Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1400785pxb; Thu, 21 Oct 2021 23:33:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy5yMS5gI6bDiaVMIfrEy/eTDKstr/dq9KsGZq2QbQYAm95ve5sB5sofGZoG/gepCE75aCE X-Received: by 2002:a05:6402:4315:: with SMTP id m21mr14387502edc.277.1634884389910; Thu, 21 Oct 2021 23:33:09 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1634884389; cv=pass; d=google.com; s=arc-20160816; b=tQX3qwV20VCAIOxKVsNNoIouac5JOR08UoChfoeR8e41jlnkvL8wNrdhU129bFk96H ZG3SrjiRUkIMceP2OkUfCrqsSRMBkZGu+EUEPgkIb4Rb1QJUrEjwn5xS9SQOC/9mFqSm PMSa47tjb2NIRcg5thR08Glyys4AT8oCMBDhvcajR8/jqh3cL87rZrPvw+TpCItxwWas 8S0cl+WT4FCwn+mnA2q0syyePH4/VH5WKFKGd4Qqy8aiRBjTc485kLvn0L44gXBg3SZJ ugR9j1nl+qb+hcQLfJrGUYbMnW5nQiphUUV18dsVN7pY/VzB97w09LEyzRTGUleuzfZm Ifug== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :message-id:date:subject:cc:to:from:dkim-signature; bh=k0GKXqL2OIQtWMD1zz8tLlbXN446+8CORWtQhLP5Ibc=; b=zaB44Xt/8uSbCK7EYFd6KBJHK7xTbDQhld38yW5+cyLZm8dACYkAz3aqsNX8lFEC8A qqhmePLTn/9kpftC1MgV5Rlf/VN+wihoG0auA/PFkNlFE/WA1p6KjzRETtrMPr5742dX MNKQ5OFPZVWb3FXPfoaiNH4m/XkJZfEEc5i1FyqSXlnaqU+lEQ1Fhdbuni7tsAI9ty05 PvXj1nC7wmivMjtqM69RxZuVdz/PHucafkg56gQymikq9MciON9hUz/ymCZayOJar9YL MyHpp0pPOkO0SSlEY1FZvKegy+C0BMmR15e78IJUduyaAEL7VVtJJrCMUujVEUzxEUJy hv9Q== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@vivo0.onmicrosoft.com header.s=selector2-vivo0-onmicrosoft-com header.b="FTq/wJUK"; arc=pass (i=1 spf=pass spfdomain=vivo.com dkim=pass dkdomain=vivo.com dmarc=pass fromdomain=vivo.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=vivo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h5si18460846ede.360.2021.10.21.23.32.45; Thu, 21 Oct 2021 23:33:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@vivo0.onmicrosoft.com header.s=selector2-vivo0-onmicrosoft-com header.b="FTq/wJUK"; arc=pass (i=1 spf=pass spfdomain=vivo.com dkim=pass dkdomain=vivo.com dmarc=pass fromdomain=vivo.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=vivo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230238AbhJVGdU (ORCPT + 99 others); Fri, 22 Oct 2021 02:33:20 -0400 Received: from mail-eopbgr1310124.outbound.protection.outlook.com ([40.107.131.124]:40582 "EHLO APC01-SG2-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S229609AbhJVGdT (ORCPT ); Fri, 22 Oct 2021 02:33:19 