Re: BUG: KASAN: slab-out-of-bounds in perf_callchain_user+0x494/0x530
From: Namhyung Kim
Date: Tue Dec 05 2017 - 09:50:09 EST
Hi Arnaldo,
On Tue, Dec 05, 2017 at 10:37:40AM -0300, Arnaldo Carvalho de Melo wrote:
> Em Tue, Dec 05, 2017 at 05:11:56PM +0900, Namhyung Kim escreveu:
> > Also I'm not sure that the allocation failure check would work
> > correctly since it decrements nr_callchain_events when it fails.
>
> Can you elaborate a bit more?
Sure, I mean the following code:
mutex_lock(&callchain_mutex);
count = atomic_inc_return(&nr_callchain_events);
if (WARN_ON_ONCE(count < 1)) {
err = -EINVAL;
goto exit;
}
if (count > 1) {
/* If the allocation failed, give up */
if (!callchain_cpus_entries)
err = -ENOMEM;
goto exit;
}
err = alloc_callchain_buffers();
exit:
if (err)
atomic_dec(&nr_callchain_events);
mutex_unlock(&callchain_mutex);
The callchain_cpus_entries is allocated in alloc_callchain_buffers()
only when the count is 1. But if it failed to allocate, it decrease
the count so next event would try to allocate it again. Thus it seems
not possible to see the callchain_cpus_entries being NULL in the
'if (count > 1)' block. If you want to make next event give up, it'd
need to take an additional count IMHO.
Thanks,
Namhyung