Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932421AbWCHDWQ (ORCPT ); Tue, 7 Mar 2006 22:22:16 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S932422AbWCHDWQ (ORCPT ); Tue, 7 Mar 2006 22:22:16 -0500 Received: from smtp108.sbc.mail.re2.yahoo.com ([68.142.229.97]:16224 "HELO smtp108.sbc.mail.re2.yahoo.com") by vger.kernel.org with SMTP id S932421AbWCHDWP (ORCPT ); Tue, 7 Mar 2006 22:22:15 -0500 From: Dmitry Torokhov To: Greg KH Subject: Re: Fw: Re: oops in choose_configuration() Date: Tue, 7 Mar 2006 22:22:10 -0500 User-Agent: KMail/1.9.1 Cc: Linus Torvalds , Chuck Ebbert <76306.1226@compuserve.com>, Andrew Morton , Ingo Molnar , linux-kernel References: <200603071657_MC3-1-BA0F-6372@compuserve.com> <200603072013.29227.dtor_core@ameritech.net> <20060308012744.GA24739@kroah.com> In-Reply-To: <20060308012744.GA24739@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200603072222.11504.dtor_core@ameritech.net> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2431 Lines: 55 On Tuesday 07 March 2006 20:27, Greg KH wrote: > On Tue, Mar 07, 2006 at 08:13:28PM -0500, Dmitry Torokhov wrote: > > On Tuesday 07 March 2006 19:57, Linus Torvalds wrote: > > > > > > On Tue, 7 Mar 2006, Chuck Ebbert wrote: > > > > > > > > At least one susbsystem rolls its own method of adding env vars to the > > > > uevent buffer, and it's so broken it triggers the WARN_ON() in > > > > lib/vsprintf.c::vsnprintf() by passing a negative length to that function. > > > > > > Well, snprintf() should be safe, though. It will warn if the caller is > > > lazy, but these days, the thing does > > > > > > max(buf_size - len, 0) > > > > > > which should mean that the input layer passes in 0 instead of a negative > > > number. And snprintf() will then _not_ print anything. > > > > > > So I think input_add_uevent_bm_var() is safe, even if it's not pretty. > > > > > > However, input_devices_read() doesn't do any sanity checking at all, and > > > if that ever ends up printing more than a page, that would be bad. I > > > didn't look very closely, but it looks worrisome. > > > > > > Dmitry? > > > > I had all this code converted to seq_file, but it depends on converting > > input handlers to class interfaces and it is not possible nowadays > > because with latest Greg's changes to class code we would try to > > register class devices while registering class devices/interfaces > > (psmouse creates input_dev which binds to mousedev interface which in > > turn tries to create mouseX which is also belongs to input class) and > > deadlocking. Greg promised current implementation is only a temporary > > solution. > > > > I suppose I could separate those changes... > > That would probably be a good idea :) > Hmm, what is the policy for attr->show()? With hotplug variables we return -ENOMEM if there is not enough memory to store all data, but what about attributes? Should we also return error (and which one, -ENOMEM, -ENOBUFS?) or fill as much as we can and return up to PAGE_SIZE? With sysfs not kernel nor application can really recover if attribute needs buffer larger than a page. Or just rely on BUG_ON in fs/sysfs/file.c::fill_read_buffer()? -- Dmitry - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/