All of lore.kernel.org
 help / color / mirror / Atom feed
From: Yang Yingliang <yangyingliang@huawei.com>
To: Greg KH <gregkh@linuxfoundation.org>
Cc: Luben Tuikov <luben.tuikov@amd.com>,
	<linux-kernel@vger.kernel.org>, <qemu-devel@nongnu.org>,
	<linux-f2fs-devel@lists.sourceforge.net>,
	<linux-erofs@lists.ozlabs.org>, <ocfs2-devel@oss.oracle.com>,
	<linux-mtd@lists.infradead.org>, <amd-gfx@lists.freedesktop.org>,
	<rafael@kernel.org>, <somlo@cmu.edu>, <mst@redhat.com>,
	<jaegeuk@kernel.org>, <chao@kernel.org>,
	<hsiangkao@linux.alibaba.com>, <huangjianan@oppo.com>,
	<mark@fasheh.com>, <jlbec@evilplan.org>,
	<joseph.qi@linux.alibaba.com>, <akpm@linux-foundation.org>,
	<alexander.deucher@amd.com>, <richard@nod.at>,
	<liushixin2@huawei.com>
Subject: Re: [PATCH 00/11] fix memory leak while kset_register() fails
Date: Fri, 21 Oct 2022 16:59:46 +0800	[thread overview]
Message-ID: <f1210e20-d167-26c4-7aba-490d8fb7241e@huawei.com> (raw)
In-Reply-To: <Y1JZ9IUPL6jZIQ8E@kroah.com>


On 2022/10/21 16:36, Greg KH wrote:
> On Fri, Oct 21, 2022 at 04:24:23PM +0800, Yang Yingliang wrote:
>> On 2022/10/21 13:37, Greg KH wrote:
>>> On Fri, Oct 21, 2022 at 01:29:31AM -0400, Luben Tuikov wrote:
>>>> On 2022-10-20 22:20, Yang Yingliang wrote:
>>>>> The previous discussion link:
>>>>> https://lore.kernel.org/lkml/0db486eb-6927-927e-3629-958f8f211194@huawei.com/T/
>>>> The very first discussion on this was here:
>>>>
>>>> https://www.spinics.net/lists/dri-devel/msg368077.html
>>>>
>>>> Please use this link, and not the that one up there you which quoted above,
>>>> and whose commit description is taken verbatim from the this link.
>>>>
>>>>> kset_register() is currently used in some places without calling
>>>>> kset_put() in error path, because the callers think it should be
>>>>> kset internal thing to do, but the driver core can not know what
>>>>> caller doing with that memory at times. The memory could be freed
>>>>> both in kset_put() and error path of caller, if it is called in
>>>>> kset_register().
>>>> As I explained in the link above, the reason there's
>>>> a memory leak is that one cannot call kset_register() without
>>>> the kset->kobj.name being set--kobj_add_internal() returns -EINVAL,
>>>> in this case, i.e. kset_register() fails with -EINVAL.
>>>>
>>>> Thus, the most common usage is something like this:
>>>>
>>>> 	kobj_set_name(&kset->kobj, format, ...);
>>>> 	kset->kobj.kset = parent_kset;
>>>> 	kset->kobj.ktype = ktype;
>>>> 	res = kset_register(kset);
>>>>
>>>> So, what is being leaked, is the memory allocated in kobj_set_name(),
>>>> by the common idiom shown above. This needs to be mentioned in
>>>> the documentation, at least, in case, in the future this is absolved
>>>> in kset_register() redesign, etc.
>>> Based on this, can kset_register() just clean up from itself when an
>>> error happens?  Ideally that would be the case, as the odds of a kset
>>> being embedded in a larger structure is probably slim, but we would have
>>> to search the tree to make sure.
>> I have search the whole tree, the kset used in bus_register() - patch #3,
>> kset_create_and_add() - patch #4
>> __class_register() - patch #5,  fw_cfg_build_symlink() - patch #6 and
>> amdgpu_discovery.c - patch #10
>> is embedded in a larger structure. In these cases, we can not call
>> kset_put() in error path in kset_register()
> Yes you can as the kobject in the kset should NOT be controling the
> lifespan of those larger objects.
>
> If it is, please point out the call chain here as I don't think that
> should be possible.
>
> Note all of this is a mess because the kobject name stuff was added much
> later, after the driver model had been created and running for a while.
> We missed this error path when adding the dynamic kobject name logic,
> thank for looking into this.
>
> If you could test the patch posted with your error injection systems,
> that could make this all much simpler to solve.

The patch posted by Luben will cause double free in some cases.


 From 71e0a22801c0699f67ea40ed96e0a7d7d9e0f318 Mon Sep 17 00:00:00 2001
From: Luben Tuikov <luben.tuikov@amd.com>
Date: Fri, 21 Oct 2022 03:34:21 -0400
Subject: [PATCH] kobject: Add kset_put() if kset_register() fails
X-check-string-leak: v1.0

If kset_register() fails, we call kset_put() before returning the
error. This makes sure that we free memory allocated by kobj_set_name()
for the kset, since kset_register() cannot be called unless the kset has
a name, usually gotten via kobj_set_name(&kset->kobj, format, ...);

Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Rafael J. Wysocki <rafael@kernel.org>
Cc: Yang Yingliang <yangyingliang@huawei.com>
Cc: Linux Kernel Mailing List <linux-kernel@vger.kernel.org>
Signed-off-by: Luben Tuikov <luben.tuikov@amd.com>
---
  lib/kobject.c | 4 +++-
  1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/lib/kobject.c b/lib/kobject.c
index a0b2dbfcfa2334..c122b979f2b75e 100644
--- a/lib/kobject.c
+++ b/lib/kobject.c
@@ -844,8 +844,10 @@ int kset_register(struct kset *k)

      kset_init(k);
      err = kobject_add_internal(&k->kobj);
-    if (err)
+    if (err) {
+        kset_put(k);
          return err;
+    }
      kobject_uevent(&k->kobj, KOBJ_ADD);
      return 0;
  }
-- 
2.38.0-rc2

>
> thanks,
>
> greg k-h
> .

