Received: by 2002:a05:7412:8d1c:b0:fa:4c10:6cad with SMTP id bj28csp31823rdb; Tue, 16 Jan 2024 14:01:15 -0800 (PST) X-Google-Smtp-Source: AGHT+IE2x6yHK1JmvCAAP/IuchB7cVNAltpIaXNRK6JGTE/ObxAI4hqMsKotWtr4Ge2qZ6/p1NOs X-Received: by 2002:a05:6122:4b8b:b0:4b6:d551:d4e9 with SMTP id fd11-20020a0561224b8b00b004b6d551d4e9mr4436321vkb.2.1705442474919; Tue, 16 Jan 2024 14:01:14 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1705442474; cv=pass; d=google.com; s=arc-20160816; b=aveqauOu477rSkN90jRkeWaiUEgJ5JZfcHrdGY/rfo4NJv6hqjZfpbdc+Lc67qPRHm AG86pJD/+rJVoRNFKG45t2grU6EsiSaAGxJf8DAZ2NeQc8UxnR+wsScSnLoTq4TpxSLh TXbNi5s/wu+cyIg32ehU9IkhKLf1SphiR1O6YO61KstNMlJKMTS6Alg0dYhpGsJlUjAP lAgse/KKxcbUjF3/ynO4HoO3oPTyoI5vWTgUmp8sICDQDeUcICfErm9SB5JV20e/fynP TwKx5+AS6q4qqRGRFSvGlKsogsUWln9F4lHAEqCPLva72bkGJCU636WlcLE1KOMZNwqG i3+Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=HxPcMOxQ1L/MlP7OMDLtzMHVzbXZabv0tODft6m3zy4=; fh=0eSPPyZ+rdHwwsb12Hn/i+N/VGOKhK1/Mj2An4VWtIk=; b=nBWyGDCKitz7x6VzJM8Jrn1Q90hpvrMm3OA3OO25GD2hrodie2WT9CfSwusIvSJawn LGiGBteAd5Bxn9p4eeHgyI4ZCe6nMG1FKtNQJSJMFdtn914TnlNas3+i0+gmfBtOPR+8 bKcJqDtKOZIY5y0vggyxGaiqDpBl8j6PQYb+0CYz3dQ8rMW9vZIXOrPyr1/OKTwIUIA1 xXkgc+bTgC/e4ra+PxoIAY70S5+MpQx5ZmxBS3DH2xnOXGdwdOSXSHpbwS6aCVyZEGbW UikWM3I0OHEUfkSr61Okxaao7V7OT6kvAIibLHZ3Q+5du7xXGe/4mJqOiCnxkw6Wqa8/ vpKA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YLKhVZTb; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-28214-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-28214-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id r3-20020a0cc403000000b006805f4f3d15si10863834qvi.486.2024.01.16.14.01.14 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Jan 2024 14:01:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-28214-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YLKhVZTb; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-28214-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-28214-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 509BB1C26E91 for ; Tue, 16 Jan 2024 22:01:14 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id E9A5D169B79; Tue, 16 Jan 2024 20:04:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="YLKhVZTb" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1685E165F92; Tue, 16 Jan 2024 20:04:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705435480; cv=none; b=SAV0afuYUX5sz7n7oidhmDRVwsAXFvccb9SNBp87vvhbLd0oUv4BgwlB+K0ZI3PQMrQpfyQ26RhfeHf/AHjMTXzMlSU10gokNLHa6rb3NXvcliXFa1981sfVgOHuF5S+hVcuzzRbX9jTiVpi0keO3zTvnRgxArIpxgK2WqwZ5uI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705435480; c=relaxed/simple; bh=MV8HnOw5PC35GnGAsXoFDqVoDo2oWp7vBPe/Q6VxG3U=; h=Received:DKIM-Signature:From:To:Cc:Subject:Date:Message-ID: X-Mailer:In-Reply-To:References:MIME-Version:X-stable: X-Patchwork-Hint:X-stable-base:Content-Transfer-Encoding; b=SVugxBkFK7Ld70wW4xR2S5ebpG62ELpzcMLUVbA4L4yTs1jaMO/Dzx0gYJNXWoKphwTXvzal15zaiXR2hDbQkIxCZDxJVrsdS+awWj8N2p2RX8iR11WIhZ6SXzDDacKK4VxGB3sNq7l37qNRNBCMgqAf0OTAuL5zvZypMwIcdxo= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=YLKhVZTb; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id A91F1C433B1; Tue, 16 Jan 2024 