Commit Graph

437 Commits

Author SHA1 Message Date
Bob Lee
b482911efb
Fix potential memory leak in vinput
In the export_store function, the error handling paths followed a
successful vinput_alloc_vdevice call are missing a corresponding
input_free_device call. Since vinput_alloc_vdevice internally calls
input_allocate_device, and input_register_device has not been called
yet, input_free_device should be used to properly free the allocated
input_device struct in this scenario[1].

[1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/drivers/input/input.c#n2094
2024-10-25 12:22:29 +08:00
Jim Huang
67713859df
Merge pull request #278 from NOVBobLee/fix_refcnt
Some checks failed
status-checks / validate (push) Has been cancelled
build-deploy-assets / build (push) Has been cancelled
deploy-github-page / build (push) Has been cancelled
Fix potential reference count leak in vinput
2024-10-25 11:06:51 +08:00
Bob Lee
3ec01e2cf1
Fix potential reference count leak in vinput
In the export_store function, when vinput_register_vdevice fails, the
current error handling process calls device_unregister followed by
vinput_destroy_vdevice. However, the device_unregister here triggers its
release function, which already includes a call to
vinput_destroy_vdevice. As a result, vinput_destroy_vdevice is called
twice. Since vinput_destroy_vdevice contains module_put, this double
call must be avoided to prevent potential reference count issues.
2024-10-24 19:24:01 +08:00
Jim Huang
ac1894673d
Merge pull request #276 from NOVBobLee/pr
Some checks failed
build-deploy-assets / build (push) Has been cancelled
deploy-github-page / build (push) Has been cancelled
status-checks / validate (push) Has been cancelled
Fix incorrect failure handling in vinput_init
2024-10-21 02:42:13 +08:00
Bob Lee
9b89d0ca04
Fix incorrect failure handling in vinput_init
After class_register failure, the wrong function class_unregister was
used. The correct cleanup function should be unregister_chrdev, as
register_chrdev was used before class_register.
2024-10-21 00:33:06 +08:00
Jim Huang
e2b1756efc
Merge pull request #275 from ChinYikMing/fix/typo
Some checks failed
build-deploy-assets / build (push) Has been cancelled
deploy-github-page / build (push) Has been cancelled
status-checks / validate (push) Has been cancelled
Fix typo
2024-10-17 09:00:32 +08:00
ChinYikMing
4002426f7a Fix typo
The "Message" should be in lower case, so that it matches the variable
which declared as "message".
2024-10-17 02:23:21 +08:00
Jim Huang
756871e427
Merge pull request #273 from NOVBobLee/pr_patch
Some checks failed
build-deploy-assets / build (push) Has been cancelled
deploy-github-page / build (push) Has been cancelled
status-checks / validate (push) Has been cancelled
Correct the function type
2024-10-09 00:56:51 +08:00
Bob Lee
93b35f7819
Fix function declaration
The function pointer type of myvariable_store was incompatible with the
store member of struct kobj_attribute, leading to a compilation error
when the type conversion (void *) was omitted. This patch corrects the
function declaration and eliminates the need for type conversion.
2024-10-09 00:45:04 +08:00
Jim Huang
3203aa3ce5
Merge pull request #274 from NOVBobLee/pr_patch2
Some checks are pending
build-deploy-assets / build (push) Waiting to run
deploy-github-page / build (push) Waiting to run
status-checks / validate (push) Waiting to run
Remove the redundant code
2024-10-08 21:27:38 +08:00
Bob Lee
2a04a64041
Remove the redundant code
As myvariable is declared as an integer, it is meaningless that putting
u after %d in the format specifier of sscanf for scanning an integer.
This patch removes the u in the format specifier for avoiding
misleading.
2024-10-08 12:21:25 +08:00
Jim Huang
2eadbb1ecf
Merge pull request #272 from NOVBobLee/pr_patch
Some checks failed
build-deploy-assets / build (push) Has been cancelled
deploy-github-page / build (push) Has been cancelled
status-checks / validate (push) Has been cancelled
Fix a wierd behavior of a function
2024-10-07 12:11:10 +08:00
Bob Lee
d1d2a2b031
Fix a weird behavior of a function
The procfile_write prints the content what user writes into. However,
when the content size is greater than or equal to PROCFS_MAX_SIZE,
procfile_write will print nothing, because the index for appending the
tail NULL character will be modulo to 0, which is an off-by-one error.

