Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp18473206ybl; Fri, 3 Jan 2020 03:06:17 -0800 (PST) X-Google-Smtp-Source: APXvYqwQgLvunIKpdumU2PlTkJ6IVAyxt4rGsd2UdaUmuHwRkPyU1y31qD8f4HWyw/w0zQQljHyl X-Received: by 2002:a9d:12a8:: with SMTP id g37mr53405767otg.261.1578049577160; Fri, 03 Jan 2020 03:06:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578049577; cv=none; d=google.com; s=arc-20160816; b=TG9KV7bvyJ0BhrFZqpwO41/LSrbg+UQA6VzdGxojpOsDIuGoET1H4oGR+JcC9BCAIH +zXuU5V864XAzTLZfOHC87rwSjrsIlS250swnCDOP4oe0e/qo9YPV3pgGxrRNqU9SQvH kDyZY3bcoYHCNrU3I2zKCOrEr4Scy+7sixwX6C0PMKqonSRcoVPX2NfhpQthHOkrRryH h9ydNnjE03F0HA7HCuAxqeS2TQMjSyZNMf/U3wgcBw1nMcCQHPyTmk5G3O27HEQgkBl6 nGCc99LDXiGIAo1+EtxsaDYiJncobmZ9O42daEXf2x9R/xpNfY85P2ECky096icU9Zy8 OK1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=jlPFAwVeDBgrj+uxRvfD9rpQTKMWtlgkRqH4LBTyNsE=; b=Zijk4vkgBIU2Tlfa7ZdX5gGZ2XUd0WTBm+8kCxfKfAHrmGgFHi/U8Cfr3MtmrknNLL ib6DdBvlSX9DtqYsP0PFcWO1HNgf6i47qYpUszwTAx41mmbamsJnMidefdxf6x0jsR/h kYGYkOoriGSiPsbz979vkvHHCS8twWYxB8t670b+arkDKfBUk1D/jxKRNB1lz9A9vYCs m5N1oPMCs5IrZ6NwJ0f8Abi2a8JDg5IlykuE7kj7X4phuqqKy80eSVI8D9l8ILSCNJmO RvTDfdFeQLRtPkXIWCdAD6ay/8N+aYGfe/FMXSz+/j1QBOmz/Ru2GR6m7hWHb9PjkJGr nHvg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z1si31126938otp.70.2020.01.03.03.06.03; Fri, 03 Jan 2020 03:06:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727543AbgACLEz (ORCPT + 99 others); Fri, 3 Jan 2020 06:04:55 -0500 Received: from mga02.intel.com ([134.134.136.20]:42417 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727220AbgACLEz (ORCPT ); Fri, 3 Jan 2020 06:04:55 -0500 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 Jan 2020 03:04:54 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.69,390,1571727600"; d="scan'208";a="224936720" Received: from lahna.fi.intel.com (HELO lahna) ([10.237.72.163]) by fmsmga001.fm.intel.com with SMTP; 03 Jan 2020 03:04:52 -0800 Received: by lahna (sSMTP sendmail emulation); Fri, 03 Jan 2020 13:04:51 +0200 Date: Fri, 3 Jan 2020 13:04:51 +0200 From: Mika Westerberg To: Paul Menzel Cc: Greg KH , Mathias Nyman , linux-usb@vger.kernel.org, LKML Subject: Re: BUG: KASAN: use-after-free in xhci_trb_virt_to_dma.part.24+0x1c/0x80 Message-ID: <20200103110451.GJ465886@lahna.fi.intel.com> References: <95b4bdb2-962f-561e-ac14-79cd44395915@molgen.mpg.de> <20180720095410.GA11904@kroah.com> <107dbdd1-4e45-836f-7f8f-85bc63374e4f@molgen.mpg.de> <30b069b5-63f6-dd9e-b323-668f06bff6cf@molgen.mpg.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <30b069b5-63f6-dd9e-b323-668f06bff6cf@molgen.mpg.de> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 02, 2020 at 03:10:14PM +0100, Paul Menzel wrote: > Mika, as you fixed the other leak, any idea, how to continue from the > kmemleak log below? > > ``` > unreferenced object 0xffff8c207a1e1408 (size 8): > comm "systemd-udevd", pid 183, jiffies 4294667978 (age 752.292s) > hex dump (first 8 bytes): > 34 01 05 00 00 00 00 00 4....... > backtrace: > [<00000000aea7b46d>] xhci_mem_init+0xcfa/0xec0 [xhci_hcd] There are probably better ways for doing this but you can use objdump for example: $ objdump -l --prefix-addresses -j .text --disassemble=xhci_mem_init drivers/usb/host/xhci-hcd.ko then find the offset xhci_mem_init+0xcfa. It should show you the line numbers as well if you have compiled your kernel with debug info. This should be close to the line that allocated the memory that was leaked.