[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <86349002-49d7-7053-b26f-51309e320a04@lca.pw>
Date: Tue, 22 Jan 2019 13:46:38 -0500
From: Qian Cai <cai@....pw>
To: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Sebastian Andrzej Siewior <bigeasy@...utronix.de>
Cc: linux-kernel@...r.kernel.org,
Andrew Morton <akpm@...ux-foundation.org>,
Anders Roxell <anders.roxell@...aro.org>,
Arnd Bergmann <arnd@...db.de>, Michal Hocko <mhocko@...e.com>,
linux-mm@...ck.org
Subject: Re: [PATCH] backing-dev: no need to check return value of
debugfs_create functions
On 1/22/19 1:33 PM, Greg Kroah-Hartman wrote:
> On Tue, Jan 22, 2019 at 06:19:08PM +0100, Sebastian Andrzej Siewior wrote:
>> On 2019-01-22 17:25:03 [+0100], Greg Kroah-Hartman wrote:
>>>>> }
>>>>>
>>>>> static void bdi_debug_unregister(struct backing_dev_info *bdi)
>>>>> {
>>>>> - debugfs_remove(bdi->debug_stats);
>>>>> - debugfs_remove(bdi->debug_dir);
>>>>> + debugfs_remove_recursive(bdi->debug_dir);
>>>>
>>>> this won't remove it.
>>>
>>> Which is fine, you don't care.
>>
>> but if you cat the stats file then it will dereference the bdi struct
>> which has been free(), right?
>
> Maybe, I don't know, your code is long gone, it doesn't matter :)
>
>>> But step back, how could that original call be NULL? That only happens
>>> if you pass it a bad parent dentry (which you didn't), or the system is
>>> totally out of memory (in which case you don't care as everything else
>>> is on fire).
>>
>> debugfs_get_inode() could do -ENOMEM and then the directory creation
>> fails with NULL.
>
> And if that happens, your system has worse problems :)
Well, there are cases that people are running longevity testing on debug kernels
that including OOM and reading all files in sysfs test cases.
Admittedly, the situation right now is not all that healthy as many things are
unable to survive in a low-memory situation, i.e., kmemleak, dma-api debug etc
could just disable themselves.
That's been said, it certainly not necessary to make the situation worse by
triggering a NULL pointer dereferencing or KASAN use-after-free warnings because
of those patches.
Powered by blists - more mailing lists