This fixes the problem by changing the upper bound of procfs_buffer_size
to (PROCFS_MAX_SIZE - 1), leaving one byte for NULL character. After
the change, we can discard the modulo because the range of
procfs_buffer_size is already between 0 and (PROCFS_MAX_SIZE - 1).
2024-10-07 12:05:43 +08:00
Jim Huang
1fc5305714
Merge pull request #271 from NOVBobLee/pr_patch
Some checks are pending
build-deploy-assets / build (push) Waiting to run
deploy-github-page / build (push) Waiting to run
status-checks / validate (push) Waiting to run
Remove the redundant code
2024-10-06 21:20:39 +08:00
Bob Lee
8c641a2deb
Remove the redundant code
proc_remove does nothing when the argument is NULL[1]. We don't need
proc_remove after proc_create failed.

[1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/fs/proc/generic.c#n789
2024-10-06 14:25:49 +08:00
Jim Huang
3a09a1e473 Apply editorial changes
Some checks failed
build-deploy-assets / build (push) Has been cancelled
deploy-github-page / build (push) Has been cancelled
status-checks / validate (push) Has been cancelled
2024-10-05 12:01:45 +08:00
Jim Huang
31a14a036c
Merge pull request #269 from sysprog21/ci-bump
Some checks are pending
build-deploy-assets / build (push) Waiting to run
deploy-github-page / build (push) Waiting to run
status-checks / validate (push) Waiting to run
CI: Bump dependency versions
2024-10-05 11:51:02 +08:00
Jim Huang
b1f0c58575 CI: Bump dependency versions 2024-10-05 11:49:44 +08:00
Jim Huang
eb5b4636c4
Merge pull request #268 from algonell/master
Fix typos
2024-10-05 11:45:01 +08:00
Andrew Kreimer
98201b85aa Fix typos via codespell
atleast -> at least
encouter -> encounter
2024-10-04 19:08:50 +03:00
Jim Huang
47663d6aa1
Merge pull request #266 from Ayxan13/fix-sleep-toctou
Fix blocking O_NONBLOCK process bug
2024-08-12 09:34:04 +08:00
Aykhan Hagverdili
4adbf1dd9b Fix: blocking O_NONBLOCK process bug in sleep.c
There is a subtle bug that if the atomic flag changes
between the time it was checked and the second time
it was checked, sleep.c would potentially block a
process that had specified O_NONBLOCK. This fixes
the bug by using atomic_cmpxchg instead of atomic_read.
2024-08-11 21:56:09 +02:00
Andrew Lin
84cc7fee1c
Fix typo (#265)
Change return-object programming to return-oriented programming.
2024-07-22 01:56:37 +08:00
Hao.Dong
950408472e
Add a hook on syscall using Kprobes under x86 (#260)
For x86 architecture, the system call table cannot be used to invoke
a system call after commit 1e3ad78 since v6.9. This commit has been
backported to long term stable kernels, like v5.15.154+, v6.1.85+,
v6.6.26+ and v6.8.5+[1]. In this case, thanks to Kprobes, a hook can be
used instead on the system call entry to intercept the system call.

[1] https://stackoverflow.com/a/78607015

Co-authored-by: Hao Dong <hao.dong.work@outlook.com>
2024-07-05 07:40:53 +08:00
Jim Huang
032d1b8c0c
Merge pull request #264 from jouae/master
Fix a typo
2024-07-04 02:12:50 +08:00
jouae
74a450ba92
Fix a typo
Delete the duplicate word "otherwise"

Before and after:
otherwise, otherwise -> otherwise
2024-07-03 18:46:45 +08:00
Jim Huang
7bcc4fbf46
Merge pull request #263 from pao0626/command-permission-changes
Add sudo for file access permissions
2024-07-03 17:04:14 +08:00
HJ Pao
be16ad6710 Add sudo for file access permissions
Add sudo to commands in Chapter 8 for example module interaction.

The "myvariables" in the module are set with 0660 permissions
via __ATTR(), preventing direct user access.

Options to fix this:
1. Instruct users to use 'sudo' to read/write files.
2. Relax the permission settings to 0666.

This commit adopts the sudo method to maintain security constraints.
2024-07-03 16:31:53 +08:00
Jim Huang
031b9d2b39
Merge pull request #262 from jouae/master
Modify the descritions of seq_file and flowchart
2024-07-03 00:04:38 +08:00
jouae
7a6dd1f582
Modify the descritions of seq_file and flowchart
7.4 The seq_file is missing the behavior that occurs when it
directly returns NULL after the start step.

Also, in the flowchart, the first decision where `return is NULL`
is `Yes` points to nothing, which is not defined in ISO 5807.