WARNING: multiple messages have this Message-ID (diff)
From: Yang Yingliang via Ocfs2-devel <ocfs2-devel@oss.oracle.com>
To: Greg KH <gregkh@linuxfoundation.org>
Cc: rafael@kernel.org, qemu-devel@nongnu.org, liushixin2@huawei.com,
	linux-mtd@lists.infradead.org, huangjianan@oppo.com,
	richard@nod.at, mst@redhat.com, amd-gfx@lists.freedesktop.org,
	Luben Tuikov <luben.tuikov@amd.com>,
	hsiangkao@linux.alibaba.com, somlo@cmu.edu, chao@kernel.org,
	jaegeuk@kernel.org, linux-kernel@vger.kernel.org,
	linux-f2fs-devel@lists.sourceforge.net,
	alexander.deucher@amd.com, linux-erofs@lists.ozlabs.org,
	ocfs2-devel@oss.oracle.com
Subject: Re: [Ocfs2-devel] [PATCH 00/11] fix memory leak while	kset_register() fails
Date: Fri, 21 Oct 2022 16:59:46 +0800	[thread overview]
Message-ID: <f1210e20-d167-26c4-7aba-490d8fb7241e@huawei.com> (raw)
In-Reply-To: <Y1JZ9IUPL6jZIQ8E@kroah.com>


On 2022/10/21 16:36, Greg KH wrote:
> On Fri, Oct 21, 2022 at 04:24:23PM +0800, Yang Yingliang wrote:
>> On 2022/10/21 13:37, Greg KH wrote:
>>> On Fri, Oct 21, 2022 at 01:29:31AM -0400, Luben Tuikov wrote:
>>>> On 2022-10-20 22:20, Yang Yingliang wrote:
>>>>> The previous discussion link:
>>>>> https://lore.kernel.org/lkml/0db486eb-6927-927e-3629-958f8f211194@huawei.com/T/
>>>> The very first discussion on this was here:
>>>>
>>>> https://www.spinics.net/lists/dri-devel/msg368077.html
>>>>
>>>> Please use this link, and not the that one up there you which quoted above,
>>>> and whose commit description is taken verbatim from the this link.
>>>>
>>>>> kset_register() is currently used in some places without calling
>>>>> kset_put() in error path, because the callers think it should be
>>>>> kset internal thing to do, but the driver core can not know what
>>>>> caller doing with that memory at times. The memory could be freed
>>>>> both in kset_put() and error path of caller, if it is called in
>>>>> kset_register().
>>>> As I explained in the link above, the reason there's
>>>> a memory leak is that one cannot call kset_register() without
>>>> the kset->kobj.name being set--kobj_add_internal() returns -EINVAL,
>>>> in this case, i.e. kset_register() fails with -EINVAL.
>>>>
>>>> Thus, the most common usage is something like this:
>>>>
>>>> 	kobj_set_name(&kset->kobj, format, ...);
>>>> 	kset->kobj.kset = parent_kset;
>>>> 	kset->kobj.ktype = ktype;
>>>> 	res = kset_register(kset);
>>>>
>>>> So, what is being leaked, is the memory allocated in kobj_set_name(),
>>>> by the common idiom shown above. This needs to be mentioned in
>>>> the documentation, at least, in case, in the future this is absolved
>>>> in kset_register() redesign, etc.
>>> Based on this, can kset_register() just clean up from itself when an
>>> error happens?  Ideally that would be the case, as the odds of a kset
>>> being embedded in a larger structure is probably slim, but we would have
>>> to search the tree to make sure.
>> I have search the whole tree, the kset used in bus_register() - patch #3,
>> kset_create_and_add() - patch #4
>> __class_register() - patch #5,  fw_cfg_build_symlink() - patch #6 and
>> amdgpu_discovery.c - patch #10
>> is embedded in a larger structure. In these cases, we can not call
>> kset_put() in error path in kset_register()
> Yes you can as the kobject in the kset should NOT be controling the
> lifespan of those larger objects.
>
> If it is, please point out the call chain here as I don't think that
> should be possible.
>
> Note all of this is a mess because the kobject name stuff was added much
> later, after the driver model had been created and running for a while.
> We missed this error path when adding the dynamic kobject name logic,
> thank for looking into this.
>
> If you could test the patch posted with your error injection systems,
> that could make this all much simpler to solve.

The patch posted by Luben will cause double free in some cases.


 From 71e0a22801c0699f67ea40ed96e0a7d7d9e0f318 Mon Sep 17 00:00:00 2001
From: Luben Tuikov <luben.tuikov@amd.com>
Date: Fri, 21 Oct 2022 03:34:21 -0400
Subject: [PATCH] kobject: Add kset_put() if kset_register() fails
X-check-string-leak: v1.0

If kset_register() fails, we call kset_put() before returning the
error. This makes sure that we free memory allocated by kobj_set_name()
for the kset, since kset_register() cannot be called unless the kset has
a name, usually gotten via kobj_set_name(&kset->kobj, format, ...);

Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Rafael J. Wysocki <rafael@kernel.org>
Cc: Yang Yingliang <yangyingliang@huawei.com>
Cc: Linux Kernel Mailing List <linux-kernel@vger.kernel.org>
Signed-off-by: Luben Tuikov <luben.tuikov@amd.com>
---
  lib/kobject.c | 4 +++-
  1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/lib/kobject.c b/lib/kobject.c
index a0b2dbfcfa2334..c122b979f2b75e 100644
--- a/lib/kobject.c
+++ b/lib/kobject.c
@@ -844,8 +844,10 @@ int kset_register(struct kset *k)

      kset_init(k);
      err = kobject_add_internal(&k->kobj);
-    if (err)
+    if (err) {
+        kset_put(k);
          return err;
+    }
      kobject_uevent(&k->kobj, KOBJ_ADD);
      return 0;
  }
-- 
2.38.0-rc2

>
> thanks,
>
> greg k-h
> .

