Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp1047782pxp; Thu, 17 Mar 2022 01:24:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwxWAovXBn0ihKLVi/b7tOpMhe4Cc/4u5a8r7f94T0Gq6yn3ZIMpiOnJ1vRyghcvtuY4pSe X-Received: by 2002:a50:da89:0:b0:413:adb1:cf83 with SMTP id q9-20020a50da89000000b00413adb1cf83mr3117483edj.158.1647505464231; Thu, 17 Mar 2022 01:24:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647505464; cv=none; d=google.com; s=arc-20160816; b=E3o6pA5BC9SfWH8otExa/Vh56amge8DGqvq+dWaCc5n2oLAwTb6kJAu8g+ySshUTut e3bbxy54Qpb9RUNkUmr4z7ZOVR2H9uiJYeolpIQx8wfw4IKNgT7k6Muy9gvTqYF+5LC5 ExG1ku7NSgvA1nwq3zzeRk1qR5+Ic8p3wrALSJeWblsftVeGiPsyxcGva80yjijrKCCd d7y7Yld6Qi5tpEDkt74lJyP/EEFzVN5lhaM7r/rqYP8URrGwrrpTNE3WRcD5k6h6SPHB 8UjQP1D9SuqpZN8naM8mxVqUAA7A1aBB95UK9nl0bDfwG7hs/EkxJkZRlB66XLAyLJHS dArg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=uGlChpdhx50gSryWUUBmcGS155ezoWqsHLneagTlm2g=; b=dJc56Hb4TqdaBnC8wN21SgdG0xiBNInS8S/FrsHVZ4ukY5Qb4O0Gx3vXRv7zn8dhO4 rwNnlaWNmjmeASzKIHDMQUO9JV+yrLwmEFUkyRfXk158D8Na4ItCpM9vD+SDKmMXt8I+ 6v4fwKt1qa9BP6G84RvklGnBkFhVN1FSFrcrUDUTCX0EoUVflYsaKOdruRjkz8foAftf USyic+KO2vV4cBnePvQfx9nwJY3GVQWBhxABFxvGGLoH6xU2IHj1ZT64OZ3Ymkx48pCJ x2vYHgvyYeMZpeJ85ZGS20NIIdDlp9Ty+036/EMgAHun100IQOfpm5BYDCeIF7yzDYFP Oz9Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=n04DmdsE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z21-20020a50f155000000b00418c2b5bdd6si922194edl.184.2022.03.17.01.23.59; Thu, 17 Mar 2022 01:24:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=n04DmdsE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230191AbiCQHdT (ORCPT + 99 others); Thu, 17 Mar 2022 03:33:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38238 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229447AbiCQHdQ (ORCPT ); Thu, 17 Mar 2022 03:33:16 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D00071C16F0; Thu, 17 Mar 2022 00:32:00 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 6486A60B91; Thu, 17 Mar 2022 07:32:00 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 677B6C340EC; Thu, 17 Mar 2022 07:31:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1647502319; bh=KtTP/N7askke7st8XcU0jM7vVHx3t+bRGSD56B7pp8M=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=n04DmdsEBh1KYufQk+GgyjL27uzPL9C9Nn5PHqYjez/6ROjDtQ75WY4U+L7DFRVAq sFUwuHG0gt70auwmEvkXPQ4MwDhYxrdR7mJ4tCJkWlX6ImEhcHDkr+eXmbDvpA4xQz KT701uvkBR2tgKgpApS5HUNlLTqDt6a8sChCKDZJl/GIa9SWezvEp6gR20hl47M+vA 6xxOzkcDLuK7Iq1P85MPBPG+6nYSOU9IqiXc2IZZVgpMe7BmaaYqNylIcFxHPCT6sp C3p4TwR+SQTk5rX6mR2BkLaxqH81hzuszrBVQFThFe8OWa6J8oMS4qeXkmMXKUZjwq SMyATWiHHjqug== Date: Thu, 17 Mar 2022 09:31:10 +0200 From: Jarkko Sakkinen To: Jason Gunthorpe Cc: GUO Zihua , linux-integrity@vger.kernel.org, wangweiyang2@huawei.com, xiujianfeng@huawei.com, weiyongjun1@huawei.com, peterhuewe@gmx.de, linux-kernel@vger.kernel.org Subject: Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc Message-ID: References: <20220307104827.40843-1-guozihua@huawei.com> <20220314163705.GA64706@ziepe.ca> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220314163705.GA64706@ziepe.ca> X-Spam-Status: No, score=-8.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 14, 2022 at 01:37:05PM -0300, Jason Gunthorpe wrote: > On Mon, Mar 07, 2022 at 06:48:27PM +0800, GUO Zihua wrote: > > Fix a memory leak in tpmm_chip_alloc. devm_add_action_or_reset would > > call put_device on error, while tpm->devs is left untouched. Call > > put_device on tpm->devs as well if devm_add_action_or_reset returns an > > error. > > > > Fixes: fdc915f7f719 ("tpm: expose spaces via a device link /dev/tpmrm") > > Signed-off-by: GUO Zihua > > drivers/char/tpm/tpm-chip.c | 13 +++++++++---- > > 1 file changed, 9 insertions(+), 4 deletions(-) > > > > diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c > > index b009e7479b70..0a92334e8c40 100644 > > +++ b/drivers/char/tpm/tpm-chip.c > > @@ -308,6 +308,12 @@ static int tpm_class_shutdown(struct device *dev) > > return 0; > > } > > > > +static void tpm_chip_free(struct tpm_chip *chip) > > +{ > > + put_device(&chip->devs); > > + put_device(&chip->dev); > > +} > > + > > /** > > * tpm_chip_alloc() - allocate a new struct tpm_chip instance > > * @pdev: device to which the chip is associated > > @@ -396,8 +402,7 @@ struct tpm_chip *tpm_chip_alloc(struct device *pdev, > > return chip; > > > > out: > > - put_device(&chip->devs); > > - put_device(&chip->dev); > > + tpm_chip_free(chip); > > return ERR_PTR(rc); > > } > > EXPORT_SYMBOL_GPL(tpm_chip_alloc); > > @@ -420,8 +425,8 @@ struct tpm_chip *tpmm_chip_alloc(struct device *pdev, > > return chip; > > > > rc = devm_add_action_or_reset(pdev, > > - (void (*)(void *)) put_device, > > - &chip->dev); > > + (void (*)(void *)) tpm_chip_free, > > + chip); > > if (rc) > > This looks like the same issue as was adressed by the recent discussion.. Both fixes (Lino, jejb) are also part of my PR: [*] https://lore.kernel.org/linux-integrity/Yi64TJXqto+VdoOo@iki.fi/ > Jason BR, Jarkko