ISO 5807 section 10.3.1.2 states logic path of a decision,
"Each exit from a symbol be accompanied by the appropriate
condition values to show the logic path which it represents,
so that the conditions and the associated references are identified."

The behavior of pointing to nothing does not have associated
references and does not indicate the relation of this logic path.

Refs:
	1. The Liunx Kernel Module Programming Guide
	   7.4 Manage /proc file with seq_file
	2. ISO-5807-1985
2024-07-02 23:47:43 +08:00
Jim Huang
1d3943a72b CI: Enforce newline at end of files
Reference:
https://medium.com/@alexey.inkin/how-to-force-newline-at-end-of-files-and-why-you-should-do-it-fdf76d1d090e
2024-06-21 16:39:05 +08:00
Jim Huang
b5709f89f8 Update contributor list 2024-05-26 01:49:53 +08:00
Jim Huang
e1eced6d2f
Merge pull request #258 from visitorckw/fix-vinput
vinput: Fix multiple issue
2024-05-15 05:54:44 +08:00
Kuan-Wei Chiu
0a23ecd027 vinput: Fix incorrect handling on raw_copy_to_user() failure
When raw_copy_to_user() failed in vinput_read(), the function would set
'count' to -EFAULT and then subtract EFAULT from '*offset'. However,
modifying '*offset' on raw_copy_to_user() failure was incorrect. Fix
this behavior by changing count = -EFAULT to return -EFAULT.
2024-05-09 02:01:18 +08:00
Kuan-Wei Chiu
c068fa47e9 vinput: Fix NULL pointer dereference caused by failed kzalloc allocation
When kzalloc fails to allocate memory and returns NULL, it leads to a
NULL pointer dereference error later on. Add a check for the return
value of kzalloc. When kzalloc fails to allocate memory, it prints an
error message and returns ERR_PTR(-ENOMEM).
2024-05-09 02:01:14 +08:00
Kuan-Wei Chiu
1e26743c30 vinput: Remove redundant memset call
Remove redundant memset calls as memory allocated with kzalloc is
already zeroed due to the presence of the __GFP_ZERO gfp flag.
2024-05-09 01:38:14 +08:00
cvvletter
0a27a0140f
Fix typo (#257) 2024-05-05 19:19:43 +08:00
Jim Huang
0d434088f1
Merge pull request #256 from yeh-sudo/improve-readability
Improve readibility
2024-04-25 15:27:40 +08:00
yeh-sudo
617a1d4d52 Improve readibility
Add \cpp before |main()| to improve readibility so that it won't look
like "|main()|" in the paragraph.
2024-04-25 14:49:43 +08:00
Jim Huang
eacb844ad5 Update contributor list 2024-04-21 01:38:20 +08:00
Jim Huang
9952f38afb Fix style 2024-04-21 01:12:33 +08:00
Yo-Jung Lin
86b5e86e5b Refine description in request_threaded_irq usage 2024-04-21 01:09:32 +08:00
Yo-Jung Lin
0c3aaac3c1 Pass proper cookies to the request_threaded_irq
The last parameter of request_threaded_irq must be a globally unique
cookie[1]. Usually this would be the device struct received by probe().
Since we are not using driver model, pass the gpio structs instead.

[1] https://docs.kernel.org/core-api/genericirq.html
2024-04-21 01:09:32 +08:00
Yo-Jung Lin
65397e2d53 Correct the IRQ numbers passed to the request_threaded_irq 2024-04-21 01:09:32 +08:00
Yo-Jung Lin
8cd1c6a322 Refine wordings 2024-04-21 01:09:32 +08:00
Jim Huang
56f566abe6 Provide a tasklet-free example
Co-authored-by: Bob Mottram <bob@freedombone.net>
2024-04-21 01:09:28 +08:00
0xff07
3e472c84fd
Describe atomic context in spinlock section (#254)
Aquiring a spinlock makes the holder enter atomic context. Extra
attention is needed in atomic context. In particular, functions
that may sleep must not be used. Add this detail to the spinlock
section.
2024-04-16 21:25:46 +08:00
Jim Huang
e1b44579b0 Ensure Linux v6.5 compatibility 2024-04-16 06:24:06 +08:00
Jim Huang
1c31bac22c Fix Linux v6.5 compatibility 2024-04-16 06:19:52 +08:00
Jim Huang
f5893d8140 Remove the crypto section due to poor maintenance
The past content in the crypto section lacks informative descriptions,
and there should be a proper procedure to demonstrate how Linux
cryptography works. Due to poor maintenance, let's drop the section.
2024-04-16 05:39:11 +08:00