_______________________________________________
Ocfs2-devel mailing list
Ocfs2-devel@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/ocfs2-devel

WARNING: multiple messages have this Message-ID (diff)
From: Yang Yingliang <yangyingliang@huawei.com>
To: Greg KH <gregkh@linuxfoundation.org>
Cc: Luben Tuikov <luben.tuikov@amd.com>,
	<linux-kernel@vger.kernel.org>, <qemu-devel@nongnu.org>,
	<linux-f2fs-devel@lists.sourceforge.net>,
	<linux-erofs@lists.ozlabs.org>, <ocfs2-devel@oss.oracle.com>,
	<linux-mtd@lists.infradead.org>, <amd-gfx@lists.freedesktop.org>,
	<rafael@kernel.org>, <somlo@cmu.edu>, <mst@redhat.com>,
	<jaegeuk@kernel.org>, <chao@kernel.org>,
	<hsiangkao@linux.alibaba.com>, <huangjianan@oppo.com>,
	<mark@fasheh.com>, <jlbec@evilplan.org>,
	<joseph.qi@linux.alibaba.com>, <akpm@linux-foundation.org>,
	<alexander.deucher@amd.com>, <richard@nod.at>,
	<liushixin2@huawei.com>
Subject: Re: [PATCH 00/11] fix memory leak while kset_register() fails
Date: Fri, 21 Oct 2022 16:59:46 +0800	[thread overview]
Message-ID: <f1210e20-d167-26c4-7aba-490d8fb7241e@huawei.com> (raw)
In-Reply-To: <Y1JZ9IUPL6jZIQ8E@kroah.com>


On 2022/10/21 16:36, Greg KH wrote:
> On Fri, Oct 21, 2022 at 04:24:23PM +0800, Yang Yingliang wrote:
>> On 2022/10/21 13:37, Greg KH wrote:
>>> On Fri, Oct 21, 2022 at 01:29:31AM -0400, Luben Tuikov wrote:
>>>> On 2022-10-20 22:20, Yang Yingliang wrote:
>>>>> The previous discussion link:
>>>>> https://lore.kernel.org/lkml/0db486eb-6927-927e-3629-958f8f211194@huawei.com/T/
>>>> The very first discussion on this was here:
>>>>
>>>> https://www.spinics.net/lists/dri-devel/msg368077.html
>>>>
>>>> Please use this link, and not the that one up there you which quoted above,
>>>> and whose commit description is taken verbatim from the this link.
>>>>
>>>>> kset_register() is currently used in some places without calling
>>>>> kset_put() in error path, because the callers think it should be
>>>>> kset internal thing to do, but the driver core can not know what
>>>>> caller doing with that memory at times. The memory could be freed
>>>>> both in kset_put() and error path of caller, if it is called in
>>>>> kset_register().
>>>> As I explained in the link above, the reason there's
>>>> a memory leak is that one cannot call kset_register() without
>>>> the kset->kobj.name being set--kobj_add_internal() returns -EINVAL,
>>>> in this case, i.e. kset_register() fails with -EINVAL.
>>>>
>>>> Thus, the most common usage is something like this:
>>>>
>>>> 	kobj_set_name(&kset->kobj, format, ...);
>>>> 	kset->kobj.kset = parent_kset;
>>>> 	kset->kobj.ktype = ktype;
>>>> 	res = kset_register(kset);
>>>>
>>>> So, what is being leaked, is the memory allocated in kobj_set_name(),
>>>> by the common idiom shown above. This needs to be mentioned in
>>>> the documentation, at least, in case, in the future this is absolved
>>>> in kset_register() redesign, etc.
>>> Based on this, can kset_register() just clean up from itself when an
>>> error happens?  Ideally that would be the case, as the odds of a kset
>>> being embedded in a larger structure is probably slim, but we would have
>>> to search the tree to make sure.
>> I have search the whole tree, the kset used in bus_register() - patch #3,
>> kset_create_and_add() - patch #4
>> __class_register() - patch #5,  fw_cfg_build_symlink() - patch #6 and
>> amdgpu_discovery.c - patch #10
>> is embedded in a larger structure. In these cases, we can not call
>> kset_put() in error path in kset_register()
> Yes you can as the kobject in the kset should NOT be controling the
> lifespan of those larger objects.
>
> If it is, please point out the call chain here as I don't think that
> should be possible.
>
> Note all of this is a mess because the kobject name stuff was added much
> later, after the driver model had been created and running for a while.
> We missed this error path when adding the dynamic kobject name logic,
> thank for looking into this.
>
> If you could test the patch posted with your error injection systems,
> that could make this all much simpler to solve.

The patch posted by Luben will cause double free in some cases.


 From 71e0a22801c0699f67ea40ed96e0a7d7d9e0f318 Mon Sep 17 00:00:00 2001
From: Luben Tuikov <luben.tuikov@amd.com>
Date: Fri, 21 Oct 2022 03:34:21 -0400
Subject: [PATCH] kobject: Add kset_put() if kset_register() fails
X-check-string-leak: v1.0

If kset_register() fails, we call kset_put() before returning the
error. This makes sure that we free memory allocated by kobj_set_name()
for the kset, since kset_register() cannot be called unless the kset has
a name, usually gotten via kobj_set_name(&kset->kobj, format, ...);

Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Rafael J. Wysocki <rafael@kernel.org>
Cc: Yang Yingliang <yangyingliang@huawei.com>
Cc: Linux Kernel Mailing List <linux-kernel@vger.kernel.org>
Signed-off-by: Luben Tuikov <luben.tuikov@amd.com>
---
  lib/kobject.c | 4 +++-
  1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/lib/kobject.c b/lib/kobject.c
index a0b2dbfcfa2334..c122b979f2b75e 100644
--- a/lib/kobject.c
+++ b/lib/kobject.c
@@ -844,8 +844,10 @@ int kset_register(struct kset *k)

      kset_init(k);
      err = kobject_add_internal(&k->kobj);
-    if (err)
+    if (err) {
+        kset_put(k);
          return err;
+    }
      kobject_uevent(&k->kobj, KOBJ_ADD);
      return 0;
  }
-- 
2.38.0-rc2

>
> thanks,
>
> greg k-h
> .

