Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp2623128pxb; Sun, 17 Oct 2021 20:48:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyFNdbBXcIyA6ync8FJn+xL9VtIxwih9fH79xKGcDltjnTRxPaGQuLX53PBYQSM3SU2iAvt X-Received: by 2002:a17:90b:1c90:: with SMTP id oo16mr782133pjb.199.1634528767880; Sun, 17 Oct 2021 20:46:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634528767; cv=none; d=google.com; s=arc-20160816; b=WSB+7pcNPIbH8xlomAi5btVqXdhe36OpkhbUsImuzFIMZFkMWBY8WET0OL+UK8MtWP FFj5cMSmmxEjq/SLRAjXxxZk4436xfPmsyS4xe2QaskuyzT+Aw0kSaNC8aPdL8BfqGyu 4qKz/WPHMaxCDDNKuqya+oXQ1y2Osg2+DzhbyAO2pv0d5uEjIugS6HWaEwVBAh8V3jfO PUUdbmdHZUbE8VZ6X3tQInkeK4X12UUDsFnuIQdOeNcgku7Q4tLa+xOdOLmRMeiGKjYa /o3gPmFOBlJQ4bcnWPjPJ0AopIC6w5kSKkCjhqFk7eZMDGgSU5R1SEWJnPuY5cMQDBBG sImQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=FViBYsnKQxjaSMdVFpSKchFFRaPdJfJW+wNWRZlYhoo=; b=HXqk+AqbcKq89xknOnp2k1zTSQP4LpNDDpP5JihKIRgxDiJqicd4xj0WCV1BXaAZL6 m1MwOtt0dZcMpytMUjiT938W8u9B3/p/6eNA3cI0CZDr82C5fO7PqQcncyyFc/V60tRV 3ozljD932apCY9K+PnaUkEP2zmfZN2ufRnRw0WLn3jX/c6U52Ogc7dqS78+H/yoJj7bO fihZlrrHovM8yucTQMQtJ9n6n7OWi0d0yX9hx3MW3Zw0TzRdWzEOZa7W6PvHKpGnM7MP N2eS/B1q2xw3PTAQD4f+IJ7bICHJSfaARCFSCBiRYp+UchTMzegFPgL44aNjz5uZB/61 6B8Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r10si18411056plo.117.2021.10.17.20.45.55; Sun, 17 Oct 2021 20:46:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241475AbhJQOOX (ORCPT + 98 others); Sun, 17 Oct 2021 10:14:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:41624 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238183AbhJQOOU (ORCPT ); Sun, 17 Oct 2021 10:14:20 -0400 Received: from jic23-huawei (cpc108967-cmbg20-2-0-cust86.5-4.cable.virginm.net [81.101.6.87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5B131604DB; Sun, 17 Oct 2021 14:12:09 +0000 (UTC) Date: Sun, 17 Oct 2021 15:16:23 +0100 From: Jonathan Cameron To: Yang Yingliang Cc: , , , Subject: Re: [PATCH] iio: buffer: Fix memory leak in __iio_buffer_alloc_sysfs_and_mask() Message-ID: <20211017151623.47a66ea9@jic23-huawei> In-Reply-To: <20211013094343.315275-1-yangyingliang@huawei.com> References: <20211013094343.315275-1-yangyingliang@huawei.com> X-Mailer: Claws Mail 4.0.0 (GTK+ 3.24.30; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 13 Oct 2021 17:43:43 +0800 Yang Yingliang wrote: > When iio_buffer_wrap_attr() returns NULL or buffer->buffer_group.name alloc > fails, the 'attr' which is allocated in __iio_buffer_alloc_sysfs_and_mask() > is not freed, and cause memory leak. > > unreferenced object 0xffff888014882a00 (size 64): > comm "i2c-adjd_s311-8", pid 424, jiffies 4294907737 (age 44.396s) > hex dump (first 32 bytes): > 00 0f 8a 15 80 88 ff ff 00 0e 8a 15 80 88 ff ff ................ > 80 04 8a 15 80 88 ff ff 80 05 8a 15 80 88 ff ff ................ > backtrace: > [<0000000021752e67>] __kmalloc+0x1af/0x3c0 > [<0000000043e8305c>] iio_buffers_alloc_sysfs_and_mask+0xe73/0x1570 [industrialio] > [<00000000b7aa5a17>] __iio_device_register+0x483/0x1a30 [industrialio] > [<000000003fa0fb2f>] __devm_iio_device_register+0x23/0x90 [industrialio] > [<000000003ab040cf>] adjd_s311_probe+0x19c/0x200 [adjd_s311] > [<0000000080458969>] i2c_device_probe+0xa31/0xbe0 > [<00000000e20678ad>] really_probe+0x299/0xc30 > [<000000006bea9b27>] __driver_probe_device+0x357/0x500 > [<00000000e1df10d4>] driver_probe_device+0x4e/0x140 > [<0000000003661beb>] __device_attach_driver+0x257/0x340 > [<000000005bb4aa26>] bus_for_each_drv+0x166/0x1e0 > [<00000000272c5236>] __device_attach+0x272/0x420 > [<00000000d52a96ae>] bus_probe_device+0x1eb/0x2a0 > [<00000000129f7737>] device_add+0xbf0/0x1f90 > [<000000005eed4e52>] i2c_new_client_device+0x622/0xb20 > [<00000000b85a9c43>] new_device_store+0x1fa/0x420 > > This patch fix to free it before the error return. > > Reported-by: Hulk Robot > Fixes: 15097c7a1adc ("iio: buffer: wrap all buffer attributes into iio_dev_attr") > Fixes: d9a625744ed0 ("iio: core: merge buffer/ & scan_elements/ attributes") > Signed-off-by: Yang Yingliang Good find. This function is clearly trying to do too many things and hence has become rather error prone. Still fixing that is a job for another day. Alex, if you have a chance to take a look at this as well it would be great. In the meantime I've queued it up in the fixes-togreg branch of iio.git Thanks, Jonathan > --- > drivers/iio/industrialio-buffer.c | 5 ++--- > 1 file changed, 2 insertions(+), 3 deletions(-) > > diff --git a/drivers/iio/industrialio-buffer.c b/drivers/iio/industrialio-buffer.c > index 547a92d469ae..ae0912a14578 100644 > --- a/drivers/iio/industrialio-buffer.c > +++ b/drivers/iio/industrialio-buffer.c > @@ -1536,6 +1536,7 @@ static int __iio_buffer_alloc_sysfs_and_mask(struct iio_buffer *buffer, > sizeof(struct attribute *) * buffer_attrcount); > > buffer_attrcount += ARRAY_SIZE(iio_buffer_attrs); > + buffer->buffer_group.attrs = attr; > > for (i = 0; i < buffer_attrcount; i++) { > struct attribute *wrapped; > @@ -1543,7 +1544,7 @@ static int __iio_buffer_alloc_sysfs_and_mask(struct iio_buffer *buffer, > wrapped = iio_buffer_wrap_attr(buffer, attr[i]); > if (!wrapped) { > ret = -ENOMEM; > - goto error_free_scan_mask; > + goto error_free_buffer_attrs; > } > attr[i] = wrapped; > } > @@ -1558,8 +1559,6 @@ static int __iio_buffer_alloc_sysfs_and_mask(struct iio_buffer *buffer, > goto error_free_buffer_attrs; > } > > - buffer->buffer_group.attrs = attr; > - > ret = iio_device_register_sysfs_group(indio_dev, &buffer->buffer_group); > if (ret) > goto error_free_buffer_attr_group_name;