Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp2781503pxb; Mon, 18 Oct 2021 01:29:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwSaDhcZSeDIXylvHDlelTeNoGLZCv64mo3hzw0gTOiq6lUz+diVJG8O719cXgx7W6e5yxG X-Received: by 2002:a05:6402:4244:: with SMTP id g4mr41067611edb.158.1634545798640; Mon, 18 Oct 2021 01:29:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634545798; cv=none; d=google.com; s=arc-20160816; b=mfy5xeqQy3/u/JF5SdTlBZ5Amoo5e3LRYqyerBhsoKO+lHrJUI+x0gnOxCiBL3IS6Z aqcg+9gTKsgWFVTXPW4XAhu8q/UdepxY8uwnaael9oqf8frRYvtproHZk8/a+UAyMaX7 zxWvY69WFO4xGANLUkSgb3+LNUDVnWlQ1CXCxBl92rNVxUY9sbemDnretpY0aGyvZkyf GcFuEOdohUEN2CxMUUJt9BLD/5NsNdB7OKtHxnaPmw/GI1mQnItif9MvqoLCxo+5iErl yk1h+5NZ9B/FOsBYacrxjKXbiZzJCzMUgj0FG+FemFxkUbCbvIcDb00di0QzZJFGsfpG Zgpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Kvr8Qis1fYbhO2RDJeuIWQqyrkPlhvN5NsPsZN2DlTc=; b=iW/K8ESxaXj8vJ5NccqeWN512cEPKVbbXVjzxULauQubY0sv9K3LzrMMRFvnRXGFPk n5b/wBfHk6FPyG36YmEtGPVgbab/5Cf7/PSKBCsZ6DFk1XuujWHCqXLglmXJKohu+a+4 MyCuBk7qFw2Tpvq9UjQy9V4pteH0/EPOdjlZRuZaPlxI8swMRSOwav5VKd8mrXa0ntsc aeDO25gouZhlRbhfZJQcpiq6ibj1LbeqUlUXzvBJSArE85oig5MpuDxonUllE0PAHwG3 fpZwydTv9fPvUxcUr6bXSWWEJuMuxa+xA8WC855ceoTuf0PhHQeO+kTgP5m3Cpog16SN EPKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="K/f4aW3u"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bv14si20450062ejb.213.2021.10.18.01.29.35; Mon, 18 Oct 2021 01:29:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="K/f4aW3u"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231190AbhJRH7q (ORCPT + 99 others); Mon, 18 Oct 2021 03:59:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:35502 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231183AbhJRH7k (ORCPT ); Mon, 18 Oct 2021 03:59:40 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id AECFF60E76; Mon, 18 Oct 2021 07:57:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1634543847; bh=wizAlz3nkzwk1hhzFyfhTjq3YJTZcPcoMIebpmvCLu8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=K/f4aW3unDdT8GlzNEw/RQ+Ddk6bp9mLbJIW23NRg8eHvca2eH6SmmBzgihck6KMy fsGaUtFbzZoJTQGT7nPQOcrj4nF7XVBK757ChWAKx9MDySmB2aQT3zntHttBQ+YR+U WWBpF0y6ZBb4AbLi8pc1+SbfG8fzCYmTnmK82i6nL45Dwa171uOyz3IUI4JN//0NNe mHMZ7Z5bM4BB+lKsiEglv6NhMTEdqAqZbpccxpw+YfOERWCmQEbEC9MQ5TrMmyo+Qq DO//whpovw0TIGaF7L7fKKMQwNXv+dy47NMMnZ0+WsH3Q094YArH31OrP5/dDQTNeu 0nCOsGlxck2Fw== Received: from johan by xi.lan with local (Exim 4.94.2) (envelope-from ) id 1mcNWI-0002e0-50; Mon, 18 Oct 2021 09:57:18 +0200 Date: Mon, 18 Oct 2021 09:57:18 +0200 From: Johan Hovold To: Wang Hai Cc: gregkh@linuxfoundation.org, linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] USB: serial: Fix possible memleak in keyspan_port_probe() Message-ID: References: <20211015085543.1203011-1-wanghai38@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20211015085543.1203011-1-wanghai38@huawei.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 15, 2021 at 04:55:43PM +0800, Wang Hai wrote: > I got memory leak as follows when doing fault injection test: > > unreferenced object 0xffff888258228440 (size 64): > comm "kworker/7:2", pid 2005, jiffies 4294989509 (age 824.540s) > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > backtrace: > [] slab_post_alloc_hook+0x9c/0x490 > [] kmem_cache_alloc_trace+0x1f7/0x470 > [] keyspan_port_probe+0xa4/0x5d0 [keyspan] > [] usb_serial_device_probe+0x97/0x1d0 [usbserial] > [] really_probe+0x167/0x460 > [] __driver_probe_device+0xf9/0x180 > [] driver_probe_device+0x53/0x130 > [] __device_attach_driver+0x105/0x130 > [] bus_for_each_drv+0x129/0x190 > [] __device_attach+0x1c9/0x270 > [] device_initial_probe+0x20/0x30 > [] bus_probe_device+0x142/0x160 > [] device_add+0x829/0x1300 > [] usb_serial_probe.cold+0xc9b/0x14ac [usbserial] > [] usb_probe_interface+0x1aa/0x3c0 [usbcore] > [] really_probe+0x167/0x460 > > If it fails to allocate memory for an out_buffer[i] or in_buffer[i], > the previously allocated memory for out_buffer or in_buffer needs to > be freed on the error handling path, otherwise a memory leak will result. > > Fixes: bad41a5bf177 ("USB: keyspan: fix port DMA-buffer allocations") > Reported-by: Hulk Robot > Signed-off-by: Wang Hai > --- > v1->v2: rename error labels Thanks for the update. Now applied with a slightly amended commit message: USB: serial: keyspan: fix memleak on probe errors ... If keyspan_port_probe() fails... Johan