Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp205538ybi; Fri, 24 May 2019 02:31:40 -0700 (PDT) X-Google-Smtp-Source: APXvYqysStVaBQftCSnhe0zKUgXUhkk6BD4ExcaDcjsYVsUXIGsqlZtkI2mo7sTAW9+YT695mn4x X-Received: by 2002:a65:654f:: with SMTP id a15mr87674129pgw.73.1558690300380; Fri, 24 May 2019 02:31:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558690300; cv=none; d=google.com; s=arc-20160816; b=pK9L/ieruZ4FKcOmO72wdr4rGbHHM0l2p3NAPZ8OQQDp3NGqmNfeliiiSP4P2Oxc3w DcAGoRFe/nFbv0sxnD0MP2yQ0jRd1TVSbybFAWrro/jHpG8Gyop5H8/Zbm7k05J2t3DN D0Fr5foxDNKrLEiXvX/46Tr1aIZE0Y/Q47+lKaECHayhMZksbWyaiNNKtvTK6itAY6+k Nqp2Ek7+KI68DHcaLKzS/ADO9bU0bZfxPK+gYGGVx1F/wpZ0siFJrri/TxxEWSeCQDsj nS7aQZ/Pgr5hNSF86v9qbLiAhbBpfQ48NeZgAjZteIGL1xpZ7lDdH6Y//nxWN7gCiFtj tVtA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:dkim-signature:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=TY/LLkj+ZvzkU4/ChLoW2GQnwHdwxjE7R6eaX3uCVME=; b=esgJ0Ivh8pu1IwtUFhhhxXuFI21J+d3crRuiz7B66yjpe9jfs3CsArhKmiqt/gVWbY xccf0kY9Sf9/vZJwK9EPhMpeGw2hUg8mdAYq/o9VmY7MoCThRKs8NtIkS/p/buIPXJcH EY6+Crje/TGQJkn0XSMbo/gbKIy8JjZGHBX6/0e4F9p9+0K5N7jS1zqp5mlD4jRETM8H yP7o2NViyW4a2IvYYaACQsosjJpmu5WK+jq7ABblRapTzxY/wsv5Y9wK4VB3ShavXc8E p9jzF/CQtXvdQbrbl0FCgQD8QTAfeiqN2sVNaguFSP86IuNITZDSz0rMRzea83WeNgbI JgAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=Yo2QJu3O; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j2si3414726pgh.192.2019.05.24.02.31.21; Fri, 24 May 2019 02:31:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=Yo2QJu3O; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390046AbfEXJ2o (ORCPT + 99 others); Fri, 24 May 2019 05:28:44 -0400 Received: from hqemgate14.nvidia.com ([216.228.121.143]:17848 "EHLO hqemgate14.nvidia.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389724AbfEXJ2o (ORCPT ); Fri, 24 May 2019 05:28:44 -0400 Received: from hqpgpgate101.nvidia.com (Not Verified[216.228.121.13]) by hqemgate14.nvidia.com (using TLS: TLSv1.2, DES-CBC3-SHA) id ; Fri, 24 May 2019 02:28:43 -0700 Received: from hqmail.nvidia.com ([172.20.161.6]) by hqpgpgate101.nvidia.com (PGP Universal service); Fri, 24 May 2019 02:28:43 -0700 X-PGP-Universal: processed; by hqpgpgate101.nvidia.com on Fri, 24 May 2019 02:28:43 -0700 Received: from [10.21.132.148] (10.124.1.5) by HQMAIL107.nvidia.com (172.20.187.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 24 May 2019 09:28:41 +0000 Subject: Re: [PATCH v2] wlcore: sdio: Fix a memory leaking bug in wl1271_probe() To: Gen Zhang , Kalle Valo CC: , , References: <20190523144425.GA26766@zhanggen-UX430UQ> <87d0k9b4hm.fsf@kamboji.qca.qualcomm.com> <20190524024307.GA5639@zhanggen-UX430UQ> From: Jon Hunter Message-ID: <4f5d4070-a48a-bbc5-d3f5-ab6fc461105c@nvidia.com> Date: Fri, 24 May 2019 10:28:39 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <20190524024307.GA5639@zhanggen-UX430UQ> X-Originating-IP: [10.124.1.5] X-ClientProxiedBy: HQMAIL105.nvidia.com (172.20.187.12) To HQMAIL107.nvidia.com (172.20.187.13) Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nvidia.com; s=n1; t=1558690124; bh=TY/LLkj+ZvzkU4/ChLoW2GQnwHdwxjE7R6eaX3uCVME=; h=X-PGP-Universal:Subject:To:CC:References:From:Message-ID:Date: User-Agent:MIME-Version:In-Reply-To:X-Originating-IP: X-ClientProxiedBy:Content-Type:Content-Language: Content-Transfer-Encoding; b=Yo2QJu3OXzmlnBC8bER4vIASoypNoBAb6dcYVyBPXUrrYhoKfjP9svqGa0YZzxaFl cCBMlXivQS/+mjNcTruRg54OH61mhwQWxO8syBFqM+Wm3fiOOddHVvIQQ4MSeqb3kF nZB0IbEYG/Ivyd/66ht0Sm5/Zm+clTf+dU3X0fv8cALjEP4NBunRXNdPAndjwG5p4d 4jHZtMBQf+lKj/tRBh8NUWkDHoRtypY4f9SqoEgW3GnxSb6x0THuw9VRV9CW5t61S+ GrS2/uuMOr+0If4FPZDEc35tq3uvPcZkdw905Uv2wRm5UQhJo3Q4pbD99z90zXhXvM IeZ+vKfUwykpw== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 24/05/2019 03:43, Gen Zhang wrote: > In wl1271_probe(), 'glue->core' is allocated by platform_device_alloc(), > when this allocation fails, ENOMEM is returned. However, 'pdev_data' > and 'glue' are allocated by devm_kzalloc() before 'glue->core'. When > platform_device_alloc() returns NULL, we should also free 'pdev_data' > and 'glue' before wl1271_probe() ends to prevent leaking memory. No, devm_kzalloc() automatically frees memory on failure. > Similarly, we should free 'pdev_data' when 'glue' is NULL. And we > should free 'pdev_data' and 'glue' when 'ret' is error. > > Further, we shoulf free 'glue->dev', 'pdev_data' and 'glue' when this > function normally ends to prevent memory leaking. Why? > Signed-off-by: Gen Zhang > --- > diff --git a/drivers/net/wireless/ti/wlcore/sdio.c b/drivers/net/wireless/ti/wlcore/sdio.c > index 4d4b0770..9110891 100644 > --- a/drivers/net/wireless/ti/wlcore/sdio.c > +++ b/drivers/net/wireless/ti/wlcore/sdio.c > @@ -298,8 +298,10 @@ static int wl1271_probe(struct sdio_func *func, > pdev_data->if_ops = &sdio_ops; > > glue = devm_kzalloc(&func->dev, sizeof(*glue), GFP_KERNEL); > - if (!glue) > - return -ENOMEM; > + if (!glue) { > + ret = -ENOMEM; > + goto out_free1; > + } > > glue->dev = &func->dev; > > @@ -311,7 +313,7 @@ static int wl1271_probe(struct sdio_func *func, > > ret = wlcore_probe_of(&func->dev, &irq, &wakeirq, pdev_data); > if (ret) > - goto out; > + goto out_free2; > > /* if sdio can keep power while host is suspended, enable wow */ > mmcflags = sdio_get_host_pm_caps(func); > @@ -340,7 +342,7 @@ static int wl1271_probe(struct sdio_func *func, > if (!glue->core) { > dev_err(glue->dev, "can't allocate platform_device"); > ret = -ENOMEM; > - goto out; > + goto out_free2; > } > > glue->core->dev.parent = &func->dev; > @@ -380,12 +382,17 @@ static int wl1271_probe(struct sdio_func *func, > dev_err(glue->dev, "can't add platform device\n"); > goto out_dev_put; > } > - return 0; > + ret = 0; This is completely wrong. > out_dev_put: > platform_device_put(glue->core); > > -out: > +out_free2: > + devm_kfree(&func->dev, glue); > + > +out_free1: > + devm_kfree(&func->dev, pdev_data); > + > return ret; > } > > --- Jon -- nvpublic