From: "Jose R. Santos" <jrs@us.ibm.com>
To: Rusev <arusev@dev.rtsoft.ru>
Cc: linux-kernel@vger.kernel.org
Subject: Re: JBD-DEBUG /proc/sys entry (again)
Date: Thu, 4 Oct 2007 17:46:05 -0500 [thread overview]
Message-ID: <20071004174605.6f30c85f@gara> (raw)
In-Reply-To: <4704DC57.9040001@dev.rtsoft.ru>
On Thu, 04 Oct 2007 16:28:07 +0400
Rusev <arusev@dev.rtsoft.ru> wrote:
> All that should be moved to DEBUGFS under /sys/kernel/debug and so on
> - that's right, a bit other issue
> is of interest for me.
>
> My suggestion is that a few other problems with PROCFS exist:
>
> From my observation there are two major issues are involved:
>
> 1. /proc/sys entry has very specific readdir operation (vs. other
> entries such as /proc/drivers and others)
> entries to /proc/sys is likely is to be performed by means of other API.
> (quick search found thet API explanation for 2.4.xx
> http://www.opentech.at/papers/embedded_proc/node33.html,
> yet it looks to be a little change in 2.6)
>
> 2. function xlate_proc_name behaves not the way it specified in it's
> header comment:
> [1] minor issue is that proc_match wolud likely return "equals"
> as result of comparison of "sys" and "sysvipc"
> [2] more significant issue is that it can't properly walk long
> paths such as /proc/sys/jbd/jbd-debug,
> but only paths likes /proc/sys/jbd-debug (just one step
> down, path walking is broken).
>
> This way we can't add not only /proc/sys/jbd/jbd-debug but any path
> likes /proc/aaa/bbb/xxx-debug at one step.
> The entry /proc/sys is still specific, because even if fixing
> xlate_proc_name we can't see /proc/sys/jbd/jbd-debug
> in userspace and successfully see /proc/aaa/bbb/jbd-debug.
This patch is wrong. xlate_pro_name() is meant to check if a given
path is valid, creating new directory entries is something that need to
be handle by the code that's creating the entries.
Also note that xlate_pro_name() is also called by remove_proc_entry()
so if I call it with a bogus path, this patch will end up creating new
directory entries which is not the intended result.
> That's because /proc/sys specific operator readdir blocks such PROCFS
> entries that they are NOTproperly registersd
> with CTL_TABLE.
>
> Yet I think that we have a general problem with
> adding-long-paths-in-one-step, which is addressed by the following patch:
This should not be done is user one step and for good reason. If you
blindly create multiple directory entries in /proc, how are you going to
keep track of all the created entries when its time to remove them
(module unloading for example)?
If you enter an invalid path the original code is doing the right thing
by returning -ENOENT.
>
>
>
> diff -uprN linux-2.6.21.orig/fs/proc/generic.c
> linux-2.6.21/fs/proc/generic.c
> --- linux-2.6.21.orig/fs/proc/generic.c 2007-09-13 15:36:07.000000000 +0400
> +++ linux-2.6.21/fs/proc/generic.c 2007-10-03 22:12:57.000000000 +0400
> @@ -298,6 +298,7 @@ static int xlate_proc_name(const char *n
> int len;
> int rtn = 0;
>
> +
White space damage.
> spin_lock(&proc_subdir_lock);
> de = &proc_root;
> while (1) {
> @@ -305,24 +306,52 @@ static int xlate_proc_name(const char *n
> if (!next)
> break;
>
> - len = next - cp;
> - for (de = de->subdir; de ; de = de->next) {
> - if (proc_match(len, cp, de))
> - break;
> - }
> - if (!de) {
> - rtn = -ENOENT;
> - goto out;
> - }
> - cp += len + 1;
> - }
> + ++next;
> +
> +
> + len = next - cp;
> +
> + if(de->subdir == NULL){
> + /* directory "de" is empty, add myself to it now */
> + char* my_name = kzalloc( (len - 1) + 1, GFP_KERNEL);
You did not check if kzalloc was successfully. If the allocation
fails, bad things will happen here. Need to check the return status of
my_name and return -ENOMEM if the allocation fails. This would of
course mean an API change and you would need make sure that all the
callers of xlate_proc_name handle the new return code correctly.
> + memcpy(my_name, cp, len - 1);
> + proc_mkdir(my_name,de);
> + kfree(my_name);
> + }
> +
> +
> + struct proc_dir_entry *parent_de = de;
> + for (de = parent_de->subdir; de ; de = de->next) {
> + if (proc_match(len - 1, cp, de))
> + break;
> +
> + }
> +
> + if(de == NULL){
> + /* we found no appropriate subdirectory, well create
> it now */
1. Email client cut the line. Disable line wrapping.
2. Line too long - Documentation/CodingStyle
> + char* my_name = kzalloc( (len - 1) + 1, GFP_KERNEL);
Again, check for kzalloc return status.
> + memcpy(my_name, cp, len - 1);
> + de = proc_mkdir(my_name,parent_de);
> + kfree(my_name);
> + }
> +
> +
> +
White space damage. To many new lines. One is enough.
> + if (!de){
> + rtn = -ENOENT;
> + goto out;
> + }
This is basically dead code since you make sure to create a directory
entry if one does not exist. The code above makes sure you never hit
this condition, which is wrong since you should not create directory
entries blindly. Returning -ENOENT on a invalid path is the right thing
to do here.
> + cp += len;
> + }
> *residual = cp;
> *ret = de;
> out:
> spin_unlock(&proc_subdir_lock);
> return rtn;
> +
White space damage.
> }
>
> +
White space damage.
> static DEFINE_IDR(proc_inum_idr);
> static DEFINE_SPINLOCK(proc_inum_lock); /* protects the above */
>
-JRS
prev parent reply other threads:[~2007-10-04 22:46 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-10-04 12:28 JBD-DEBUG /proc/sys entry (again) Rusev
2007-10-04 22:46 ` Jose R. Santos [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20071004174605.6f30c85f@gara \
--to=jrs@us.ibm.com \
--cc=arusev@dev.rtsoft.ru \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox