From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965396AbcJXURn (ORCPT ); Mon, 24 Oct 2016 16:17:43 -0400 Received: from mail-oi0-f68.google.com ([209.85.218.68]:36389 "EHLO mail-oi0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S935599AbcJXURk (ORCPT ); Mon, 24 Oct 2016 16:17:40 -0400 MIME-Version: 1.0 In-Reply-To: References: <20161024191126.30256-1-socketcan@hartkopp.net> From: Cong Wang Date: Mon, 24 Oct 2016 13:17:19 -0700 Message-ID: Subject: Re: [PATCH] can: fix warning in bcm_connect/proc_register To: Oliver Hartkopp Cc: Andrey Konovalov , David Miller , linux-can@vger.kernel.org, Linux Kernel Network Developers , LKML , syzkaller , Kostya Serebryany , Alexander Potapenko , Dmitry Vyukov , Eric Dumazet Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 24, 2016 at 1:10 PM, Cong Wang wrote: > On Mon, Oct 24, 2016 at 12:11 PM, Oliver Hartkopp > wrote: >> if (proc_dir) { >> /* unique socket address as filename */ >> sprintf(bo->procname, "%lu", sock_i_ino(sk)); >> bo->bcm_proc_read = proc_create_data(bo->procname, 0644, >> proc_dir, >> &bcm_proc_fops, sk); >> + if (!bo->bcm_proc_read) { >> + ret = -ENOMEM; >> + goto fail; >> + } > > Well, I meant we need to call proc_create_data() once per socket, > so we need a check before proc_create_data() too. Hmm, bo->bound should guarantee it, so never mind, your patch looks fine.