Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp1226366pxv; Fri, 23 Jul 2021 03:14:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwJF/reE1ooipBd4NHtfMfLcO0LKUwP6PPS5QXabS0G3HGdjcqOEsWY8UrujHxUYLxmiO6m X-Received: by 2002:aa7:dbc3:: with SMTP id v3mr4772585edt.63.1627035282598; Fri, 23 Jul 2021 03:14:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627035282; cv=none; d=google.com; s=arc-20160816; b=u+5pA9n7VJwh7PuUjK26fRhtR2dg6wmb372PDLvVN70HYzjWwxhYcIJe+nFqMmIxcn uCfrgZ/LFt+SEuXw36id6ONZBoMJv8Up6tEu8cXD3uGVAfvUMJdKBmb3KzHxHF89/2qC ayOHjx3KqShQx6TY6Vs/93ScKJDhfHGIJuvTkxkhdo8GgEm0tQ38Io8SM9w1k5912bIs RtDwnSS1WeRYMcy53JZmw49MN2jJLA1yQrSYhDLTc7MJP/FunzmLwlQiwfb4W1h7SRnp h7RwBUGzxZtZM2OqUvAMQlpnxc/rXt/44/zwubFZiv77JT9ZBJYVIPbvsBRPPzy0ll7j lKLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=kYd4tdoQiz4/cRNtVUAlMn2ymN1e93EFk9P+Ltuhf9k=; b=IkAm6KBxU+F7uO/oWujgLHDQiYHJxIGEvn+I0c878fjJQkW7lxN0Nzq/qlhWWT1WdT 0bSEa0pbN5yWn+vb/g1+BwI/81Oyp5HqKl8Hw2Pwp/ney/UxfoW5nBolptuUuf80cLor grJYoj9Zp1yyVb6q48kXhdX1b3IHGNbgHJZE6JTKd1bxw29M7K9hbIBlNMynVOTls/OA PNpZnCuPv/gcX3g17Nd/mXcN8CjTipHk7Q09RSbd587fRjCNP7UCrsgOJ4St+cd5Yng4 Zwe1nBABfJUdq3jpMIiR7yDp2PmaPcBZGertHNVT4Ip+NF+4TTVhS32ffU7moNAV/xrK U39A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=TzP7UyRd; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w10si32228754ejf.364.2021.07.23.03.14.15; Fri, 23 Jul 2021 03:14:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=TzP7UyRd; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231689AbhGWJcy (ORCPT + 99 others); Fri, 23 Jul 2021 05:32:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33000 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231467AbhGWJcx (ORCPT ); Fri, 23 Jul 2021 05:32:53 -0400 Received: from mail-ej1-x635.google.com (mail-ej1-x635.google.com [IPv6:2a00:1450:4864:20::635]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 21FC7C061575; Fri, 23 Jul 2021 03:13:27 -0700 (PDT) Received: by mail-ej1-x635.google.com with SMTP id o5so2983416ejy.2; Fri, 23 Jul 2021 03:13:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=kYd4tdoQiz4/cRNtVUAlMn2ymN1e93EFk9P+Ltuhf9k=; b=TzP7UyRdTNkHrN1Cr45t3NYE1K+zPDAQLLNeeXSJFDf2lqoWTyGzxLQXMztJX7a/Ho OLfTn7MuqlaL/QTVJqBG5HEKKH/XxuJ21OjFriCwdM/eGagQnVxJDUIZXBzhVnXeZJ3W UwYM48yBXBA09JJkcinGTGV9AkK1bLA+t971eLWBYKvHMMl/DcCsTd80/mdKfccSnemB S8nFTwTNFcQrOXJRycr/lhWvFO7b6ACXUiHO0Puo3E34j/Z7BeZSK07OTZ04H1ixJ7/F +uZdNCAu2hvnmpEXs0YT/5TF33XU22/1z3uwoeC3K6YtSvzrshNkPo3CSqlxc4RUcH+y HbTg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=kYd4tdoQiz4/cRNtVUAlMn2ymN1e93EFk9P+Ltuhf9k=; b=UF1ke0Yh9GTG48aoOURNbM/8/Ab6tDa9PTaGOxYkcARrKvm31FB1PkQB92q9r9Y570 veTV1vScTX8+BZi/NPK3dqCBXcdvvxtx1XW62yLHa9q2db6z8eAfpEIuhdsamTylAOom muGUYYspYMjfEy1tjqyyNQmX9xwYuDMT8T/ReqNa++8sszLiXdRqatRWBapq/EtqsSFD