lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.64.0901141719560.12990@melkki.cs.Helsinki.FI>
Date:	Wed, 14 Jan 2009 17:20:19 +0200 (EET)
From:	Pekka J Enberg <penberg@...helsinki.fi>
To:	cl@...ux-foundation.org
cc:	linux-kernel@...r.kernel.org
Subject: [PATCH] SLUB: Use WARN_ON instead of BUG_ON where appropriate

From: Pekka Enberg <penberg@...helsinki.fi>

It's better to WARN_ON and let the kernel limp along to increase the likelihood
of an user detecting the error and reporting it to us.

Signed-off-by: Pekka Enberg <penberg@...helsinki.fi>
---
 mm/slub.c |   22 ++++++++++++++--------
 1 files changed, 14 insertions(+), 8 deletions(-)

diff --git a/mm/slub.c b/mm/slub.c
index 6392ae5..e4404a1 100644
--- a/mm/slub.c
+++ b/mm/slub.c
@@ -1119,7 +1119,8 @@ static struct page *new_slab(struct kmem_cache *s, gfp_t flags, int node)
 	void *last;
 	void *p;
 
-	BUG_ON(flags & GFP_SLAB_BUG_MASK);
+	if (WARN_ON(flags & GFP_SLAB_BUG_MASK))
+		return NULL;
 
 	page = allocate_slab(s,
 		flags & (GFP_RECLAIM_MASK | GFP_CONSTRAINT_MASK), node);
@@ -2746,12 +2747,13 @@ void kfree(const void *x)
 		return;
 
 	page = virt_to_head_page(x);
-	if (unlikely(!PageSlab(page))) {
-		BUG_ON(!PageCompound(page));
-		put_page(page);
+	if (likely(PageSlab(page))) {
+		slab_free(page->slab, page, object, _RET_IP_);
 		return;
-	}
-	slab_free(page->slab, page, object, _RET_IP_);
+	} else if (WARN_ON(!PageCompound(page)))
+		return;
+
+	put_page(page);
 }
 EXPORT_SYMBOL(kfree);
 
@@ -4285,7 +4287,8 @@ static char *create_unique_id(struct kmem_cache *s)
 	char *name = kmalloc(ID_STR_LENGTH, GFP_KERNEL);
 	char *p = name;
 
-	BUG_ON(!name);
+	if (WARN_ON(!name))
+		return NULL;
 
 	*p++ = ':';
 	/*
@@ -4304,7 +4307,8 @@ static char *create_unique_id(struct kmem_cache *s)
 	if (p != name + 1)
 		*p++ = '-';
 	p += sprintf(p, "%07d", s->size);
-	BUG_ON(p > name + ID_STR_LENGTH - 1);
+	if (WARN_ON(p > name + ID_STR_LENGTH - 1))
+		return NULL;
 	return name;
 }
 
@@ -4333,6 +4337,8 @@ static int sysfs_slab_add(struct kmem_cache *s)
 		 * for the symlinks.
 		 */
 		name = create_unique_id(s);
+		if (!name)
+			return -EINVAL;
 	}
 
 	s->kobj.kset = slab_kset;
-- 
1.5.4.3

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