______________________________________________________
Linux MTD discussion mailing list
http://lists.infradead.org/mailman/listinfo/linux-mtd/

WARNING: multiple messages have this Message-ID (diff)
From: Yang Yingliang via Linux-erofs <linux-erofs@lists.ozlabs.org>
To: Greg KH <gregkh@linuxfoundation.org>
Cc: rafael@kernel.org, qemu-devel@nongnu.org, liushixin2@huawei.com,
	joseph.qi@linux.alibaba.com, linux-mtd@lists.infradead.org,
	huangjianan@oppo.com, richard@nod.at, mark@fasheh.com,
	mst@redhat.com, amd-gfx@lists.freedesktop.org,
	Luben Tuikov <luben.tuikov@amd.com>,
	hsiangkao@linux.alibaba.com, somlo@cmu.edu, jlbec@evilplan.org,
	jaegeuk@kernel.org, linux-kernel@vger.kernel.org,
	linux-f2fs-devel@lists.sourceforge.net,
	alexander.deucher@amd.com, akpm@linux-foundation.org,
	linux-erofs@lists.ozlabs.org, ocfs2-devel@oss.oracle.com
Subject: Re: [PATCH 00/11] fix memory leak while kset_register() fails
Date: Fri, 21 Oct 2022 16:59:46 +0800	[thread overview]
Message-ID: <f1210e20-d167-26c4-7aba-490d8fb7241e@huawei.com> (raw)
In-Reply-To: <Y1JZ9IUPL6jZIQ8E@kroah.com>


On 2022/10/21 16:36, Greg KH wrote:
> On Fri, Oct 21, 2022 at 04:24:23PM +0800, Yang Yingliang wrote:
>> On 2022/10/21 13:37, Greg KH wrote:
>>> On Fri, Oct 21, 2022 at 01:29:31AM -0400, Luben Tuikov wrote:
>>>> On 2022-10-20 22:20, Yang Yingliang wrote:
>>>>> The previous discussion link:
>>>>> https://lore.kernel.org/lkml/0db486eb-6927-927e-3629-958f8f211194@huawei.com/T/
>>>> The very first discussion on this was here:
>>>>
>>>> https://www.spinics.net/lists/dri-devel/msg368077.html
>>>>
>>>> Please use this link, and not the that one up there you which quoted above,
>>>> and whose commit description is taken verbatim from the this link.
>>>>
>>>>> kset_register() is currently used in some places without calling
>>>>> kset_put() in error path, because the callers think it should be
>>>>> kset internal thing to do, but the driver core can not know what
>>>>> caller doing with that memory at times. The memory could be freed
>>>>> both in kset_put() and error path of caller, if it is called in
>>>>> kset_register().
>>>> As I explained in the link above, the reason there's
>>>> a memory leak is that one cannot call kset_register() without
>>>> the kset->kobj.name being set--kobj_add_internal() returns -EINVAL,
>>>> in this case, i.e. kset_register() fails with -EINVAL.
>>>>
>>>> Thus, the most common usage is something like this:
>>>>
>>>> 	kobj_set_name(&kset->kobj, format, ...);
>>>> 	kset->kobj.kset = parent_kset;
>>>> 	kset->kobj.ktype = ktype;
>>>> 	res = kset_register(kset);
>>>>
>>>> So, what is being leaked, is the memory allocated in kobj_set_name(),
>>>> by the common idiom shown above. This needs to be mentioned in
>>>> the documentation, at least, in case, in the future this is absolved
>>>> in kset_register() redesign, etc.
>>> Based on this, can kset_register() just clean up from itself when an
>>> error happens?  Ideally that would be the case, as the odds of a kset
>>> being embedded in a larger structure is probably slim, but we would have
>>> to search the tree to make sure.
>> I have search the whole tree, the kset used in bus_register() - patch #3,
>> kset_create_and_add() - patch #4
>> __class_register() - patch #5,  fw_cfg_build_symlink() - patch #6 and
>> amdgpu_discovery.c - patch #10
>> is embedded in a larger structure. In these cases, we can not call
>> kset_put() in error path in kset_register()
> Yes you can as the kobject in the kset should NOT be controling the
> lifespan of those larger objects.
>
> If it is, please point out the call chain here as I don't think that
> should be possible.
>
> Note all of this is a mess because the kobject name stuff was added much
> later, after the driver model had been created and running for a while.
> We missed this error path when adding the dynamic kobject name logic,
> thank for looking into this.
>
> If you could test the patch posted with your error injection systems,
> that could make this all much simpler to solve.

The patch posted by Luben will cause double free in some cases.


 From 71e0a22801c0699f67ea40ed96e0a7d7d9e0f318 Mon Sep 17 00:00:00 2001
From: Luben Tuikov <luben.tuikov@amd.com>
Date: Fri, 21 Oct 2022 03:34:21 -0400
Subject: [PATCH] kobject: Add kset_put() if kset_register() fails
X-check-string-leak: v1.0

If kset_register() fails, we call kset_put() before returning the
error. This makes sure that we free memory allocated by kobj_set_name()
for the kset, since kset_register() cannot be called unless the kset has
a name, usually gotten via kobj_set_name(&kset->kobj, format, ...);

Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Rafael J. Wysocki <rafael@kernel.org>
Cc: Yang Yingliang <yangyingliang@huawei.com>
Cc: Linux Kernel Mailing List <linux-kernel@vger.kernel.org>
Signed-off-by: Luben Tuikov <luben.tuikov@amd.com>
---
  lib/kobject.c | 4 +++-
  1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/lib/kobject.c b/lib/kobject.c
index a0b2dbfcfa2334..c122b979f2b75e 100644
--- a/lib/kobject.c
+++ b/lib/kobject.c
@@ -844,8 +844,10 @@ int kset_register(struct kset *k)

      kset_init(k);
      err = kobject_add_internal(&k->kobj);
-    if (err)
+    if (err) {
+        kset_put(k);
          return err;
+    }
      kobject_uevent(&k->kobj, KOBJ_ADD);
      return 0;
  }
-- 
2.38.0-rc2

>
> thanks,
>
> greg k-h
> .