20:04:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1705435479; bh=MV8HnOw5PC35GnGAsXoFDqVoDo2oWp7vBPe/Q6VxG3U=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YLKhVZTbzlP9RVOSMoBFHN/w2KSF0h8Fnke7WldPL/ZaVwbWvBV9ZTeQgOH0vQJR3 SYEdswFUyKUysEH4u4MtH9r/QZmfWvuhE6I1+TIvC1jJQWF2OaM2X4mWjYSmFZACLT 9mQv38LSsAfRlKzDDHMV0dLbEu6cHwoi2pQGtQ/+inEqkg3Dug5uJV3pRTQs/K5Nck 7cfZqFXz5XJTt2k+5yotCDDD7gDg1LV27nCxE6/ZbGmDk75xXQK0H1Zzc1z+8y3s4L E7mnSH8rGt48sDIFz2b2kOzlKGIIjU5Rpad4J/Wo+gJ0J3+9yRG63SKsAcLRvzd+nB DXh/H9Bh3j9hg== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Zhengchao Shao , Jay Vosburgh , Paolo Abeni , Sasha Levin , j.vosburgh@gmail.com, andy@greyhouse.net, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, netdev@vger.kernel.org Subject: [PATCH AUTOSEL 4.19 03/22] bonding: return -ENOMEM instead of BUG in alb_upper_dev_walk Date: Tue, 16 Jan 2024 15:03:57 -0500 Message-ID: <20240116200432.260016-3-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240116200432.260016-1-sashal@kernel.org> References: <20240116200432.260016-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 4.19.305 Content-Transfer-Encoding: 8bit From: Zhengchao Shao [ Upstream commit d6b83f1e3707c4d60acfa58afd3515e17e5d5384 ] If failed to allocate "tags" or could not find the final upper device from start_dev's upper list in bond_verify_device_path(), only the loopback detection of the current upper device should be affected, and the system is no need to be panic. So return -ENOMEM in alb_upper_dev_walk to stop walking, print some warn information when failed to allocate memory for vlan tags in bond_verify_device_path. I also think that the following function calls netdev_walk_all_upper_dev_rcu ---->>>alb_upper_dev_walk ---------->>>bond_verify_device_path From this way, "end device" can eventually be obtained from "start device" in bond_verify_device_path, IS_ERR(tags) could be instead of IS_ERR_OR_NULL(tags) in alb_upper_dev_walk. Signed-off-by: Zhengchao Shao Acked-by: Jay Vosburgh Link: https://lore.kernel.org/r/20231118081653.1481260-1-shaozhengchao@huawei.com Signed-off-by: Paolo Abeni Signed-off-by: Sasha Levin --- drivers/net/bonding/bond_alb.c | 3 ++- drivers/net/bonding/bond_main.c | 5 ++++- 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/drivers/net/bonding/bond_alb.c b/drivers/net/bonding/bond_alb.c index e03f4883858a..5947c1305527 100644 --- a/drivers/net/bonding/bond_alb.c +++ b/drivers/net/bonding/bond_alb.c @@ -984,7 +984,8 @@ static int alb_upper_dev_walk(struct net_device *upper, void *_data) if (netif_is_macvlan(upper) && !strict_match) { tags = bond_verify_device_path(bond->dev, upper, 0); if (IS_ERR_OR_NULL(tags)) - BUG(); + return -ENOMEM; + alb_send_lp_vid(slave, upper->dev_addr, tags[0].vlan_proto, tags[0].vlan_id); kfree(tags); diff --git a/drivers/net/bonding/bond_main.c b/drivers/net/bonding/bond_main.c index 79b36f1c50ae..920b491bd4cd 100644 --- a/drivers/net/bonding/bond_main.c +++ b/drivers/net/bonding/bond_main.c @@ -2460,8 +2460,11 @@ struct bond_vlan_tag *bond_verify_device_path(struct net_device *start_dev, if (start_dev == end_dev) { tags = kcalloc(level + 1, sizeof(*tags), GFP_ATOMIC); - if (!tags) + if (!tags) { + net_err_ratelimited("%s: %s: Failed to allocate tags\n", + __func__, start_dev->name); return ERR_PTR(-ENOMEM); + } tags[level].vlan_proto = VLAN_N_VID; return tags; } -- 2.43.0