.70 X-Rspamd-Queue-Id: 72B201FDF6 X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Fri, 24 Nov 2023 08:42:59 -0800 (PST) > 2023年11月25日 00:35,Jens Axboe 写道: > > On 11/24/23 9:34 AM, Coly Li wrote: >> >> >>> 2023?11?25? 00:31?Jens Axboe ??? >>> >>> On 11/24/23 9:29 AM, Coly Li wrote: >>>> >>>> >>>>> 2023?11?24? 23:14?Markus Weippert ??? >>>>> >>>>> Commit 028ddcac477b ("bcache: Remove unnecessary NULL point check in >>>>> node allocations") replaced IS_ERR_OR_NULL by IS_ERR. This leads to a >>>>> NULL pointer dereference. >>>>> >>>>> BUG: kernel NULL pointer dereference, address: 0000000000000080 >>>>> Call Trace: >>>>> ? __die_body.cold+0x1a/0x1f >>>>> ? page_fault_oops+0xd2/0x2b0 >>>>> ? exc_page_fault+0x70/0x170 >>>>> ? asm_exc_page_fault+0x22/0x30 >>>>> ? btree_node_free+0xf/0x160 [bcache] >>>>> ? up_write+0x32/0x60 >>>>> btree_gc_coalesce+0x2aa/0x890 [bcache] >>>>> ? bch_extent_bad+0x70/0x170 [bcache] >>>>> btree_gc_recurse+0x130/0x390 [bcache] >>>>> ? btree_gc_mark_node+0x72/0x230 [bcache] >>>>> bch_btree_gc+0x5da/0x600 [bcache] >>>>> ? cpuusage_read+0x10/0x10 >>>>> ? bch_btree_gc+0x600/0x600 [bcache] >>>>> bch_gc_thread+0x135/0x180 [bcache] >>>>> >>>>> The relevant code starts with: >>>>> >>>>> new_nodes[0] = NULL; >>>>> >>>>> for (i = 0; i < nodes; i++) { >>>>> if (__bch_keylist_realloc(&keylist, bkey_u64s(&r[i].b->key))) >>>>> goto out_nocoalesce; >>>>> // ... >>>>> out_nocoalesce: >>>>> // ... >>>>> for (i = 0; i < nodes; i++) >>>>> if (!IS_ERR(new_nodes[i])) { // IS_ERR_OR_NULL before >>>>> 028ddcac477b >>>>> btree_node_free(new_nodes[i]); // new_nodes[0] is NULL >>>>> rw_unlock(true, new_nodes[i]); >>>>> } >>>>> >>>>> This patch replaces IS_ERR() by IS_ERR_OR_NULL() to fix this. >>>>> >>>>> Fixes: 028ddcac477b ("bcache: Remove unnecessary NULL point check in >>>>> node allocations") >>>>> Link: >>>>> https://lore.kernel.org/all/3DF4A87A-2AC1-4893-AE5F-E921478419A9@suse.de/ >>>>> Cc: stable@vger.kernel.org >>>>> Cc: Zheng Wang >>>>> Cc: Coly Li >>>>> Signed-off-by: Markus Weippert >>>> >>>> Added into my for-next. Thanks for patching up. >>> >>> We should probably get this into the current release, rather than punt >>> it to 6.8. >> >> Yes, copied. So far I don?t have other bcache patches for 6.7, I feel >> I might be redundant if I send you another for -rc4 series with this >> single patch. >> >> Could you please directly take it into -rc4? > > Sure, I'll just grab it as-is. Thanks for doing this. Coly Li