Received: by 2002:ab2:6857:0:b0:1ef:ffd0:ce49 with SMTP id l23csp589049lqp; Thu, 21 Mar 2024 09:35:12 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWXXpitvtv0yuDLMYOgafq2WA6IDv96VSTby9k70Bcdu64YqXqofVb/uvKG5tAnGXI663twRObHZGQyrhmP49/Uo9+a1HUsFVyY5TDFIQ== X-Google-Smtp-Source: AGHT+IFfwXhBG+8QxgaVhh+24DL9jiUsDnYi5myH4GVbNcKX6+h74WEL6oHURc+V/MUUDcZxUe++ X-Received: by 2002:a05:6a00:1702:b0:6e7:117:c5d5 with SMTP id h2-20020a056a00170200b006e70117c5d5mr9584448pfc.23.1711038912088; Thu, 21 Mar 2024 09:35:12 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711038912; cv=pass; d=google.com; s=arc-20160816; b=n+dyir/yyVAxnnwcJtD1iuz3tz5C1TP1l7O1vrzqzeZFpw4ee11IvgziNtEUKe9aZn rdTOqsBbtLNx7w66OraQ+pvekGBmOKnlZAZEI3HS9pDJ150im6WPT2XiClxxOrkZxk/a eUV1tbOrZFaRLqaFDC3SHGwB/f8YPIRVUNsW2uFS55QlSzriYNf4zGSs68ocNkuqOmHO e69M95c4Mh1FgXNM4UwqmY5Jt9KrgBLuAZzyC54XoSJJTMhfsxUlpRRKPF7LrBgANeXL bN4WSL1Ynkjbm3Y/2R9CYnO+GpdxK1G2s0tdBersdzSlzZ3rdmNlFx901Qb8Iyk7u+py Bxlg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=GblkM0rXkobGOvAznWFXNMB8PHw+JhTurN6nTmP6yek=; fh=fI081ezqMtrIYOAvvaMK+aXWIaD4MUDUT36X2hSY1tg=; b=GJMuX4RsT3jSH+mFe0N99MD5AXkgrWx+iMdTYigZEqItTG2+1yEz2w6Mp16IhW3I4h xp1g9UfzNzCRd9dezL4gPRqxL02KYjPKfk7kDymzPhJO8lUwv8qXvOu568/dsWbviimE esMSlj/79WeEBJK2kUfpvfM1tMbTQ4s4BtxZDNUxWqG4frZsXkoJKbAexJMcNoTs04Fq uhmjCmq83dGHI53bpoHoqKzsObWoMrowRHZG+L/sxXYPKjidS0cDUG6PKNFp6Ao6kg2B AeHoHu4WyMbhcHhqjUqmYCM/Jp2ldKIwNCgws2PIlcajzkSevIxlfw7xcPqoGFdJnnFU R4ow==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@cmpxchg-org.20230601.gappssmtp.com header.s=20230601 header.b=vUMoiJEn; arc=pass (i=1 spf=pass spfdomain=cmpxchg.org dkim=pass dkdomain=cmpxchg-org.20230601.gappssmtp.com dmarc=pass fromdomain=cmpxchg.org); spf=pass (google.com: domain of linux-kernel+bounces-110325-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-110325-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=cmpxchg.org Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id b17-20020a056a000cd100b006e653744116si48498pfv.188.2024.03.21.09.35.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 21 Mar 2024 09:35:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-110325-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@cmpxchg-org.20230601.gappssmtp.com header.s=20230601 header.b=vUMoiJEn; arc=pass (i=1 spf=pass spfdomain=cmpxchg.org dkim=pass dkdomain=cmpxchg-org.20230601.gappssmtp.com dmarc=pass fromdomain=cmpxchg.org); spf=pass (google.com: domain of linux-kernel+bounces-110325-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-110325-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=cmpxchg.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 57F56B25C96 for ; Thu, 21 Mar 2024 16:17:18 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1DC2D12C553; Thu, 21 Mar 2024 16:17:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=cmpxchg-org.20230601.gappssmtp.com header.i=@cmpxchg-org.20230601.gappssmtp.com header.b="vUMoiJEn" Received: from mail-qt1-f178.google.com (mail-qt1-f178.google.com [209.85.160.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0E70B12C52D for ; Thu, 21 Mar 2024 16:17:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.160.178 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711037830; cv=none; b=N9V+RqJkdLxlf/0JrWKAqvF5P+aioksassEFSexqf7cfUcEoFcCDfuIeJcl0F9WkG2JYLFg4ISoXLXMtypyETK7Ksp8+hUERhnsyvxWxyH/SpJNvRAfKWXGUAS6GwtQqg0Wq9G6S92qs/PbwW5LyUibbT92cFFf0/n8SMEEXQp0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711037830; c=relaxed/simple; bh=iCvxqjV8nvENU9QhU5KtACphTO4DgKMFcObGcyiE06A=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=W2bgMzfJEtAQz1iU6BM4Srlu0b7Jj6hxzx9aQ5fBaiUf6DV7wiPKapTovh6QudHt8JSpzqgba94aneYEWKBL9E3i0v1RQe5nZnnjxBepLGSo14EzpkKD6bNTic1kYhXb7sFZkHXum71fkQfq6cP9cyYGOWpyy6pZgMlgbh2GEf8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=cmpxchg.org; spf=pass smtp.mailfrom=cmpxchg.org; dkim=pass (2048-bit key) header.d=cmpxchg-org.20230601.gappssmtp.com header.i=@cmpxchg-org.20230601.gappssmtp.com header.b=vUMoiJEn; arc=none smtp.client-ip=209.85.160.178 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=cmpxchg.