WARNING: multiple messages have this Message-ID (diff)
From: Yang Yingliang via Linux-f2fs-devel <linux-f2fs-devel@lists.sourceforge.net>
To: Greg KH <gregkh@linuxfoundation.org>
Cc: rafael@kernel.org, qemu-devel@nongnu.org, liushixin2@huawei.com,
	joseph.qi@linux.alibaba.com, linux-mtd@lists.infradead.org,
	richard@nod.at, mark@fasheh.com, mst@redhat.com,
	amd-gfx@lists.freedesktop.org,
	Luben Tuikov <luben.tuikov@amd.com>,
	hsiangkao@linux.alibaba.com, somlo@cmu.edu, jlbec@evilplan.org,
	jaegeuk@kernel.org, linux-kernel@vger.kernel.org,
	linux-f2fs-devel@lists.sourceforge.net,
	alexander.deucher@amd.com, akpm@linux-foundation.org,
	linux-erofs@lists.ozlabs.org, ocfs2-devel@oss.oracle.com
Subject: Re: [f2fs-dev] [PATCH 00/11] fix memory leak while kset_register() fails
Date: Fri, 21 Oct 2022 16:59:46 +0800	[thread overview]
Message-ID: <f1210e20-d167-26c4-7aba-490d8fb7241e@huawei.com> (raw)
In-Reply-To: <Y1JZ9IUPL6jZIQ8E@kroah.com>


On 2022/10/21 16:36, Greg KH wrote:
> On Fri, Oct 21, 2022 at 04:24:23PM +0800, Yang Yingliang wrote:
>> On 2022/10/21 13:37, Greg KH wrote:
>>> On Fri, Oct 21, 2022 at 01:29:31AM -0400, Luben Tuikov wrote:
>>>> On 2022-10-20 22:20, Yang Yingliang wrote:
>>>>> The previous discussion link:
>>>>> https://lore.kernel.org/lkml/0db486eb-6927-927e-3629-958f8f211194@huawei.com/T/
>>>> The very first discussion on this was here:
>>>>
>>>> https://www.spinics.net/lists/dri-devel/msg368077.html
>>>>
>>>> Please use this link, and not the that one up there you which quoted above,
>>>> and whose commit description is taken verbatim from the this link.
>>>>
>>>>> kset_register() is currently used in some places without calling
>>>>> kset_put() in error path, because the callers think it should be
>>>>> kset internal thing to do, but the driver core can not know what
>>>>> caller doing with that memory at times. The memory could be freed
>>>>> both in kset_put() and error path of caller, if it is called in
>>>>> kset_register().
>>>> As I explained in the link above, the reason there's
>>>> a memory leak is that one cannot call kset_register() without
>>>> the kset->kobj.name being set--kobj_add_internal() returns -EINVAL,
>>>> in this case, i.e. kset_register() fails with -EINVAL.
>>>>
>>>> Thus, the most common usage is something like this:
>>>>
>>>> 	kobj_set_name(&kset->kobj, format, ...);
>>>> 	kset->kobj.kset = parent_kset;
>>>> 	kset->kobj.ktype = ktype;
>>>> 	res = kset_register(kset);
>>>>
>>>> So, what is being leaked, is the memory allocated in kobj_set_name(),
>>>> by the common idiom shown above. This needs to be mentioned in
>>>> the documentation, at least, in case, in the future this is absolved
>>>> in kset_register() redesign, etc.
>>> Based on this, can kset_register() just clean up from itself when an
>>> error happens?  Ideally that would be the case, as the odds of a kset
>>> being embedded in a larger structure is probably slim, but we would have
>>> to search the tree to make sure.
>> I have search the whole tree, the kset used in bus_register() - patch #3,
>> kset_create_and_add() - patch #4
>> __class_register() - patch #5,  fw_cfg_build_symlink() - patch #6 and
>> amdgpu_discovery.c - patch #10
>> is embedded in a larger structure. In these cases, we can not call
>> kset_put() in error path in kset_register()
> Yes you can as the kobject in the kset should NOT be controling the
> lifespan of those larger objects.
>
> If it is, please point out the call chain here as I don't think that
> should be possible.
>
> Note all of this is a mess because the kobject name stuff was added much
> later, after the driver model had been created and running for a while.
> We missed this error path when adding the dynamic kobject name logic,
> thank for looking into this.
>
> If you could test the patch posted with your error injection systems,
> that could make this all much simpler to solve.

The patch posted by Luben will cause double free in some cases.


 From 71e0a22801c0699f67ea40ed96e0a7d7d9e0f318 Mon Sep 17 00:00:00 2001
From: Luben Tuikov <luben.tuikov@amd.com>
Date: Fri, 21 Oct 2022 03:34:21 -0400
Subject: [PATCH] kobject: Add kset_put() if kset_register() fails
X-check-string-leak: v1.0

If kset_register() fails, we call kset_put() before returning the
error. This makes sure that we free memory allocated by kobj_set_name()
for the kset, since kset_register() cannot be called unless the kset has
a name, usually gotten via kobj_set_name(&kset->kobj, format, ...);

Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Rafael J. Wysocki <rafael@kernel.org>
Cc: Yang Yingliang <yangyingliang@huawei.com>
Cc: Linux Kernel Mailing List <linux-kernel@vger.kernel.org>
Signed-off-by: Luben Tuikov <luben.tuikov@amd.com>
---
  lib/kobject.c | 4 +++-
  1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/lib/kobject.c b/lib/kobject.c
index a0b2dbfcfa2334..c122b979f2b75e 100644
--- a/lib/kobject.c
+++ b/lib/kobject.c
@@ -844,8 +844,10 @@ int kset_register(struct kset *k)

      kset_init(k);
      err = kobject_add_internal(&k->kobj);
-    if (err)
+    if (err) {
+        kset_put(k);
          return err;
+    }
      kobject_uevent(&k->kobj, KOBJ_ADD);
      return 0;
  }
-- 
2.38.0-rc2

>
> thanks,
>
> greg k-h
> .