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bdD2s9vLQjk9XDdkORg1vz8+q8a+cPhsV+fv5OqbxLUPL6klAIS+HuZRz0b4t5IOmbcGxonw5KlxRzccmqHBay99GPKH/ofx3s48esYBI9gKBJAdtZPsf3IAhNA/rCozwQb0BU7agV+GnICr/aHSzROQfcjR4ndIvFtYdb7gf9RqyOXt/hOzxTgLbTzCCDj/ql+Cbu8IBlvSEph6NoOI33NpleD32jtIPNj0uKYz+7El90cRMYBLJPLJDB45Ga5kPXRhVim3ICpFAVkXGwSmZOgT4xB2NixYhRiPDOQ7/97jaf7H72u6A8GhI0sHF3U7QKHK8w9W0SsBxfvsJX5zCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=k0GKXqL2OIQtWMD1zz8tLlbXN446+8CORWtQhLP5Ibc=; b=NeuUALJnTqbzxseSfecI4b7Qw4j5T8AAhRd0gNsru4wLkRXlkBjPWCSH7ykbfYnUwCt06pHnSybYYjFobxd1k4jaGfFBl0CG5BF3LB+nGB85p07KBBjZN/ggGoltWJ/MqwBDd+r2C2p22QLNnmtyZGpsolyz/4rVJ5t33dB91qTuUBosos3lNn1EOBO1Sg+bWeXu1E9NDIlq/ocmp6JUGdt/ii/isYdXboJGaOBi0GiiFy70VXnCa0anEmbU2q4WYnnb6uU3OUHPR88UCCxBEKWDC2ozCOugFqHBCcAGrzERhK1jsjSJ+0kkruZxYUSM1zjbMw/LRmDRzsTEOgMRPw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=vivo.com; dmarc=pass action=none header.from=vivo.com; dkim=pass header.d=vivo.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vivo0.onmicrosoft.com; s=selector2-vivo0-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=k0GKXqL2OIQtWMD1zz8tLlbXN446+8CORWtQhLP5Ibc=; b=FTq/wJUKvxyeBjTSKYHVI7GetpDJ1109VpxppDna2X6PAHeBfwTsKtxWXrneUHzuD0dsrseL7TVL8V2PnB3eaTMRE74HkjE0BMxHd7R6uXMZlmj5NzqLLnMLbw9yQCwymo7OTPYhnSZY7r9002/9dgeNvvhBEyvk3Zf/62RUs0g= Authentication-Results: linux.intel.com; dkim=none (message not signed) header.d=none;linux.intel.com; dmarc=none action=none header.from=vivo.com; Received: from PSAPR06MB4021.apcprd06.prod.outlook.com (2603:1096:301:37::11) by PS2PR06MB2502.apcprd06.prod.outlook.com (2603:1096:300:4a::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4628.15; Fri, 22 Oct 2021 06:30:46 +0000 Received: from PSAPR06MB4021.apcprd06.prod.outlook.com ([fe80::395a:f2d7:d67f:b385]) by PSAPR06MB4021.apcprd06.prod.outlook.com ([fe80::395a:f2d7:d67f:b385%4]) with mapi id 15.20.4628.018; Fri, 22 Oct 2021 06:30:46 +0000 From: Bernard Zhao To: Maarten Lankhorst , Maxime Ripard , Thomas Zimmermann , David Airlie , Daniel Vetter , dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org Cc: Bernard Zhao Subject: [PATCH] gpu/drm: fix potential memory leak Date: Thu, 21 Oct 2021 23:30:35 -0700 Message-Id: <20211022063036.21763-1-bernard@vivo.com> X-Mailer: git-send-email 2.33.1 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: HKAPR03CA0033.apcprd03.prod.outlook.com (2603:1096:203:c9::20) To PSAPR06MB4021.apcprd06.prod.outlook.com (2603:1096:301:37::11) MIME-Version: 1.0 Received: from ubuntu.localdomain (218.213.202.190) by HKAPR03CA0033.apcprd03.prod.outlook.com (2603:1096:203:c9::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4649.8 via Frontend Transport; Fri, 22 Oct 2021 06:30:45 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 944ffbc5-7172-4010-9543-08d995257b34 X-MS-TrafficTypeDiagnostic: PS2PR06MB2502: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:60; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: ZKnH3r3x7z3LugIrYZVCh1G0pl0tLLmS7Je8FESsC8J6PTuDxx+CAmqoQ88DrprJd9j7WjEn3wIt2TmKimAuGQJAia91Jasdl9zrcK9md16cslk4A129udLL+hyRDzTN5k+Rr+qzUVNWIgl4puZGFZszWE6e6ucw/OLbdJYY6t7V9u5VPLjxG1rHRpTJy7hChPtzbU6XEYrgMJOCaw0wHeelOLataACnCvg2LB1szY35npyBhRzsHSAwjUaFy8WyGtkfxKC8lpBt5p1QdktmlS8LEwDyxeb7mKl6n8OaJjjWOZQfWmoqSk6WpRSW1ujycMHktjllwecWNqGBswQ9P93YGR0ov6FCgA1uAnBYkpSgaBxZC37YVw94KkhtuaRMDZiLBMm+CUzDydCqGw1hCeXDFuYpQuNFgLtDaxpf8CYTxq1dwRxmOXBGKIvXmJwQNHREpvcDkr71Q2W7AZAXiOQAtJaNxJMgKC55ebkaM1J1lQh1o7oGeSNzjjCaXTlZtRth1nwMPAUXcUrgO3jNSLbUGVvjmqhPSMCrnIYskFWzTL8eomV95dHDc7a5yZ60e/hCaJOdw6828ujTcgMkkwZBKTcSCQYDhN62nnd/NXaP/6PdTOdj0NYcOSPzdLWTWhQ2KTH2/EiNXEKgOBOaYuIztDux4eAbAJAk/nmmXuUPyxzNDZZhVtyWR8KNeSB6pLukhVNXtExBM1B0vDwHJc3RHqwCBMyxSm4tdPw6gHglvilAvVhWX2XJZN8+Dm749t/viaJ4Hi9LS3GV5tvioS911Gc4Zf0KlYpga3VJrHJEK4lMHCM9ha3i3HdrA4qQ0/FCUpELoWZrxH/IaPc4eA== X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PSAPR06MB4021.apcprd06.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(366004)(6506007)(6512007)(66946007)(86362001)(186003)(8676002)(36756003)(2906002)(8936002)(4326008)(316002)(110136005)(1076003)(26005)(6666004)(107886003)(6486002)(966005)(5660300002)(52116002)(38350700002)(956004)(2616005)(66556008)(38100700002)(508600001)(66476007)(83380400001)(99710200001)(505234007);DIR:OUT;SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?fKMippH9CT9HFNoMsCwqNkEPVrbfOn+D3vZlC/b3kovCCm5o6C0jfn8GOTnQ?= =?us-ascii?Q?0LldrHKXKVuNXmy+ewuMqDPYjm5VDCtMWSxsKBJDNlgNGI1ThKLss7zUHI4z?= =?us-ascii?Q?bJidLWpgbXiX1/CYQ444cGnuuR4hmA3ukNm4sBIXnZ6yj3d+ib3oo3oPkZ3A?= =?us-ascii?Q?5mnmNlEXSU+MDbc0uMCodiXNSnrVHOJvwWf4IZBBQPOq+MusyI9C6pxm0g75?= =?us-ascii?Q?QTsoPGW8Pru+j+AK1RqhkUIZEBmAC1988/utLW2JyCx4REDkNseiwYLRgavC?= =?us-ascii?Q?yPgkgoFT5U79Igr7x60KijE4CbEL0w720DqF8/bNMLVJiV5U2SWR2s6fV8Gm?= =?us-ascii?Q?Ll1h6d95+ub9TYV+aLArbBtR8ZeFck6bMkAmDnmLHenlusfwhVsv2pIJinRJ?= =?us-ascii?Q?P7Lt34rjg55/IFhoOXVY0AJc9thl7C4swCjAiNcQ2nE3rU7Zr0ArPufefVVB?= =?us-ascii?Q?/UuZ2BLSpVaSOH7am6ZBcbdCVtS2fwy2GDiYw8a1plVICWM4950uetCzcPtq?= =?us-ascii?Q?0oJ/J0EmeS942gyO/2S9F3BX6xXA8MQzb/zk5Obz7WBpHjEjv2PWYzvBnXKj?= =?us-ascii?Q?EU0pdht9aPCMZsXPIk352oxJOl2N2Fds094428RXUfkszKyKP43+G65cDqs2?= =?us-ascii?Q?sCZn4MAMpdrFVILx4l95Nz83iRi0rq66nU1fDE1evPjcMJ1ovxoH6Hw3hEZi?= =?us-ascii?Q?2TCECOlA8FFv18CSLUIWprzESCmmYzIs/HIWTGXuc0o2O3wUhrqmJJqXOqfP?= =?us-ascii?Q?woum6/tf05k/oY+xQCmlDHQdgfyV5ns7wbam4Ufr+cRNgG3p1yg//TLwHONe?= =?us-ascii?Q?d42rI9aJgPEO0V/WGSYPVISNV5M3DvFVSumtgY0oDgH6/EyE5HOn++7+N3jm?= =?us-ascii?Q?3bcEeM1NwweaKNs7VW5G7JEFGpb8hG9qeZGn4Yp/XsHocpe4cJhyyNAChP0b?= =?us-ascii?Q?dvVXBQ5F8sRKOQDDdZmOR8M42GAdlPFiUwMUQWyTL5/a3LyvZ+dVymTsqP+Q?= =?us-ascii?Q?zP0gspbMuO0ow4/+S5j7jdTMP09fYpIujFImU1S8PLJpO7aIvPLhYvvavtHF?= =?us-ascii?Q?BrRrCB8CctMtFlpkWGz0nuoH70OMI0DFeVVaJ3lRjhyoAH3hmq4KXzOfca4i?