Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp477883rwb; Thu, 1 Dec 2022 04:47:54 -0800 (PST) X-Google-Smtp-Source: AA0mqf7yWXH7B3caICsQt6f7W9PVgacqec0lJ8DOSVhkVX2ewKhYQkZPnf8i79cWNyo/hhC1fZ6x X-Received: by 2002:a17:907:900f:b0:7c0:9879:38d4 with SMTP id ay15-20020a170907900f00b007c0987938d4mr7629291ejc.746.1669898874563; Thu, 01 Dec 2022 04:47:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669898874; cv=none; d=google.com; s=arc-20160816; b=HIJ36ODOQjfnZVLGmFVwUBHMnWVHZMqWCEm1xkaT2tN+w0vr1r9Z+HZtS8/5zPHGN1 0lvS7qcceN5rQGKLW5swh81Mi9MqV0fLp0ZiIuN72tDuDEIeNTvSM4+XBygBhgmoVJw/ HRpUM4fCmQcAekLeu9OogiaJm1GSh8eUOVmlLxE5NDFzKeB/3o957NncilQxHwxx8USa 1/7NUG4b8ZVkhzJ4Cg/nYdNnT9+UT1Qn068jU8jMshDINEG6FbJIa19PuDegN2H8sjav ql/uFuEabQcB/us5KTH2GBqN+8RhzKJAKrgZBQtVaTzxQ3lz3WQ3kU6H2jrzai7uObEm s49A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=U4glzr9urE6v8p51F28BMJIFHrbyt+Sa7sNX5H5eZ4s=; b=YwyXnW7o1akSRZEF29X39rFa2pQRqkmUXEwmr2UI8IbImpktOKxDg3IzqLoNR+HVVz HEa62dAZ2m0Tkv6DpTxjeMv1mAlJSuXBgNvEWIV3ja8QKmUz8pqG6QisPHX9/MJupTE7 6rJUe2KdluOShk3wMnhimxAFv526augVRzkj1EIlvPLDoHS25+m23VCN9QkcpODlx0Dw G6d53aE1N5F0beapIicGdpP1C9BL6zeDxp38+OZF+94dwevW+isdoC0omiQ7/JLAaeWR ve5EQeWE/PSdGi/snNcR5JhRyKdHuGt7EbMR6zLvH3f6RzQnY2iQCbH31A5ImYQlbBs+ G9Bw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Jgg9qR1a; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l3-20020a170906794300b007b790c183d2si4364025ejo.469.2022.12.01.04.47.34; Thu, 01 Dec 2022 04:47:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Jgg9qR1a; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231253AbiLAM2O (ORCPT + 82 others); Thu, 1 Dec 2022 07:28:14 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40160 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229805AbiLAM2N (ORCPT ); Thu, 1 Dec 2022 07:28:13 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 73CE1B2B5D; Thu, 1 Dec 2022 04:28:12 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 2AEC8B81F15; Thu, 1 Dec 2022 12:28:11 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5D4ECC433C1; Thu, 1 Dec 2022 12:28:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1669897689; bh=5hzTKe1z1U5sejxeXQyxInS5nIJFlja1ta0FOczwT6I=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Jgg9qR1aGEGRF4pUUnkHCQeOMODwxmdfQ0e9Q7l04uoXoIIvgTODXBQQm1Pvax1LQ tP8kapj9KGuSOD5zzaxoalu3J2bIro6+nT3IxVWVo8opUO8xQ6bfFZCWc+C8IMWlxO fnjgWK3ig5kwRGtP+8b1Ibiu91Wr0uAUDU31Za7M= Date: Thu, 1 Dec 2022 13:28:06 +0100 From: Greg KH To: Yang Yingliang Cc: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, logang@deltatee.com, dan.j.williams@intel.com, hans.verkuil@cisco.com, alexandre.belloni@free-electrons.com, viro@zeniv.linux.org.uk Subject: Re: [PATCH v2] chardev: fix error handling in cdev_device_add() Message-ID: References: <20221025113957.693723-1-yangyingliang@huawei.com> <65b29177-6892-7578-b2ae-a09d5adab661@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <65b29177-6892-7578-b2ae-a09d5adab661@huawei.com> X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Dec 01, 2022 at 08:06:44PM +0800, Yang Yingliang wrote: > Hi Greg, > > On 2022/10/25 21:37, Greg KH wrote: > > On Tue, Oct 25, 2022 at 09:20:12PM +0800, Yang Yingliang wrote: > > > Hi, Greg > > > > > > On 2022/10/25 19:50, Greg KH wrote: > > > > On Tue, Oct 25, 2022 at 07:39:57PM +0800, Yang Yingliang wrote: > > > > > While doing fault injection test, I got the following report: > > > > > > > > > > ------------[ cut here ]------------ > > > > > kobject: '(null)' (0000000039956980): is not initialized, yet kobject_put() is being called. > > > > > WARNING: CPU: 3 PID: 6306 at kobject_put+0x23d/0x4e0 > > > > > CPU: 3 PID: 6306 Comm: 283 Tainted: G W 6.1.0-rc2-00005-g307c1086d7c9 #1253 > > > > > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 > > > > > RIP: 0010:kobject_put+0x23d/0x4e0 > > > > > Call Trace: > > > > > > > > > > cdev_device_add+0x15e/0x1b0 > > > > > __iio_device_register+0x13b4/0x1af0 [industrialio] > > > > > __devm_iio_device_register+0x22/0x90 [industrialio] > > > > > max517_probe+0x3d8/0x6b4 [max517] > > > > > i2c_device_probe+0xa81/0xc00 > > > > > > > > > > When device_add() is injected fault and returns error, if dev->devt is not set, > > > > > cdev_add() is not called, cdev_del() is not needed. Fix this by checking dev->devt > > > > > in error path. > > > > Nit, please wrap your changelog text at 72 columns. > > > > > > > > > Fixes: 233ed09d7fda ("chardev: add helper function to register char devs with a struct device") > > > > > Signed-off-by: Yang Yingliang > > > > > --- > > > > > v1 -> v2: > > > > > Add information to update commit message. > > > > > v1 link: https://lore.kernel.org/lkml/1959fa74-b06c-b8bc-d14f-b71e5c4290ee@huawei.com/T/ > > > > > --- > > > > > fs/char_dev.c | 2 +- > > > > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > > > > > > > diff --git a/fs/char_dev.c b/fs/char_dev.c > > > > > index ba0ded7842a7..3f667292608c 100644 > > > > > --- a/fs/char_dev.c > > > > > +++ b/fs/char_dev.c > > > > > @@ -547,7 +547,7 @@ int cdev_device_add(struct cdev *cdev, struct device *dev) > > > > > } > > > > > rc = device_add(dev); > > > > > - if (rc) > > > > > + if (rc && dev->devt) > > > > No, this is a layering violation and one that you do not know is really > > > > going to be true or not. the devt being present, or not, should not be > > > > an issue of if the device_add failed or not. This isn't correct, sorry. > > > Do you mean it's not a bug or the warn can be ignored or it's bug in driver > > > ? > > > I see devt is checked before calling cdev_del() in cdev_device_del(). > > Ah! The core doesn't set devt, the caller has that set. That makes > > more sense now, sorry for the confusion on my side. > > > > Yes, this looks correct, the diff didn't have the full context and I was > > confused. > > > > I'll go queue this up, very nice work. > > > > greg k-h > I didn't find this patch in your trees, does it been merged? Hm, is this: 4634c973096a ("chardev: Fix potential memory leak when cdev_add() failed") or is this a different patch? If different, it's not in my review queue anymore, sorry, can you resend it? thanks, greg k-h