Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp5402307pxv; Wed, 21 Jul 2021 04:42:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxOZnZByHJmMC7KONvNnE4pgvaiYL7Aji3U+Om4sQJYLQ2qKQBfYbV/FjIjIuD1R/ttpQha X-Received: by 2002:a05:6402:185:: with SMTP id r5mr3751317edv.349.1626867766603; Wed, 21 Jul 2021 04:42:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626867766; cv=none; d=google.com; s=arc-20160816; b=oc26faMukEaiEqDHFqL64QJ2etjHhzuydjoM4VuPMX5V5eo1oHmzliAB+PdWbNC5H8 RIsr64Ud0YiFP8uthzwqNvvs9sblSpMdt9iApq5JqBM/u6B9tssZAoVxoOjXccFnsNZ7 LfF789onr6e51oSx3WVsSQRIC79eT7JcGiVeBJ8PH/Kf/5G57FxPPRUje9ozoXyszIRq 4V9mSNoJQ3K2UwkT8Y4hxg3kaJQ/ofjgz6nm2H3EQwNIYc5A3DWKFZR4M4oJFBbGRBWF pJyJG2rKT8J5cslkwj133pd++TXhRqfkBs0ujn45noBGaUe65h6rty68HmW+UWammEEI T6HA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=6bHzVoFbvr84N18/jLBrtwDRP6ISXf37Kh/62BXMmjE=; b=muu5Lvb6JCEFzu46rDNHkQIf310EOifmzFwI8X831wJnp6KZ7zotux7+9W2LlByC6R MfHwEE7gCLxwUBaJws3Fc3Q4fRDqdxHx4SpSSXT/NxH1RUjar9CQ66WiVYpsnjKsttFD V7w8AmawW1riIHier19+or6Unf4grM8cLrAIma+nHFbpEZcbK0oOeJyVoLTIiPC+8JYq 88Dxeth7TaDJ/eQal/0BQxHp84vNPGmPLWWNWxJpttw4eT5bMmRMeBKyfEsUuwBl2DpH NaDH7+l66FvGjOtA0A3k2A1QpEDqOQ2ydmmR5s9NaAwCJFo6Eeq6LfO68Mn3H864JIRf k/vA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=UZeIaHEK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v26si15427955ejw.661.2021.07.21.04.42.23; Wed, 21 Jul 2021 04:42:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=UZeIaHEK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237205AbhGULAS (ORCPT + 99 others); Wed, 21 Jul 2021 07:00:18 -0400 Received: from mail.kernel.org ([198.145.29.99]:46120 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237738AbhGUKs7 (ORCPT ); Wed, 21 Jul 2021 06:48:59 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 72A5D60FD7; Wed, 21 Jul 2021 11:29:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626866971; bh=KuqXd9c0oqHy7TdswVIRrqpFLTWdndmpxVDUpS8AoeY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=UZeIaHEKdRo96dzgmo07yomricrlx6+KG9BaiBnyaXBlrGPBbeWvTXCL1WX3fLxfb 6LZBP86wH4eIp/EjLHez/KCaittkmCRT/W/ZZ5HrYMkoB3mlLfB4vGeUuuTGcpMBnO QRgslRJYN9seO9ahClGZW9IY+p/2nXsep/Xrj2Zk= Date: Wed, 21 Jul 2021 13:29:29 +0200 From: Greg KH To: Luis Chamberlain Cc: akpm@linux-foundation.org, minchan@kernel.org, jeyu@kernel.org, ngupta@vflare.org, sergey.senozhatsky.work@gmail.com, rafael@kernel.org, axboe@kernel.dk, tj@kernel.org, mbenes@suse.com, jpoimboe@redhat.com, tglx@linutronix.de, keescook@chromium.org, jikos@kernel.org, rostedt@goodmis.org, peterz@infradead.org, linux-block@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v6 2/3] zram: fix deadlock with sysfs attribute usage and module removal Message-ID: References: <20210703001958.620899-1-mcgrof@kernel.org> <20210703001958.620899-3-mcgrof@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210703001958.620899-3-mcgrof@kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 02, 2021 at 05:19:57PM -0700, Luis Chamberlain wrote: > +#define MODULE_DEVICE_ATTR_FUNC_STORE(_name) \ > +static ssize_t module_ ## _name ## _store(struct device *dev, \ > + struct device_attribute *attr, \ > + const char *buf, size_t len) \ > +{ \ > + ssize_t __ret; \ > + if (!try_module_get(THIS_MODULE)) \ > + return -ENODEV; \ I feel like this needs to be written down somewhere as I see it come up all the time. Again, this is racy and broken code. You can NEVER try to increment your own module reference count unless it has already been incremented by someone external first. As "proof", what happens if this module is unloaded right _before_ this call happens? The module will be unloaded, memory zeroed out (or overridden), and then the processor will resume here and try to call (or return into) this code path. Boom. Just say no to "try_module_get(THIS_MODULE)" as it is totally wrong. thanks, greg k-h