Received: by 2002:a05:6358:111d:b0:dc:6189:e246 with SMTP id f29csp2183753rwi; Tue, 1 Nov 2022 05:02:18 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4em+gOnr6KSnb5edcyqJHD94if96gjmaOn3XDIZopFDzNUnHJVWJaMgUqTaohHjh4oL9/L X-Received: by 2002:a05:6402:d62:b0:460:42c8:fc6d with SMTP id ec34-20020a0564020d6200b0046042c8fc6dmr19017336edb.182.1667304137696; Tue, 01 Nov 2022 05:02:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667304137; cv=none; d=google.com; s=arc-20160816; b=sQ7Wwghs0bWUf0zfugvZrToLacgI68jFM5KiWwY1bGwYgJUJ/GAsvoIqQ+28w1noKn IvGWaIW+SqwpPM3jGowaNa6zjxb9bGgQyx89iLAZoZMmiJFfPIdCp3vWNVEffggro4O/ ZC2FBLKwN4PFpXN9kNR/XekIOjsSthuu4fbp38LDC4GWBtZsQXik/b4Dwb+oCId1F6fp H0xNotQN7OVqcOO0tZOVIMwHMQG8vDYUEnkUGLkfdATyqp+41RWOaxkWCunUQTaovuj1 8+2ezuvfCHu7qn8D2/I1fojxzGBalqlDW0QipvqQjsK0aT7o6UVDtQm8Qd1aVWi6D8T9 siKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :organization:from:references:cc:to:content-language:subject :user-agent:mime-version:date:message-id:dkim-signature; bh=Xkn8Xx2D3e4lIvSfJXBEvMTBi0dBRtON/4i/kyKOdcY=; b=l5vcBAseMkyZxHwCsej5YdeVV5CPH8HWKmJidfv7159Twfi9BrnIbUeWNt/4E2txWD e2yjYXMsghmo49egpbcfGnUGJC/RkJ5JHB4JLWNw17gXx0yUSTmub1sWwh9tlUUsrsHc lN8oeUAl6vGqM59K0jau91YAaeeDPSdGOImvHl5IB8VP9CVJXqCWlhJ2ExDMwtiaHN3W FkeQcvT3hAat5eVnX/RGjFK8ZWkyDL77TM5Zg5nljsyg2WUDLYg0FW/fhj4ehQA77w73 V+vi1FEu4S88mfhuyS9R4dZsvc0IXGMczKkQZHyjfXexMAdiwPopGbjTj5mIaTHSFJVn 4SNg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mev.co.uk header.s=20190130-41we5z8j header.b=nJDNwFdy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n14-20020a5099ce000000b00461c252c3f8si10824880edb.382.2022.11.01.05.01.51; Tue, 01 Nov 2022 05:02:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@mev.co.uk header.s=20190130-41we5z8j header.b=nJDNwFdy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231356AbiKALsU (ORCPT + 97 others); Tue, 1 Nov 2022 07:48:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37762 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231383AbiKALsA (ORCPT ); Tue, 1 Nov 2022 07:48:00 -0400 Received: from smtp88.iad3b.emailsrvr.com (smtp88.iad3b.emailsrvr.com [146.20.161.88]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2CCE91BEBD for ; Tue, 1 Nov 2022 04:40:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mev.co.uk; s=20190130-41we5z8j; t=1667302850; bh=EjPjwQYDzOIO7iyPmE8N1XzAvCG6Jb7pfvn0YGW+PQk=; h=Date:Subject:To:From:From; b=nJDNwFdyOaevjn7/q7qoqtUr1jqGCTw35mz+IsM+JonPTi53aHXiU5Vbs9TEn/O3x gntlA976lZshO3tj6Ram6qvBZNC5VoYZyLpaLUomrcGpC+Y+FF3EPvfOWZ338DNPYm tQc0LXuzqNdkjSHW/kMwj+2u698KE+9ZQbDKdD8Y= X-Auth-ID: abbotti@mev.co.uk Received: by smtp4.relay.iad3b.emailsrvr.com (Authenticated sender: abbotti-AT-mev.co.uk) with ESMTPSA id B9C24200EC; Tue, 1 Nov 2022 07:40:49 -0400 (EDT) Message-ID: <5b8ee99d-2358-39c5-b663-2d1c80353639@mev.co.uk> Date: Tue, 1 Nov 2022 11:40:48 +0000 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.3.3 Subject: Re: [PATCH] comedi: Fix potential memory leak in comedi_init() Content-Language: en-GB To: shangxiaojing , Greg KH Cc: hsweeten@visionengravers.com, zhangxuezhi1@coolpad.com, fmhess@users.sourceforge.net, linux-kernel@vger.kernel.org References: <20221101032125.27337-1-shangxiaojing@huawei.com> <32c291d7-0e87-ec1f-e2af-28d7f8ca0981@huawei.com> From: Ian Abbott Organization: MEV Ltd. In-Reply-To: <32c291d7-0e87-ec1f-e2af-28d7f8ca0981@huawei.