summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLi Qiong <liqiong@nfschina.com>2025-09-06 21:58:55 -0400
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2025-09-09 18:50:24 +0200
commit7e287256904ee796c9477e3ec92b07f236481ef3 (patch)
treefce52e3097655bb0ed5684ae40de0bab1129ed8a
parent8b9a5269b442e5942892565bd85169642bc2ee8c (diff)
downloadlinux-7e287256904ee796c9477e3ec92b07f236481ef3.tar.gz
linux-7e287256904ee796c9477e3ec92b07f236481ef3.tar.bz2
linux-7e287256904ee796c9477e3ec92b07f236481ef3.zip
mm/slub: avoid accessing metadata when pointer is invalid in object_err()
[ Upstream commit b4efccec8d06ceb10a7d34d7b1c449c569d53770 ] object_err() reports details of an object for further debugging, such as the freelist pointer, redzone, etc. However, if the pointer is invalid, attempting to access object metadata can lead to a crash since it does not point to a valid object. One known path to the crash is when alloc_consistency_checks() determines the pointer to the allocated object is invalid because of a freelist corruption, and calls object_err() to report it. The debug code should report and handle the corruption gracefully and not crash in the process. In case the pointer is NULL or check_valid_pointer() returns false for the pointer, only print the pointer value and skip accessing metadata. Fixes: 81819f0fc828 ("SLUB core") Cc: <stable@vger.kernel.org> Signed-off-by: Li Qiong <liqiong@nfschina.com> Reviewed-by: Harry Yoo <harry.yoo@oracle.com> Reviewed-by: Matthew Wilcox (Oracle) <willy@infradead.org> Signed-off-by: Vlastimil Babka <vbabka@suse.cz> [ struct page instead of slab ] Signed-off-by: Sasha Levin <sashal@kernel.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--mm/slub.c7
1 files changed, 6 insertions, 1 deletions
diff --git a/mm/slub.c b/mm/slub.c
index f95ae136a069..97ac0c7da0f0 100644
--- a/mm/slub.c
+++ b/mm/slub.c
@@ -864,7 +864,12 @@ void object_err(struct kmem_cache *s, struct page *page,
return;
slab_bug(s, "%s", reason);
- print_trailer(s, page, object);
+ if (!object || !check_valid_pointer(s, page, object)) {
+ print_page_info(page);
+ pr_err("Invalid pointer 0x%p\n", object);
+ } else {
+ print_trailer(s, page, object);
+ }
add_taint(TAINT_BAD_PAGE, LOCKDEP_NOW_UNRELIABLE);
}