From patchwork Wed Jun 15 18:13:57 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Frank Rowand X-Patchwork-Id: 636003 Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Received: from lists.ozlabs.org (lists.ozlabs.org [103.22.144.68]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 3rVF7T2MdGz9t0c for ; Thu, 16 Jun 2016 04:15:49 +1000 (AEST) Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b=D/D6W3IP; dkim-atps=neutral Received: from ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3]) by lists.ozlabs.org (Postfix) with ESMTP id 3rVF7T1LgvzDqlJ for ; Thu, 16 Jun 2016 04:15:49 +1000 (AEST) Authentication-Results: lists.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b=D/D6W3IP; dkim-atps=neutral X-Original-To: linuxppc-dev@lists.ozlabs.org Delivered-To: linuxppc-dev@lists.ozlabs.org Received: from mail-pf0-x241.google.com (mail-pf0-x241.google.com [IPv6:2607:f8b0:400e:c00::241]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 3rVF5S45pTzDq62 for ; Thu, 16 Jun 2016 04:14:04 +1000 (AEST) Authentication-Results: lists.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b=D/D6W3IP; dkim-atps=neutral Received: by mail-pf0-x241.google.com with SMTP id t190so2229074pfb.2 for ; Wed, 15 Jun 2016 11:14:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=to:cc:from:subject:message-id:date:user-agent:mime-version :content-transfer-encoding; bh=jzVpx8eBbTRxxI6zu81wgYEPWFXr6DnQzzbKZ9LhzyI=; b=D/D6W3IPwOWG9pgDhnbXAnxHqIYGckWNkTw3hSRokZ3mQLn02Ll3rvK25nU0fjOYxV muiOOh8qVRXcUwnyprajIiqT0zB/kEjPTaS8KnOvZHkEd4izptj5RdOg1Wm78hCcFzLO pymVCsInwDi0tuo8EnGtYpw0gUTuVHm3ZEwVyMOEIbZ1r/yJqnZgU7sa/niVvVYWL6jE qHshMxi5SqaDz3ix3haKV4E1bwikqUzM67PzdAuRrSslwMk/NN9cWOP+b8SmJcLFd9MO K96vxE/x0/Q/q7W9aGsHrhePjLRu4mwUXLAoG7TKG6zkbAnY0u8btk5MaW7FlNoXQ/j0 uTRw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:to:cc:from:subject:message-id:date:user-agent :mime-version:content-transfer-encoding; bh=jzVpx8eBbTRxxI6zu81wgYEPWFXr6DnQzzbKZ9LhzyI=; b=ZIt+gR/vSSzra69QIVOCxMeAqlmPMU/67uKfcgz8BJk8Pk6598Xrj7fcXbNJar3QwI ANtZtS7eCKF4Xeu5rX6jn+y7vKi3rPzNysvmz2XdpKFYrZh8TzSy/t2Q14PNNDlxcSqN 8ly2sBLh3GdERICNvr5fIO6tIpg+ir7K5dtfRhTRjiIcKjPfXEnZuo0YJbTudAOqDkjK 94Tv6j3454u+MdAzM5OnJn1oUWh7hKKGDapLUp4S4UGIvun0ujtdDOeA8BCT/YvDyWPi TKb8l01bhlfa3JfA42EaU04KTNZDOJ6sEptCI0TeTVBA14Tk17tpP47KgcKyxNOa7K0V Jawg== X-Gm-Message-State: ALyK8tLWSRrLdBRCx1erYX2quR+LspaJoJN04YtCXbJdi7P0KHDjUntkEqEzk7oI01B3aQ== X-Received: by 10.98.192.135 with SMTP id g7mr92718pfk.64.1466014442636; Wed, 15 Jun 2016 11:14:02 -0700 (PDT) Received: from [192.168.1.46] (c-50-148-165-216.hsd1.ca.comcast.net. [50.148.165.216]) by smtp.gmail.com with ESMTPSA id c15sm54532761pfj.65.2016.06.15.11.14.01 (version=TLSv1/SSLv3 cipher=OTHER); Wed, 15 Jun 2016 11:14:02 -0700 (PDT) To: Mathieu Malaterre , Rob Herring From: Frank Rowand Subject: [PATCH] of: fix memory leak related to safe_name() Message-ID: <57619AE5.70102@gmail.com> Date: Wed, 15 Jun 2016 11:13:57 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.4.0 MIME-Version: 1.0 X-BeenThere: linuxppc-dev@lists.ozlabs.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: "devicetree@vger.kernel.org" , linuxppc-dev@lists.ozlabs.org, "linux-kernel@vger.kernel.org" Errors-To: linuxppc-dev-bounces+patchwork-incoming=ozlabs.org@lists.ozlabs.org Sender: "Linuxppc-dev" From: Frank Rowand Fix a memory leak resulting from memory allocation in safe_name(). This patch fixes all call sites of safe_name(). Mathieu Malaterre reported the memory leak on boot: On my PowerMac device-tree would generate a duplicate name: [ 0.023043] device-tree: Duplicate name in PowerPC,G4@0, renamed to "l2-cache#1" in this case a newly allocated name is generated by `safe_name`. However in this case it is never deallocated. The bug was found using kmemleak reported as: unreferenced object 0xdf532e60 (size 32): comm "swapper", pid 1, jiffies 4294892300 (age 1993.532s) hex dump (first 32 bytes): 6c 32 2d 63 61 63 68 65 23 31 00 dd e4 dd 1e c2 l2-cache#1...... ec d4 ba ce 04 ec cc de 8e 85 e9 ca c4 ec cc 9e ................ backtrace: [] kvasprintf+0x64/0xc8 [] kasprintf+0x4c/0x5c [] safe_name.isra.1+0x80/0xc4 [] __of_attach_node_sysfs+0x6c/0x11c [] of_core_init+0x8c/0xf8 [] kernel_init_freeable+0xd4/0x208 [] kernel_init+0x24/0x11c [] ret_from_kernel_thread+0x5c/0x64 Link: https://bugzilla.kernel.org/show_bug.cgi?id=120331 Signed-off-by: Frank Rowand Reported-by: mathieu.malaterre@gmail.com --- drivers/of/base.c | 29 ++++++++++++++++++++--------- drivers/of/dynamic.c | 2 +- include/linux/of.h | 2 ++ 3 files changed, 23 insertions(+), 10 deletions(-) Index: b/drivers/of/base.c =================================================================== --- a/drivers/of/base.c +++ b/drivers/of/base.c @@ -112,6 +112,7 @@ static ssize_t of_node_property_read(str return memory_read_from_buffer(buf, count, &offset, pp->value, pp->length); } +/* always return newly allocated name, caller must free after use */ static const char *safe_name(struct kobject *kobj, const char *orig_name) { const char *name = orig_name; @@ -126,9 +127,12 @@ static const char *safe_name(struct kobj name = kasprintf(GFP_KERNEL, "%s#%i", orig_name, ++i); } - if (name != orig_name) + if (name == orig_name) { + name = kstrdup(orig_name, GFP_KERNEL); + } else { pr_warn("device-tree: Duplicate name in %s, renamed to \"%s\"\n", kobject_name(kobj), name); + } return name; } @@ -159,6 +163,7 @@ int __of_add_property_sysfs(struct devic int __of_attach_node_sysfs(struct device_node *np) { const char *name; + struct kobject *parent; struct property *pp; int rc; @@ -171,15 +176,15 @@ int __of_attach_node_sysfs(struct device np->kobj.kset = of_kset; if (!np->parent) { /* Nodes without parents are new top level trees */ - rc = kobject_add(&np->kobj, NULL, "%s", - safe_name(&of_kset->kobj, "base")); + name = safe_name(&of_kset->kobj, "base"); + parent = NULL; } else { name = safe_name(&np->parent->kobj, kbasename(np->full_name)); - if (!name || !name[0]) - return -EINVAL; - - rc = kobject_add(&np->kobj, &np->parent->kobj, "%s", name); + parent = &np->parent->kobj; } + if (!name) + return -ENOMEM; + rc = kobject_add(&np->kobj, parent, "%s", name); if (rc) return rc; @@ -1815,6 +1820,12 @@ int __of_remove_property(struct device_n return 0; } +void __of_sysfs_remove_bin_file(struct device_node *np, struct property *prop) +{ + sysfs_remove_bin_file(&np->kobj, &prop->attr); + kfree(prop->attr.attr.name); +} + void __of_remove_property_sysfs(struct device_node *np, struct property *prop) { if (!IS_ENABLED(CONFIG_SYSFS)) @@ -1822,7 +1833,7 @@ void __of_remove_property_sysfs(struct d /* at early boot, bail here and defer setup to of_init() */ if (of_kset && of_node_is_attached(np)) - sysfs_remove_bin_file(&np->kobj, &prop->attr); + __of_sysfs_remove_bin_file(np, prop); } /** @@ -1895,7 +1906,7 @@ void __of_update_property_sysfs(struct d return; if (oldprop) - sysfs_remove_bin_file(&np->kobj, &oldprop->attr); + __of_sysfs_remove_bin_file(np, oldprop); __of_add_property_sysfs(np, newprop); } Index: b/drivers/of/dynamic.c =================================================================== --- a/drivers/of/dynamic.c +++ b/drivers/of/dynamic.c @@ -55,7 +55,7 @@ void __of_detach_node_sysfs(struct devic /* only remove properties if on sysfs */ if (of_node_is_attached(np)) { for_each_property_of_node(np, pp) - sysfs_remove_bin_file(&np->kobj, &pp->attr); + __of_sysfs_remove_bin_file(np, pp); kobject_del(&np->kobj); } Index: b/include/linux/of.h =================================================================== --- a/include/linux/of.h +++ b/include/linux/of.h @@ -121,6 +121,8 @@ static inline int of_node_is_attached(st #ifdef CONFIG_OF_DYNAMIC extern struct device_node *of_node_get(struct device_node *node); extern void of_node_put(struct device_node *node); +extern void __of_sysfs_remove_bin_file(struct device_node *np, + struct property *prop); #else /* CONFIG_OF_DYNAMIC */ /* Dummy ref counting routines - to be implemented later */ static inline struct device_node *of_node_get(struct device_node *node)