_______________________________________________
Linux-f2fs-devel mailing list
Linux-f2fs-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/linux-f2fs-devel

WARNING: multiple messages have this Message-ID (diff)
From: Yang Yingliang via <qemu-devel@nongnu.org>
To: Greg KH <gregkh@linuxfoundation.org>
Cc: Luben Tuikov <luben.tuikov@amd.com>,
	<linux-kernel@vger.kernel.org>, <qemu-devel@nongnu.org>,
	<linux-f2fs-devel@lists.sourceforge.net>,
	<linux-erofs@lists.ozlabs.org>, <ocfs2-devel@oss.oracle.com>,
	<linux-mtd@lists.infradead.org>, <amd-gfx@lists.freedesktop.org>,
	<rafael@kernel.org>, <somlo@cmu.edu>, <mst@redhat.com>,
	<jaegeuk@kernel.org>,  <chao@kernel.org>,
	<hsiangkao@linux.alibaba.com>, <huangjianan@oppo.com>,
	<mark@fasheh.com>, <jlbec@evilplan.org>,
	<joseph.qi@linux.alibaba.com>, <akpm@linux-foundation.org>,
	<alexander.deucher@amd.com>, <richard@nod.at>,
	<liushixin2@huawei.com>
Subject: Re: [PATCH 00/11] fix memory leak while kset_register() fails
Date: Fri, 21 Oct 2022 16:59:46 +0800	[thread overview]
Message-ID: <f1210e20-d167-26c4-7aba-490d8fb7241e@huawei.com> (raw)
In-Reply-To: <Y1JZ9IUPL6jZIQ8E@kroah.com>


On 2022/10/21 16:36, Greg KH wrote:
> On Fri, Oct 21, 2022 at 04:24:23PM +0800, Yang Yingliang wrote:
>> On 2022/10/21 13:37, Greg KH wrote:
>>> On Fri, Oct 21, 2022 at 01:29:31AM -0400, Luben Tuikov wrote:
>>>> On 2022-10-20 22:20, Yang Yingliang wrote:
>>>>> The previous discussion link:
>>>>> https://lore.kernel.org/lkml/0db486eb-6927-927e-3629-958f8f211194@huawei.com/T/
>>>> The very first discussion on this was here:
>>>>
>>>> https://www.spinics.net/lists/dri-devel/msg368077.html
>>>>
>>>> Please use this link, and not the that one up there you which quoted above,
>>>> and whose commit description is taken verbatim from the this link.
>>>>
>>>>> kset_register() is currently used in some places without calling
>>>>> kset_put() in error path, because the callers think it should be
>>>>> kset internal thing to do, but the driver core can not know what
>>>>> caller doing with that memory at times. The memory could be freed
>>>>> both in kset_put() and error path of caller, if it is called in
>>>>> kset_register().
>>>> As I explained in the link above, the reason there's
>>>> a memory leak is that one cannot call kset_register() without
>>>> the kset->kobj.name being set--kobj_add_internal() returns -EINVAL,
>>>> in this case, i.e. kset_register() fails with -EINVAL.
>>>>
>>>> Thus, the most common usage is something like this:
>>>>
>>>> 	kobj_set_name(&kset->kobj, format, ...);
>>>> 	kset->kobj.kset = parent_kset;
>>>> 	kset->kobj.ktype = ktype;
>>>> 	res = kset_register(kset);
>>>>
>>>> So, what is being leaked, is the memory allocated in kobj_set_name(),
>>>> by the common idiom shown above. This needs to be mentioned in
>>>> the documentation, at least, in case, in the future this is absolved
>>>> in kset_register() redesign, etc.
>>> Based on this, can kset_register() just clean up from itself when an
>>> error happens?  Ideally that would be the case, as the odds of a kset
>>> being embedded in a larger structure is probably slim, but we would have
>>> to search the tree to make sure.
>> I have search the whole tree, the kset used in bus_register() - patch #3,
>> kset_create_and_add() - patch #4
>> __class_register() - patch #5,  fw_cfg_build_symlink() - patch #6 and
>> amdgpu_discovery.c - patch #10
>> is embedded in a larger structure. In these cases, we can not call
>> kset_put() in error path in kset_register()
> Yes you can as the kobject in the kset should NOT be controling the
> lifespan of those larger objects.
>
> If it is, please point out the call chain here as I don't think that
> should be possible.
>
> Note all of this is a mess because the kobject name stuff was added much
> later, after the driver model had been created and running for a while.
> We missed this error path when adding the dynamic kobject name logic,
> thank for looking into this.
>
> If you could test the patch posted with your error injection systems,
> that could make this all much simpler to solve.

The patch posted by Luben will cause double free in some cases.


 From 71e0a22801c0699f67ea40ed96e0a7d7d9e0f318 Mon Sep 17 00:00:00 2001
From: Luben Tuikov <luben.tuikov@amd.com>
Date: Fri, 21 Oct 2022 03:34:21 -0400
Subject: [PATCH] kobject: Add kset_put() if kset_register() fails
X-check-string-leak: v1.0

If kset_register() fails, we call kset_put() before returning the
error. This makes sure that we free memory allocated by kobj_set_name()
for the kset, since kset_register() cannot be called unless the kset has
a name, usually gotten via kobj_set_name(&kset->kobj, format, ...);

Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Rafael J. Wysocki <rafael@kernel.org>
Cc: Yang Yingliang <yangyingliang@huawei.com>
Cc: Linux Kernel Mailing List <linux-kernel@vger.kernel.org>
Signed-off-by: Luben Tuikov <luben.tuikov@amd.com>
---
  lib/kobject.c | 4 +++-
  1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/lib/kobject.c b/lib/kobject.c
index a0b2dbfcfa2334..c122b979f2b75e 100644
--- a/lib/kobject.c
+++ b/lib/kobject.c
@@ -844,8 +844,10 @@ int kset_register(struct kset *k)

      kset_init(k);
      err = kobject_add_internal(&k->kobj);
-    if (err)
+    if (err) {
+        kset_put(k);
          return err;
+    }
      kobject_uevent(&k->kobj, KOBJ_ADD);
      return 0;
  }
-- 
2.38.0-rc2

>
> thanks,
>
> greg k-h
> .


