Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2229379imm; Thu, 9 Aug 2018 09:19:47 -0700 (PDT) X-Google-Smtp-Source: AA+uWPzdeqcpKV/lNJt/ijXSkB8K6pZz1l8lCjZd5NyeZreDxMfsKz/A0Uu0Ob85f9bQwy66ZvW1 X-Received: by 2002:a62:6104:: with SMTP id v4-v6mr3089466pfb.122.1533831587306; Thu, 09 Aug 2018 09:19:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1533831587; cv=none; d=google.com; s=arc-20160816; b=UF9Vm8W6OqPAJxQA0T5ERw85ZbsarG3EWkiXvTXv99aUNNn5oBsKqKIc+2PBS3OXs7 BQ35AeYb8YXPNICEABDxki3qs97WkASpW3TqjRuK8BrekQeIARvlc9xRF7xgllIIRzkN JE4sukpyUzHRmI7n1tG8tzBYO9/xZXUOLX32VB2IQJjH6ZoYva5wY5047IoJ41d4nrQc m6fnzoyd1nYUIZCx/yn5xS1PBINj0zXyhOH7CklJ20NPuY+r2LpAUNABpmFAjlwVd88i mRq8Iv/MrKZGDVkeP7f1XuorhbiPDsSGkoJdFmwEPAvZxerAAm2pE1ypIPf+KaTtYVLf Y8wg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=vtIiaceLHcrVbPZjuT9izGky7YPH8tYL2jzps3mn/0c=; b=g6iMTVIs/mzSPlvc476f60pjA2RGkCHKv2c38Vv3fuwdBBenK0WIgzndfFsmdmcdmx X42CtdHTkrjNr/+qJYX7bJK0+UYgsW3yTm5l6YnW2trKigNqenNZtnvHRJfw9T/ivaDE kzfb5vWfDLbI9gC4ilLQhjQnRwSIP/5S9s+H31cutQrdcs/kVlv8IF5ImCEdVHJfon9w /8az46wZNLjSxBe8Jv8/dtmGYAJ7XsNAuFbbimBz4dfRL+jwsiOuca04zTfPUGtDTmvC R88s8TTxE2Bbej47ygJ3C5yLn9qivBnmuTpHjECOi+oltVdjlaisOOIJ4Ugpp5RNCjVB zUlQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x3-v6si6333140pgo.542.2018.08.09.09.19.32; Thu, 09 Aug 2018 09:19:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732545AbeHISnv (ORCPT + 99 others); Thu, 9 Aug 2018 14:43:51 -0400 Received: from mail.skyhub.de ([5.9.137.197]:37080 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732435AbeHISnv (ORCPT ); Thu, 9 Aug 2018 14:43:51 -0400 X-Virus-Scanned: Nedap ESD1 at mail.skyhub.de Received: from mail.skyhub.de ([127.0.0.1]) by localhost (blast.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id ALuRgVcBss28; Thu, 9 Aug 2018 18:17:57 +0200 (CEST) Received: from nazgul.tnic (77-85-50-230.ip.btc-net.bg [77.85.50.230]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 523791EC01A9; Thu, 9 Aug 2018 18:17:57 +0200 (CEST) Date: Thu, 9 Aug 2018 18:18:06 +0200 From: Borislav Petkov To: Yazen Ghannam Cc: linux-edac@vger.kernel.org, linux-kernel@vger.kernel.org, tony.luck@intel.com, x86@kernel.org Subject: Re: [PATCH 2/2] x86/MCE/AMD: Skip creating kobjects with NULL names Message-ID: <20180809161806.GB20928@nazgul.tnic> References: <20180809140834.59264-1-Yazen.Ghannam@amd.com> <20180809140834.59264-2-Yazen.Ghannam@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20180809140834.59264-2-Yazen.Ghannam@amd.com> User-Agent: Mutt/1.6.0 (2016-04-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Aug 09, 2018 at 09:08:34AM -0500, Yazen Ghannam wrote: > From: Yazen Ghannam > > During mce_threshold_create_device() data structures are allocated for > each CPUs MCA banks and thresholding blocks. These data structures are > used to save information related to AMD's MCA Error Thresholding > feature. The structures are used in the thresholding interrupt handler, > and they are exposed to the user through sysfs. The sysfs interface has > user-friendly names for each bank. > > However, errors in mce_threshold_create_device() will cause all the data > structures to be deallocated. This will break the thresholding interrupt > handler since it depends on these structures. Same argument as before: if our init fails in some fashion, we should not be running the interrupt handler. -- Regards/Gruss, Boris. ECO tip #101: Trim your mails when you reply. --