LCJvoei45n2k+G17X/T0iuUWnRZJ2PBljdqVAZBsjAzk69wLbO0padRSFU6Wz9sOnmEw uNfK5Lpa99tTgMn7Q3wVCT5TwJ50aY3EC/ePADjXQCPzZlRnQnEZwpFlM2y0cQ4YvJKj OsdQ== X-Gm-Message-State: AOAM530msk7Mc1TXOx/Ep9Jt6/lj8BUZogeE0UUePe2ZR0es3oG2xiEj 88zVJxdvFHv/w4/8eieuybimDoL5tzV8gLBfAIo= X-Received: by 2002:a17:906:9b1:: with SMTP id q17mr3898362eje.546.1627035205650; Fri, 23 Jul 2021 03:13:25 -0700 (PDT) MIME-Version: 1.0 References: <20210709084351.2087311-1-mudongliangabcd@gmail.com> In-Reply-To: <20210709084351.2087311-1-mudongliangabcd@gmail.com> From: Dongliang Mu Date: Fri, 23 Jul 2021 18:12:59 +0800 Message-ID: Subject: Re: [PATCH] ath9k: hif_usb: fix memory leak in ath9k_hif_usb_firmware_cb To: ath9k-devel@qca.qualcomm.com, Kalle Valo , "David S. Miller" , Jakub Kicinski , Brooke Basile Cc: syzbot+6692c72009680f7c4eb2@syzkaller.appspotmail.com, linux-wireless@vger.kernel.org, "open list:NETWORKING [GENERAL]" , linux-kernel Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Fri, Jul 9, 2021 at 4:44 PM Dongliang Mu wrote: > > The commit 03fb92a432ea ("ath9k: hif_usb: fix race condition between > usb_get_urb() and usb_kill_anchored_urbs()") adds three usb_get_urb > in ath9k_hif_usb_dealloc_tx_urbs and usb_free_urb. > > Fix this bug by adding corresponding usb_free_urb in > ath9k_hif_usb_dealloc_tx_urbs other and hif_usb_stop. > Any idea about this patch? > Reported-by: syzbot+6692c72009680f7c4eb2@syzkaller.appspotmail.com > Fixes: 03fb92a432ea ("ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs()") > Signed-off-by: Dongliang Mu > --- > drivers/net/wireless/ath/ath9k/hif_usb.c | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/drivers/net/wireless/ath/ath9k/hif_usb.c b/drivers/net/wireless/ath/ath9k/hif_usb.c > index 860da13bfb6a..bda91ff3289b 100644 > --- a/drivers/net/wireless/ath/ath9k/hif_usb.c > +++ b/drivers/net/wireless/ath/ath9k/hif_usb.c > @@ -457,6 +457,7 @@ static void hif_usb_stop(void *hif_handle) > usb_kill_urb(tx_buf->urb); > list_del(&tx_buf->list); > usb_free_urb(tx_buf->urb); > + usb_free_urb(tx_buf->urb); > kfree(tx_buf->buf); > kfree(tx_buf); > spin_lock_irqsave(&hif_dev->tx.tx_lock, flags); > @@ -779,6 +780,7 @@ static void ath9k_hif_usb_dealloc_tx_urbs(struct hif_device_usb *hif_dev) > usb_kill_urb(tx_buf->urb); > list_del(&tx_buf->list); > usb_free_urb(tx_buf->urb); > + usb_free_urb(tx_buf->urb); > kfree(tx_buf->buf); > kfree(tx_buf); > spin_lock_irqsave(&hif_dev->tx.tx_lock, flags); > @@ -797,6 +799,7 @@ static void ath9k_hif_usb_dealloc_tx_urbs(struct hif_device_usb *hif_dev) > usb_kill_urb(tx_buf->urb); > list_del(&tx_buf->list); > usb_free_urb(tx_buf->urb); > + usb_free_urb(tx_buf->urb); > kfree(tx_buf->buf); > kfree(tx_buf); > spin_lock_irqsave(&hif_dev->tx.tx_lock, flags); > -- > 2.25.1 >