WARNING: multiple messages have this Message-ID (diff)
From: Yang Yingliang <yangyingliang@huawei.com>
To: Greg KH <gregkh@linuxfoundation.org>
Cc: rafael@kernel.org, qemu-devel@nongnu.org, liushixin2@huawei.com,
	joseph.qi@linux.alibaba.com, linux-mtd@lists.infradead.org,
	huangjianan@oppo.com, richard@nod.at, mark@fasheh.com,
	mst@redhat.com, amd-gfx@lists.freedesktop.org,
	Luben Tuikov <luben.tuikov@amd.com>,
	hsiangkao@linux.alibaba.com, somlo@cmu.edu, chao@kernel.org,
	jlbec@evilplan.org, jaegeuk@kernel.org,
	linux-kernel@vger.kernel.org,
	linux-f2fs-devel@lists.sourceforge.net,
	alexander.deucher@amd.com, akpm@linux-foundation.org,
	linux-erofs@lists.ozlabs.org, ocfs2-devel@oss.oracle.com
Subject: Re: [PATCH 00/11] fix memory leak while kset_register() fails
Date: Fri, 21 Oct 2022 16:59:46 +0800	[thread overview]
Message-ID: <f1210e20-d167-26c4-7aba-490d8fb7241e@huawei.com> (raw)
In-Reply-To: <Y1JZ9IUPL6jZIQ8E@kroah.com>


On 2022/10/21 16:36, Greg KH wrote:
> On Fri, Oct 21, 2022 at 04:24:23PM +0800, Yang Yingliang wrote:
>> On 2022/10/21 13:37, Greg KH wrote:
>>> On Fri, Oct 21, 2022 at 01:29:31AM -0400, Luben Tuikov wrote:
>>>> On 2022-10-20 22:20, Yang Yingliang wrote:
>>>>> The previous discussion link:
>>>>> https://lore.kernel.org/lkml/0db486eb-6927-927e-3629-958f8f211194@huawei.com/T/
>>>> The very first discussion on this was here:
>>>>
>>>> https://www.spinics.net/lists/dri-devel/msg368077.html
>>>>
>>>> Please use this link, and not the that one up there you which quoted above,
>>>> and whose commit description is taken verbatim from the this link.
>>>>
>>>>> kset_register() is currently used in some places without calling
>>>>> kset_put() in error path, because the callers think it should be
>>>>> kset internal thing to do, but the driver core can not know what
>>>>> caller doing with that memory at times. The memory could be freed
>>>>> both in kset_put() and error path of caller, if it is called in
>>>>> kset_register().
>>>> As I explained in the link above, the reason there's
>>>> a memory leak is that one cannot call kset_register() without
>>>> the kset->kobj.name being set--kobj_add_internal() returns -EINVAL,
>>>> in this case, i.e. kset_register() fails with -EINVAL.
>>>>
>>>> Thus, the most common usage is something like this:
>>>>
>>>> 	kobj_set_name(&kset->kobj, format, ...);
>>>> 	kset->kobj.kset = parent_kset;
>>>> 	kset->kobj.ktype = ktype;
>>>> 	res = kset_register(kset);
>>>>
>>>> So, what is being leaked, is the memory allocated in kobj_set_name(),
>>>> by the common idiom shown above. This needs to be mentioned in
>>>> the documentation, at least, in case, in the future this is absolved
>>>> in kset_register() redesign, etc.
>>> Based on this, can kset_register() just clean up from itself when an
>>> error happens?  Ideally that would be the case, as the odds of a kset
>>> being embedded in a larger structure is probably slim, but we would have
>>> to search the tree to make sure.
>> I have search the whole tree, the kset used in bus_register() - patch #3,
>> kset_create_and_add() - patch #4
>> __class_register() - patch #5,  fw_cfg_build_symlink() - patch #6 and
>> amdgpu_discovery.c - patch #10
>> is embedded in a larger structure. In these cases, we can not call
>> kset_put() in error path in kset_register()
> Yes you can as the kobject in the kset should NOT be controling the
> lifespan of those larger objects.
>
> If it is, please point out the call chain here as I don't think that
> should be possible.
>
> Note all of this is a mess because the kobject name stuff was added much
> later, after the driver model had been created and running for a while.
> We missed this error path when adding the dynamic kobject name logic,
> thank for looking into this.
>
> If you could test the patch posted with your error injection systems,
> that could make this all much simpler to solve.

The patch posted by Luben will cause double free in some cases.


 From 71e0a22801c0699f67ea40ed96e0a7d7d9e0f318 Mon Sep 17 00:00:00 2001
From: Luben Tuikov <luben.tuikov@amd.com>
Date: Fri, 21 Oct 2022 03:34:21 -0400
Subject: [PATCH] kobject: Add kset_put() if kset_register() fails
X-check-string-leak: v1.0

If kset_register() fails, we call kset_put() before returning the
error. This makes sure that we free memory allocated by kobj_set_name()
for the kset, since kset_register() cannot be called unless the kset has
a name, usually gotten via kobj_set_name(&kset->kobj, format, ...);

Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Rafael J. Wysocki <rafael@kernel.org>
Cc: Yang Yingliang <yangyingliang@huawei.com>
Cc: Linux Kernel Mailing List <linux-kernel@vger.kernel.org>
Signed-off-by: Luben Tuikov <luben.tuikov@amd.com>
---
  lib/kobject.c | 4 +++-
  1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/lib/kobject.c b/lib/kobject.c
index a0b2dbfcfa2334..c122b979f2b75e 100644
--- a/lib/kobject.c
+++ b/lib/kobject.c
@@ -844,8 +844,10 @@ int kset_register(struct kset *k)

      kset_init(k);
      err = kobject_add_internal(&k->kobj);
-    if (err)
+    if (err) {
+        kset_put(k);
          return err;
+    }
      kobject_uevent(&k->kobj, KOBJ_ADD);
      return 0;
  }
-- 
2.38.0-rc2

>
> thanks,
>
> greg k-h
> .

  parent reply	other threads:[~2022-10-21  8:59 UTC|newest]

