Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp495163rwb; Thu, 1 Dec 2022 05:02:09 -0800 (PST) X-Google-Smtp-Source: AA0mqf5gUfGvEzsm1x3EoQnNtbDGGICTLLYs0MGBI16hMmll6aOrvV9j/V8bigKW1VeHUJs1shj8 X-Received: by 2002:a63:e547:0:b0:473:e2bb:7fc7 with SMTP id z7-20020a63e547000000b00473e2bb7fc7mr40020070pgj.40.1669899729533; Thu, 01 Dec 2022 05:02:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669899729; cv=none; d=google.com; s=arc-20160816; b=fPf9+XuDfwy9cJSF7cXrreVouml/ujPUyhdPliQIkJdulqj/S7IXvwr49d3Y4H4XAR 0AZysLc8LsGFJha+G88XwFeaMKdSvKBbJJDFBEXxydRG0TKiaFYELUUstfSVtX2XSMKn UyOuYuKdDVnYxWqTaJR3x3euFX+5tCuj6yUg4SWizQQ8E53GxWqPukR3fp8neZeMzshj +hqRZ/bLVC4OiQ7WK2q9pyn+CTF31XAeq5kn5If7y5CXQ363nnAZBhTMo7C68ckYqj27 /sJpbvQQmKnsqNgTa/mPy0bompj6eLtanTwTi+UkffVNLq5LzgWw5vGOk3vWKdf5GIVh c/Og== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=LKcc91Pgg1y1b5nPWCpeHJX1Y7cKk8FCsPNxf7Nxdt8=; b=YlqzjL9/LI5TI4hQM5Ezty2aA/3GVGol/zRVLbSPCNcJbjkFlnxI80yGu1TWWbXmWL Hw9ra8oQGZuU0S0VBs6wPbKOw5KbzE619Whbw9ARbBEHG1ZDr/t5ZQRJFdxgrnhZIwo1 KvXinuEhSL8R5jvAoCrrPKonyOPKPvTYjo0O/UqRH6UJ14pJ5StwboeQ9y89ZSHiaox0 6IkYlMBgn2XyI3WExnU4kukra7BYGobej2EQaZT0LqOBF4F3IVCsjX99KOhi2Y26lOWO dxYat90npFaIHVOsDWHk1PUgq95kEAUzGXQMWUs64qbZVkj4uwYORCmT9h59Ss9J6c0q efgg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d16-20020a631d50000000b0047009247403si4265642pgm.409.2022.12.01.05.01.54; Thu, 01 Dec 2022 05:02:09 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231263AbiLAMGu (ORCPT + 82 others); Thu, 1 Dec 2022 07:06:50 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50534 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230454AbiLAMGt (ORCPT ); Thu, 1 Dec 2022 07:06:49 -0500 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6C620934EE; Thu, 1 Dec 2022 04:06:47 -0800 (PST) Received: from dggpemm500007.china.huawei.com (unknown [172.30.72.55]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4NNF7j6kRqzqSqk; Thu, 1 Dec 2022 20:02:41 +0800 (CST) Received: from [10.174.178.174] (10.174.178.174) by dggpemm500007.china.huawei.com (7.185.36.183) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Thu, 1 Dec 2022 20:06:45 +0800 Subject: Re: [PATCH v2] chardev: fix error handling in cdev_device_add() To: Greg KH CC: , , , , , , References: <20221025113957.693723-1-yangyingliang@huawei.com> From: Yang Yingliang Message-ID: <65b29177-6892-7578-b2ae-a09d5adab661@huawei.com> Date: Thu, 1 Dec 2022 20:06:44 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-Originating-IP: [10.174.178.174] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To dggpemm500007.china.huawei.com (7.185.36.183) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.5 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Greg, On 2022/10/25 21:37, Greg KH wrote: > On Tue, Oct 25, 2022 at 09:20:12PM +0800, Yang Yingliang wrote: >> Hi, Greg >> >> On 2022/10/25 19:50, Greg KH wrote: >>> On Tue, Oct 25, 2022 at 07:39:57PM +0800, Yang Yingliang wrote: >>>> While doing fault injection test, I got the following report: >>>> >>>> ------------[ cut here ]------------ >>>> kobject: '(null)' (0000000039956980): is not initialized, yet kobject_put() is being called. >>>> WARNING: CPU: 3 PID: 6306 at kobject_put+0x23d/0x4e0 >>>> CPU: 3 PID: 6306 Comm: 283 Tainted: G W 6.1.0-rc2-00005-g307c1086d7c9 #1253 >>>> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 >>>> RIP: 0010:kobject_put+0x23d/0x4e0 >>>> Call Trace: >>>> >>>> cdev_device_add+0x15e/0x1b0 >>>> __iio_device_register+0x13b4/0x1af0 [industrialio] >>>> __devm_iio_device_register+0x22/0x90 [industrialio] >>>> max517_probe+0x3d8/0x6b4 [max517] >>>> i2c_device_probe+0xa81/0xc00 >>>> >>>> When device_add() is injected fault and returns error, if dev->devt is not set, >>>> cdev_add() is not called, cdev_del() is not needed. Fix this by checking dev->devt >>>> in error path. >>> Nit, please wrap your changelog text at 72 columns. >>> >>>> Fixes: 233ed09d7fda ("chardev: add helper function to register char devs with a struct device") >>>> Signed-off-by: Yang Yingliang >>>> --- >>>> v1 -> v2: >>>> Add information to update commit message. >>>> v1 link: https://lore.kernel.org/lkml/1959fa74-b06c-b8bc-d14f-b71e5c4290ee@huawei.com/T/ >>>> --- >>>> fs/char_dev.c | 2 +- >>>> 1 file changed, 1 insertion(+), 1 deletion(-) >>>> >>>> diff --git a/fs/char_dev.c b/fs/char_dev.c >>>> index ba0ded7842a7..3f667292608c 100644 >>>> --- a/fs/char_dev.c >>>> +++ b/fs/char_dev.c >>>> @@ -547,7 +547,7 @@ int cdev_device_add(struct cdev *cdev, struct device *dev) >>>> } >>>> rc = device_add(dev); >>>> - if (rc) >>>> + if (rc && dev->devt) >>> No, this is a layering violation and one that you do not know is really >>> going to be true or not. the devt being present, or not, should not be >>> an issue of if the device_add failed or not. This isn't correct, sorry. >> Do you mean it's not a bug or the warn can be ignored or it's bug in driver >> ? >> I see devt is checked before calling cdev_del() in cdev_device_del(). > Ah! The core doesn't set devt, the caller has that set. That makes > more sense now, sorry for the confusion on my side. > > Yes, this looks correct, the diff didn't have the full context and I was > confused. > > I'll go queue this up, very nice work. > > greg k-h I didn't find this patch in your trees, does it been merged? Thanks, Yang > .