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=cmpxchg.org Received: by mail-qt1-f178.google.com with SMTP id d75a77b69052e-42a9c21f9ecso6185941cf.0 for ; Thu, 21 Mar 2024 09:17:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cmpxchg-org.20230601.gappssmtp.com; s=20230601; t=1711037827; x=1711642627; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=GblkM0rXkobGOvAznWFXNMB8PHw+JhTurN6nTmP6yek=; b=vUMoiJEnC/mouzRlDN62P1GJ42N5P7VgELwelDb5GEIedHAPzJqjNrN7953cuqx51y pXuU+SV7+Vt3h34mJcH1gORmVu/a49WJHZByQP1zRBJSoBJF/mjNSPjFzXpnWh0n3Cta cCkycKUPa+PRMs5eSuAAv2rTcWMECD4zoUM95FZOUAkf4v09IUuMyg3y7pim3/VdBs+P x/y0zjhZcrL9yJSHgs5Aeo4AdBZQ6wDtN+COZSW8sNE/hhPeLJayDZwdZaSCRY4jOTxK 5ygSrl3dt7KgX8tKE7HQzXSK+wrFAtmt9NB3gZfI6gKGmujXn66rHeyaEAg+jEZrQhd/ Qx1g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1711037827; x=1711642627; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=GblkM0rXkobGOvAznWFXNMB8PHw+JhTurN6nTmP6yek=; b=W2lnIlZwj3XSXYI0TR109WUPYy8ARS5IA7PF4gBPhCcGoq8j510E+2H0m4myTmA+21 LYVZ1uX0ObkE5bsjNmcRs8Yqvl/fjiJ2FCnR6oA/HZaiMHtEyKJbIhgLwREkaRSFgDhR DtrKNhni3J/AQynxullLW37psyu2rMwFMDwOoY/eCgMcbKcerIBzNfNBHgY2GQk9zdWP 0GDjIwX/KCvXN3+K8Y7uADFge1aJoUNt4zlBsC/jSxX4WxnSTIEPzyUWnqZYW0bwfcu/ LtXO/78l0N5KmLsoQ33w3dtTGSPd7eYdT+JYq5rJpYuuGdCHyehA2M8te6ko6CcEyzR5 BbIg== X-Forwarded-Encrypted: i=1; AJvYcCVzniYtajnevUvbSG4/ttHPYsr9F78eufxujG2grofgkujpo5BG/GSjjAw5d0Fi+zg78EUHzDd1EGe722g0BuuT9lNUWbNzKV8MVysf X-Gm-Message-State: AOJu0Yxem7BFSbq0HFLUQqccxZ1R6n3xsmQGeVz7BtFfG1yR40Nors8H on5yRdFoR7KDpLanm36SSCbhr2jk2ijBCitPEMX+sCaAYkhX3Fo9S1Olg2i2LHo= X-Received: by 2002:a05:622a:106:b0:431:1def:c7c5 with SMTP id u6-20020a05622a010600b004311defc7c5mr3547484qtw.43.1711037826656; Thu, 21 Mar 2024 09:17:06 -0700 (PDT) Received: from localhost (2603-7000-0c01-2716-da5e-d3ff-fee7-26e7.res6.spectrum.com. [2603:7000:c01:2716:da5e:d3ff:fee7:26e7]) by smtp.gmail.com with ESMTPSA id e8-20020ac85988000000b0042c61b99f42sm15309qte.46.2024.03.21.09.17.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 21 Mar 2024 09:17:05 -0700 (PDT) From: Johannes Weiner To: Takashi Iwai Cc: Jaroslav Kysela , linux-sound@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] ALSA: control: fix memory leak in snd_ctl_elem_read_user() Date: Thu, 21 Mar 2024 12:17:00 -0400 Message-ID: <20240321161700.2926-1-hannes@cmpxchg.org> X-Mailer: git-send-email 2.44.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit With 6.9, I noticed kmalloc-2k blowing up to tens of gigabytes over several days. Kmemleak shows a long string of these: unreferenced object 0xffff8f1bddbce800 (size 2048): comm "wireplumber", pid 1058, jiffies 4294690193 hex dump (first 32 bytes): 14 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................ 4d 61 73 74 65 72 20 50 6c 61 79 62 61 63 6b 20 Master Playback backtrace (crc bd965d91): [] __kmalloc_node_track_caller+0x25b/0x370 [] memdup_user+0x25/0x80 [] snd_ctl_ioctl+0x753/0x880 [] __x64_sys_ioctl+0x89/0xb0 [] do_syscall_64+0x80/0x170 [] entry_SYSCALL_64_after_hwframe+0x46/0x4e When 1052d9882269 ("ALSA: control: Use automatic cleanup of kfree()") converted a few sites to automatic freeing, it removed the kfree from snd_ctl_elem_read_user() but forgot to add the __free hook. Fixes: 1052d9882269 ("ALSA: control: Use automatic cleanup of kfree()") Signed-off-by: Johannes Weiner --- sound/core/control.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sound/core/control.c b/sound/core/control.c index 8367fd485371..7da0d6afb766 100644 --- a/sound/core/control.c +++ b/sound/core/control.c @@ -1275,7 +1275,7 @@ static int snd_ctl_elem_read(struct snd_card *card, static int snd_ctl_elem_read_user(struct snd_card *card, struct snd_ctl_elem_value __user *_control) { - struct snd_ctl_elem_value *control; + struct snd_ctl_elem_value *control __free(kfree) = NULL; int result; control = memdup_user(_control, sizeof(*control)); -- 2.44.0