Received: by 2002:ac0:c50a:0:0:0:0:0 with SMTP id y10csp1008077imi; Fri, 1 Jul 2022 00:34:38 -0700 (PDT) X-Google-Smtp-Source: AGRyM1sBYRepzaFf+nYS/ObN8gyAn8UiCr5t7YNaA6TwPaN67PecdvRl1PQT9Akk1lANTsoAu8Rj X-Received: by 2002:a17:90a:d158:b0:1ec:8298:40dc with SMTP id t24-20020a17090ad15800b001ec829840dcmr15166497pjw.51.1656660877919; Fri, 01 Jul 2022 00:34:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656660877; cv=none; d=google.com; s=arc-20160816; b=PDnX3X/ccRZroI7j+ZsMI1DeGaA9Bt1qg9ZxyE2PeOwIoAnd1GNxCdR0Nzr3SFfjay LvVGQXYxcxj6rs3e92ONq+jCi4Jhutpgfdo4nxs3uucFljbrCgypGlkv8aZQZ3bAmAk4 ggZtwySTdfpfWcPCO8htgD940aA0uEKHvDLqy2KHm641TBDqjHyyN1zIaR6CJ1AgqtgG Ckc7tcTnrEdtUaD7Zzhu/QO0Lj87iLNEp5mVSj3gbL+v5Mlyk9076bfg0F+QH2rfbsbl EICQzqxIr08sY5dwQYBn7oaD4SVTOWP5vFbgB633YVcDw8cCegF4IF5OmDaVAbY/f1W9 BXTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=8ZU5826RJPFO/MoVotbqwlRHtsHziQ0kq1pcds/nQwM=; b=MCkR1SIHNGFYGgOnBeXKQZ85lXdeNxb6vRI5y6EV+JKuWashcUvosBBk+isl4CQRFd 9neWs7sG+UzJjfDL1mtCKgKJaQ1zt6jPr1JrfBneG4oKsDjfFIuuVkj1fznOMwBJdgIH +7UmWgpyvZQwHoaM1fbpuGuNJGP2cV6XtFo2x4zGlj+KNZKCFIhgTEfgF5TdC+DGGK8m jk3jg0thwkgeZJlBA4G+1M/Hiz/KXnz2OPKc1mjMxHIcz7t+J9KyLSYbF4DbPyDvLaWK CvVYuIfbg6vtW5ImdCZhwlFtqhECxsUZQ2xPaXdHZUmoeLng37RvQnMn9Kl/zc09iEV1 MXLg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=rQEytv45; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f12-20020a170902ce8c00b0016a565bcfc9si34440854plg.41.2022.07.01.00.34.23; Fri, 01 Jul 2022 00:34:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=rQEytv45; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235184AbiGAH2N (ORCPT + 99 others); Fri, 1 Jul 2022 03:28:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53738 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231829AbiGAH2L (ORCPT ); Fri, 1 Jul 2022 03:28:11 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 19744F12; Fri, 1 Jul 2022 00:28:10 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id BAAA6B82E39; Fri, 1 Jul 2022 07:28:08 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2CDC6C3411E; Fri, 1 Jul 2022 07:28:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1656660487; bh=6fc1GPEDsMEmIu4v1lQpzTDaplwGABQ7ko3v9tdn9Gc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=rQEytv45vG/ejfXXOvJi0DhyCGLeK7KlGKTMuD10i9SW96bgwEHgs8dWNw8G0zEeM DhRLgsc1QOWlSjno7fxJ6AxClqTXXiTPGpu0cHuswFQXVk39+SKS/YO3UlF7AYooa6 7IMo1nkZPHnN6Rd8d35gsOrME7mB8WwpNQ8lewUk= Date: Fri, 1 Jul 2022 09:28:04 +0200 From: Greg KH To: Jianglei Nie Cc: mathias.nyman@intel.com, linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() Message-ID: References: <20220701071002.2184370-1-niejianglei2021@163.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220701071002.2184370-1-niejianglei2021@163.com> X-Spam-Status: No, score=-7.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 01, 2022 at 03:10:02PM +0800, Jianglei Nie wrote: > xhci_alloc_stream_info() allocates stream context array for stream_info > ->stream_ctx_array with xhci_alloc_stream_ctx(). When some error occurs, > stream_info->stream_ctx_array is not released, which will lead to a > memory leak. > > We can fix it by releasing the stream_info->stream_ctx_array with > xhci_free_stream_ctx() on the error path to avoid the potential memory > leak. > > Signed-off-by: Jianglei Nie > --- > drivers/usb/host/xhci-mem.c | 7 ++++++- > 1 file changed, 6 insertions(+), 1 deletion(-) > > diff --git a/drivers/usb/host/xhci-mem.c b/drivers/usb/host/xhci-mem.c > index 8c19e151a945..9e56aa28efcd 100644 > --- a/drivers/usb/host/xhci-mem.c > +++ b/drivers/usb/host/xhci-mem.c > @@ -641,7 +641,7 @@ struct xhci_stream_info *xhci_alloc_stream_info(struct xhci_hcd *xhci, > num_stream_ctxs, &stream_info->ctx_array_dma, > mem_flags); > if (!stream_info->stream_ctx_array) > - goto cleanup_ctx; > + goto cleanup_ring_array; > memset(stream_info->stream_ctx_array, 0, > sizeof(struct xhci_stream_ctx)*num_stream_ctxs); > > @@ -702,6 +702,11 @@ struct xhci_stream_info *xhci_alloc_stream_info(struct xhci_hcd *xhci, > } > xhci_free_command(xhci, stream_info->free_streams_command); > cleanup_ctx: > + xhci_free_stream_ctx(xhci, > + stream_info->num_stream_ctxs, > + stream_info->stream_ctx_array, > + stream_info->ctx_array_dma); > +cleanup_ring_array: > kfree(stream_info->stream_rings); > cleanup_info: > kfree(stream_info); > -- > 2.25.1 > Hi, This is the friendly patch-bot of Greg Kroah-Hartman. You have sent him a patch that has triggered this response. He used to manually respond to these common problems, but in order to save his sanity (he kept writing the same thing over and over, yet to different people), I was created. Hopefully you will not take offence and will fix the problem in your patch and resubmit it so that it can be accepted into the Linux kernel tree. You are receiving this message because of the following common error(s) as indicated below: - This looks like a new version of a previously submitted patch, but you did not list below the --- line any changes from the previous version. Please read the section entitled "The canonical patch format" in the kernel file, Documentation/SubmittingPatches for what needs to be done here to properly describe this. If you wish to discuss this problem further, or you have questions about how to resolve this issue, please feel free to respond to this email and Greg will reply once he has dug out from the pending patches received from other developers. thanks, greg k-h's patch email bot