= =?us-ascii?Q?zwBHvV/GI049LM6Ktdp4KStFSR3jqBMfFBwxjoMTD61S/mBZY00H7JNksUpp?= =?us-ascii?Q?4EyNSQ+E2Zehb3BhuLGnieqxqUpgrjCyvMu5DojKjtTzucmYz4RhVILKh2uE?= =?us-ascii?Q?yLOzedAu81CTKEirHZMdjL7DZCWP4fA2QWgrYDGShUJTWmTKNBnGGAlF6mK1?= =?us-ascii?Q?ogz2+G7B4mkVRyNPCtQO6WBd+O2BQBufwZp+JcxqAsi5ZD7Pu3gKayiErEeR?= =?us-ascii?Q?9eZDrxi9VcnueFXN4H63qGb++/Q32W53DmczFRtTTTU4Zo5pglUZzXJIIvn1?= =?us-ascii?Q?sY8egyPLD9M=3D?= X-OriginatorOrg: vivo.com X-MS-Exchange-CrossTenant-Network-Message-Id: 944ffbc5-7172-4010-9543-08d995257b34 X-MS-Exchange-CrossTenant-AuthSource: PSAPR06MB4021.apcprd06.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Oct 2021 06:30:46.5576 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 923e42dc-48d5-4cbe-b582-1a797a6412ed X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 11115066@vivo.com X-MS-Exchange-Transport-CrossTenantHeadersStamped: PS2PR06MB2502 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch try to fix memory leak reported by syzbot: BUG: memory leak unreferenced object 0xffff888127338180 (size 64): comm "syz-executor.6", pid 11434, jiffies 4294961165 (age 15.480s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 4a 0d 28 81 88 ff ff .........J.(.... backtrace: [] kmalloc include/linux/slab.h:591 [inline] [] drm_vma_node_allow+0x32/0x120 drivers/gpu/drm/drm_vma_manager.c:274 [] drm_gem_handle_create_tail+0x107/0x250 drivers/gpu/drm/drm_gem.c:390 [] vgem_gem_create drivers/gpu/drm/vgem/vgem_drv.c:203 [inline] [] vgem_gem_dumb_create+0x8d/0x240 drivers/gpu/drm/vgem/vgem_drv.c:223 [] drm_mode_create_dumb+0x121/0x150 drivers/gpu/drm/drm_dumb_buffers.c:96 [] drm_ioctl_kernel+0xf0/0x160 drivers/gpu/drm/drm_ioctl.c:795 [] drm_ioctl+0x2ea/0x4f0 drivers/gpu/drm/drm_ioctl.c:898 [] vfs_ioctl fs/ioctl.c:51 [inline] [] __do_sys_ioctl fs/ioctl.c:1069 [inline] [] __se_sys_ioctl fs/ioctl.c:1055 [inline] [] __x64_sys_ioctl+0xfc/0x140 fs/ioctl.c:1055 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae The link is: https://syzkaller.appspot.com/bug?id=bd059c6ee8aee1d3af51cff3a2849b8c0027b822 Signed-off-by: Bernard Zhao --- drivers/gpu/drm/drm_vma_manager.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/gpu/drm/drm_vma_manager.c b/drivers/gpu/drm/drm_vma_manager.c index 7de37f8c68fd..870d5bc7f1fa 100644 --- a/drivers/gpu/drm/drm_vma_manager.c +++ b/drivers/gpu/drm/drm_vma_manager.c @@ -300,11 +300,11 @@ int drm_vma_node_allow(struct drm_vma_offset_node *node, struct drm_file *tag) new->vm_count = 1; rb_link_node(&new->vm_rb, parent, iter); rb_insert_color(&new->vm_rb, &node->vm_files); - new = NULL; unlock: write_unlock(&node->vm_lock); kfree(new); + new = NULL; return ret; } EXPORT_SYMBOL(drm_vma_node_allow); -- 2.33.1