Received: by 2002:a05:6359:6284:b0:131:369:b2a3 with SMTP id se4csp164397rwb; Fri, 4 Aug 2023 10:38:27 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHuOjsZwAWgR56q+T4R9Re291RnkEh6mzeU92qrl1dgz/4CCKrBg1Ea1vKxW7HTxPERXYDD X-Received: by 2002:a05:6a21:78a6:b0:137:866b:723f with SMTP id bf38-20020a056a2178a600b00137866b723fmr2706695pzc.15.1691170706834; Fri, 04 Aug 2023 10:38:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1691170706; cv=none; d=google.com; s=arc-20160816; b=QtV2JRxvNowUnE3t7NNDZbzMN8nFnaYnIXQB4SlNIUeifKR9loPXnEE0VD/JKwRj1u 9PObq1H3esDIpyx053KxqnYuV5lEct3CGPHec6puhKGuu0p1mm7jUkE9M1KLCoZEye3J UOJf1xTnctyDulqufrgedt8aj7wYhcfi5BM2hHxL+o1y/rhzaNVcCn6EAodGUVNwG2Dz mKtSVhxt8tn60h1gMljqgejSjaMdrQim7NLUyJ1M/qR8yHGpxcUwbbiCsIoOXkON0avx 7frUXiPKjN56cN7oeG8Lpg3IWYLL2oFqPMfRdoyVX+vskt4EE3BQkD+rMReoWS3LUwLx vveA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature:dkim-signature; bh=mJFBAquxpBs6VdgqUc6cLPhqpzh07gjVX4Q7aFGzTG8=; fh=5KvHHUcfBIBdmMH027jnTfWRuOqaKbgBg3g3ce4VP5A=; b=lIdGdKzIAe+wNFgiBmfJFjcaWjofFOZb4RRBrLBQggyeFX6/atNA/lEkuWpIWOErmc mr6fJDr3OefHp0lUm4DdsIon+5/KFG11WCnxpTTglYhmJaCG0GloCfp/ueQ3dkf2DZLL QXDkvS9a7cZ2eBM8ISlR/y6F9BoC6hi0rpQxHoqrA5GjU74g+Pw0imR9+K3BZWLU2Ih1 RZZe/SSyS2xIGxBRV4iF+kEaygL9pRBAiLTDl0RMNOWPY2Ze3lhmV9GZz8xhRH69Bz+8 eI7WuhTvZ3ne9imSDdPZLnf164ejNSdjFJAH9Cpl3FXCim7jy3nxhE6vCKbOthuPj53p vHvQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@alu.unizg.hr header.s=mail header.b=Lvq2XEfE; dkim=fail header.i=@alu.unizg.hr header.s=mail header.b="qAR4TZQ/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alu.unizg.hr Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r18-20020a63d912000000b00563f74f5ce5si1960758pgg.372.2023.08.04.10.37.46; Fri, 04 Aug 2023 10:38:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@alu.unizg.hr header.s=mail header.b=Lvq2XEfE; dkim=fail header.i=@alu.unizg.hr header.s=mail header.b="qAR4TZQ/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alu.unizg.hr Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231324AbjHDQzx (ORCPT + 99 others); Fri, 4 Aug 2023 12:55:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60956 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231282AbjHDQzw (ORCPT ); Fri, 4 Aug 2023 12:55:52 -0400 Received: from domac.alu.hr (domac.alu.unizg.hr [IPv6:2001:b68:2:2800::3]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 390A3422B; Fri, 4 Aug 2023 09:55:47 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by domac.alu.hr (Postfix) with ESMTP id 7EA3960177; Fri, 4 Aug 2023 18:55:44 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=alu.unizg.hr; s=mail; t=1691168144; bh=jGKArOHB9A/vE1VyN1TzB7/9WlyDQkSbKJ/qSRlrg4Y=; h=From:To:Cc:Subject:Date:From; b=Lvq2XEfE5l92EkNlNdNhmi5dOFDJqg0P27OgthGyexVw/muoggPy19Z/MtgGbxuGK Gximh2eGIRnyqvnn3RtCEe4NfNB86/v7IauGF1auuC3ZwTl22756htbNNoWLs7ZcrO 0XJIgVr9fyhGSA20LyciUAVIrhU330GfD7IxRLsTH0vGXPX340377zn6n8sAWuRlAr YbEjJQrLnSoASysqQSsMynN244431zJnlRAnD4E9unTvVBsI+OY029ZhZD0hAVy9JR km8sVJz+AVlOU5Zzkw2qY2ujyl7tJuH7+WjHCyLX+CLqYKi1yBs1mw23RulUlcA8L3 s7kZLdMjkrn6w== X-Virus-Scanned: Debian amavisd-new at domac.alu.hr Received: from domac.alu.hr ([127.0.0.1]) by localhost (domac.alu.hr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kBv9sbNghrv6; Fri, 4 Aug 2023 18:55:41 +0200 (CEST) Received: from defiant.. (unknown [94.250.191.183]) by domac.alu.hr (Postfix) with ESMTPSA id EC2E560174; Fri, 4 Aug 2023 18:55:26 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=alu.unizg.hr; s=mail; t=1691168141; bh=jGKArOHB9A/vE1VyN1TzB7/9WlyDQkSbKJ/qSRlrg4Y=; h=From:To:Cc:Subject:Date:From; b=qAR4TZQ/gjjpKyr7+3vOmYASKTSG8wSaJaJw+xgTNXZszy/eJYvqn+75UoZzHxHfS MIc9FUyHn88MjS5iFfWafxHfhm7q0PlJMyLRSk6//wDpZF3sLS8AUEzELV2p6wqrua 54UBVULx9cE6WJ8ykp54cEQ601XEkl1GapI49wg4rx8Z7Wkppa3OkDLuYFsZyFmUZE AK7oOYMni5iboWcWS72hYrKasipH/ccJUwck5wVuhQIlMB0kLC1vpo8ObxNRqiYxT8 grR1nDoP+lAFw7q8QY33UpkYFpyuclLW+anE3sQvQ6HAs603ne63642tWDnGVcezA2 wxelq2g3IYwDA== From: Mirsad Todorovac To: Mirsad Todorovac , linux-kernel@vger.kernel.org Cc: Luis Chamberlain , Greg Kroah-Hartman , Russ Weight , Tianfei Zhang , Shuah Khan , Colin Ian King , Randy Dunlap , linux-kselftest@vger.kernel.org, stable@vger.kernel.org, Dan Carpenter , Takashi Iwai Subject: [PATCH v3 4.19 1/2] test_firmware: fix a memory leak with reqs buffer Date: Fri, 4 Aug 2023 18:53:21 +0200 Message-Id: <20230804165321.92163-1-mirsad.todorovac@alu.unizg.hr> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ commit be37bed754ed90b2655382f93f9724b3c1aae847 upstream ] Dan Carpenter spotted that test_fw_config->reqs will be leaked if trigger_batched_requests_store() is called two or more times. The same appears with trigger_batched_requests_async_store(). This bug wasn't triggered by the tests, but observed by Dan's visual inspection of the code. The recommended workaround was to return -EBUSY if test_fw_config->reqs is already allocated. Fixes: c92316bf8e94 ("test_firmware: add batched firmware tests") Cc: Luis Chamberlain Cc: Greg Kroah-Hartman Cc: Russ Weight Cc: Tianfei Zhang Cc: Shuah Khan Cc: Colin Ian King Cc: Randy Dunlap Cc: linux-kselftest@vger.kernel.org Cc: stable@vger.kernel.org # v4.19 Suggested-by: Dan Carpenter Suggested-by: Takashi Iwai Link: https://lore.kernel.org/r/20230509084746.48259-2-mirsad.todorovac@alu.unizg.hr Signed-off-by: Mirsad Todorovac [ This is a backport to v4.19 stable branch without a change in code from the 5.4+ patch ] --- v2: no changes to commit. minor clarifications with versioning for the patchwork. v1: patch sumbmitted verbatim from the 5.4+ branch to 4.19 lib/test_firmware.c | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/lib/test_firmware.c b/lib/test_firmware.c index f4cc874021da..e4688821eab8 100644 --- a/lib/test_firmware.c +++ b/lib/test_firmware.c @@ -618,6 +618,11 @@ static ssize_t trigger_batched_requests_store(struct device *dev, mutex_lock(&test_fw_mutex); + if (test_fw_config->reqs) { + rc = -EBUSY; + goto out_bail; + } + test_fw_config->reqs = vzalloc(array3_size(sizeof(struct test_batched_req), test_fw_config->num_requests, 2)); @@ -721,6 +726,11 @@ ssize_t trigger_batched_requests_async_store(struct device *dev, mutex_lock(&test_fw_mutex); + if (test_fw_config->reqs) { + rc = -EBUSY; + goto out_bail; + } + test_fw_config->reqs = vzalloc(array3_size(sizeof(struct test_batched_req), test_fw_config->num_requests, 2)); -- 2.34.1