From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934427AbbDVPVm (ORCPT ); Wed, 22 Apr 2015 11:21:42 -0400 Received: from mx1.redhat.com ([209.132.183.28]:42046 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933943AbbDVPVh (ORCPT ); Wed, 22 Apr 2015 11:21:37 -0400 Date: Wed, 22 Apr 2015 11:21:34 -0400 From: Don Zickus To: Ulrich Obergfell Cc: Chris Metcalf , Frederic Weisbecker , Ingo Molnar , Andrew Morton , Andrew Jones , chai wen , Fabian Frederick , Aaron Tomlin , Ben Zhang , Christoph Lameter , Gilad Ben-Yossef , Steven Rostedt , linux-kernel@vger.kernel.org, Jonathan Corbet , linux-doc@vger.kernel.org, Thomas Gleixner , Peter Zijlstra Subject: Re: [PATCH v9 2/3] watchdog: add watchdog_cpumask sysctl to assist nohz Message-ID: <20150422152134.GW98296@redhat.com> References: <20150416152808.GA16270@lerouge> <1429295838-6328-1-git-send-email-cmetcalf@ezchip.com> <1429295838-6328-2-git-send-email-cmetcalf@ezchip.com> <741962750.4712066.1429700551405.JavaMail.zimbra@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <741962750.4712066.1429700551405.JavaMail.zimbra@redhat.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 22, 2015 at 07:02:31AM -0400, Ulrich Obergfell wrote: > > Chris, > > in https://lkml.org/lkml/2015/4/17/616 you stated: > > ">> + alloc_cpumask_var(&watchdog_cpumask_for_smpboot, GFP_KERNEL); > > > > alloc_cpumask_var could fail? > > Good catch; if I get a failure I'll just return early without trying to > start the watchdog, since clearly things are too memory-constrained > to enable that functionality anyway." > > Let's assume that (in spite of the memory constraints) the kernel would still > be able to make progress and get to a point where the system will be usable. > In this corner case, the following code would leave a NULL pointer behind in > watchdog_cpumask and in watchdog_cpumask_bits which could subsequently lead > to a crash. > > void __init lockup_detector_init(void) > { > set_sample_period(); > > + if (!alloc_cpumask_var(&watchdog_cpumask, GFP_KERNEL)) { > + pr_err("Failed to allocate cpumask for watchdog"); > + return; > + } > + watchdog_cpumask_bits = cpumask_bits(watchdog_cpumask); > > For example, proc_watchdog_cpumask() and the change that your patch introduces > in watchdog_enable_all_cpus() are not protected against a possible NULL pointer. > I think the code needs to be made safer. Or we could just statically allocate it static DECLARE_BITMAP(watchdog_cpumask, NR_CPUS) __read_mostly; Cheers, Don