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Classification-ID: 24ad161b-985f-4046-9c88-0214b2466521-1-1 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/11/2022 06:16, shangxiaojing wrote: > > > On 2022/11/1 12:45, Greg KH wrote: >> On Tue, Nov 01, 2022 at 11:21:25AM +0800, Shang XiaoJing wrote: >>> comedi_init() will goto out_unregister_chrdev_region if cdev_add() >>> failed, which won't free the resource alloced in kobject_set_name(). >>> Call kfree_const() to free the leaked name before goto >>> out_unregister_chrdev_region. >>> >>> unreferenced object 0xffff8881000fa8c0 (size 8): >>>    comm "modprobe", pid 239, jiffies 4294905173 (age 51.308s) >>>    hex dump (first 8 bytes): >>>      63 6f 6d 65 64 69 00 ff                          comedi.. >>>    backtrace: >>>      [<000000005f9878f7>] __kmalloc_node_track_caller+0x4c/0x1c0 >>>      [<000000000fd70302>] kstrdup+0x3f/0x70 >>>      [<000000009428bc33>] kstrdup_const+0x46/0x60 >>>      [<00000000ed50d9de>] kvasprintf_const+0xdb/0xf0 >>>      [<00000000b2766964>] kobject_set_name_vargs+0x3c/0xe0 >>>      [<00000000f2424ef7>] kobject_set_name+0x62/0x90 >>>      [<000000005d5a125b>] 0xffffffffa0013098 >>>      [<00000000f331e663>] do_one_initcall+0x7a/0x380 >>>      [<00000000aa7bac96>] do_init_module+0x5c/0x230 >>>      [<000000005fd72335>] load_module+0x227d/0x2420 >>>      [<00000000ad550cf1>] __do_sys_finit_module+0xd5/0x140 >>>      [<00000000069a60c5>] do_syscall_64+0x3f/0x90 >>>      [<00000000c5e0d521>] entry_SYSCALL_64_after_hwframe+0x63/0xcd >>> >>> Fixes: ed9eccbe8970 ("Staging: add comedi core") >>> Signed-off-by: Shang XiaoJing >>> --- >>>   drivers/comedi/comedi_fops.c | 5 ++++- >>>   1 file changed, 4 insertions(+), 1 deletion(-) >>> >>> diff --git a/drivers/comedi/comedi_fops.c b/drivers/comedi/comedi_fops.c >>> index e2114bcf815a..2c508c2cf6f6 100644 >>> --- a/drivers/comedi/comedi_fops.c >>> +++ b/drivers/comedi/comedi_fops.c >>> @@ -3379,8 +3379,11 @@ static int __init comedi_init(void) >>>       retval = cdev_add(&comedi_cdev, MKDEV(COMEDI_MAJOR, 0), >>>                 COMEDI_NUM_MINORS); >>> -    if (retval) >>> +    if (retval) { >>> +        kfree_const(comedi_cdev.kobj.name); >>> +        comedi_cdev.kobj.name = NULL; >>>           goto out_unregister_chrdev_region; >>> +    } >> >> A driver should never have to poke around in the internals of a cdev >> object like this.  Please fix the cdev core to not need this if >> cdev_add() fails. Or at least there should be a function that can be called to undo the allocations of kobject_set_name(). >> > Hi, > > I had checked all 67 places that used cdev_add(), and only the following > 5 functions set the name before the cdev_add(): > > 1. comedi_init(), will memleak and will be fixed by this patch. > 2. hfi1_cdev_init(), won't memleak. > 3. qib_cdev_init(), won't memleak. > 4. uio_major_init(), won't memleak. > 5. __register_chrdev(), won't memleak. > > As the result, I just fix the code in comedi_init(). Should I still fix > the cdev core code, which is free the name in cdev_add() fail path? I'm stuck trying to work out why hfi1_cdev_init() doesn't have the same problem when cdev_add() returns an error. -- -=( Ian Abbott || MEV Ltd. is a company )=- -=( registered in England & Wales. Regd. number: 02862268. )=- -=( Regd. addr.: S11 & 12 Building 67, Europa Business Park, )=- -=( Bird Hall Lane, STOCKPORT, SK3 0XA, UK. || www.mev.co.uk )=-