Thread overview: 216+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-10-21  2:20 [PATCH 00/11] fix memory leak while kset_register() fails Yang Yingliang
2022-10-21  2:20 ` Yang Yingliang
2022-10-21  2:20 ` Yang Yingliang via
2022-10-21  2:20 ` Yang Yingliang via Linux-erofs
2022-10-21  2:20 ` Yang Yingliang
2022-10-21  2:20 ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  2:20 ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  2:20 ` [PATCH 01/11] kset: fix documentation for kset_register() Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang via
2022-10-21  2:20   ` Yang Yingliang via Linux-erofs
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  2:20   ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  5:34   ` Luben Tuikov
2022-10-21  5:34     ` [Ocfs2-devel] " Luben Tuikov via Ocfs2-devel
2022-10-21  5:34     ` [f2fs-dev] " Luben Tuikov via Linux-f2fs-devel
2022-10-21  5:34     ` Luben Tuikov
2022-10-21  5:34     ` Luben Tuikov via Linux-erofs
2022-10-21  5:34     ` Luben Tuikov
2022-10-21  8:05     ` Yang Yingliang
2022-10-21  8:05       ` Yang Yingliang
2022-10-21  8:05       ` Yang Yingliang via
2022-10-21  8:05       ` Yang Yingliang via Linux-erofs
2022-10-21  8:05       ` Yang Yingliang
2022-10-21  8:05       ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  8:05       ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  8:16       ` Greg KH
2022-10-21  8:16         ` Greg KH
2022-10-21  8:16         ` Greg KH
2022-10-21  8:16         ` Greg KH
2022-10-21  8:16         ` [f2fs-dev] " Greg KH
2022-10-21  8:16         ` [Ocfs2-devel] " Greg KH via Ocfs2-devel
2022-10-21  8:18       ` Luben Tuikov
2022-10-21  8:18         ` [Ocfs2-devel] " Luben Tuikov via Ocfs2-devel
2022-10-21  8:18         ` Luben Tuikov
2022-10-21  8:18         ` Luben Tuikov via Linux-erofs
2022-10-21  8:18         ` Luben Tuikov
2022-10-21  8:18         ` [f2fs-dev] " Luben Tuikov via Linux-f2fs-devel
2022-10-21  2:20 ` [PATCH 02/11] kset: add null pointer check in kset_put() Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang via
2022-10-21  2:20   ` Yang Yingliang via Linux-erofs
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  2:20   ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  2:20 ` [PATCH 03/11] bus: fix possible memory leak in bus_register() Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang via
2022-10-21  2:20   ` Yang Yingliang via Linux-erofs
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  2:20   ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  2:20 ` [PATCH 04/11] kobject: fix possible memory leak in kset_create_and_add() Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang via
2022-10-21  2:20   ` Yang Yingliang via Linux-erofs
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  2:20   ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  2:20 ` [Ocfs2-devel] [PATCH 05/11] class: fix possible memory leak in __class_register() Yang Yingliang via Ocfs2-devel
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang via
2022-10-21  2:20   ` Yang Yingliang via Linux-erofs
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  2:20 ` [PATCH 06/11] firmware: qemu_fw_cfg: fix possible memory leak in fw_cfg_build_symlink() Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang via
2022-10-21  2:20   ` Yang Yingliang via Linux-erofs
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  2:20   ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  2:20 ` [PATCH 07/11] f2fs: fix possible memory leak in f2fs_init_sysfs() Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang via
2022-10-21  2:20   ` Yang Yingliang via Linux-erofs
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  2:20   ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  2:20 ` [PATCH 08/11] erofs: fix possible memory leak in erofs_init_sysfs() Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang via
2022-10-21  2:20   ` Yang Yingliang
2022-10-21  2:20   ` Yang Yingliang via Linux-erofs
2022-10-21  2:20   ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  2:20   ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  2:21 ` [Ocfs2-devel] [PATCH 09/11] ocfs2: possible memory leak in mlog_sys_init() Yang Yingliang via Ocfs2-devel
2022-10-21  2:21   ` Yang Yingliang
2022-10-21  2:21   ` Yang Yingliang via Linux-erofs
2022-10-21  2:21   ` Yang Yingliang via
2022-10-21  2:21   ` Yang Yingliang
2022-10-21  2:21   ` Yang Yingliang
2022-10-21  2:21   ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  2:21 ` [PATCH 10/11] drm/amdgpu/discovery: fix possible memory leak Yang Yingliang
2022-10-21  2:21   ` Yang Yingliang
2022-10-21  2:21   ` Yang Yingliang via
2022-10-21  2:21   ` Yang Yingliang via Linux-erofs
2022-10-21  2:21   ` Yang Yingliang
2022-10-21  2:21   ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  2:21   ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  2:21 ` [PATCH 11/11] ubifs: Fix memory leak in ubifs_sysfs_init() Yang Yingliang
2022-10-21  2:21   ` Yang Yingliang
2022-10-21  2:21   ` Yang Yingliang via
2022-10-21  2:21   ` Yang Yingliang via Linux-erofs
2022-10-21  2:21   ` Yang Yingliang
2022-10-21  2:21   ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  2:21   ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  5:29 ` [PATCH 00/11] fix memory leak while kset_register() fails Luben Tuikov
2022-10-21  5:29   ` [Ocfs2-devel] " Luben Tuikov via Ocfs2-devel
2022-10-21  5:29   ` [f2fs-dev] " Luben Tuikov via Linux-f2fs-devel
2022-10-21  5:29   ` Luben Tuikov via Linux-erofs
2022-10-21  5:29   ` Luben Tuikov
2022-10-21  5:29   ` Luben Tuikov
2022-10-21  5:37   ` Greg KH
2022-10-21  5:37     ` Greg KH
2022-10-21  5:37     ` Greg KH
2022-10-21  5:37     ` Greg KH
2022-10-21  5:37     ` [f2fs-dev] " Greg KH
2022-10-21  5:37     ` [Ocfs2-devel] " Greg KH via Ocfs2-devel
2022-10-21  7:55     ` Luben Tuikov
2022-10-21  7:55       ` [Ocfs2-devel] " Luben Tuikov via Ocfs2-devel
2022-10-21  7:55       ` Luben Tuikov
2022-10-21  7:55       ` Luben Tuikov via Linux-erofs
2022-10-21  7:55       ` Luben Tuikov
2022-10-21  8:18       ` Greg KH
2022-10-21  8:18         ` Greg KH
2022-10-21  8:18         ` Greg KH
2022-10-21  8:18         ` Greg KH
2022-10-21  8:18         ` [f2fs-dev] " Greg KH
2022-10-21  8:18         ` [Ocfs2-devel] " Greg KH via Ocfs2-devel
2022-10-21  8:24         ` Luben Tuikov
2022-10-21  8:24           ` [Ocfs2-devel] " Luben Tuikov via Ocfs2-devel
2022-10-21  8:24           ` [f2fs-dev] " Luben Tuikov via Linux-f2fs-devel
2022-10-21  8:24           ` Luben Tuikov
2022-10-21  8:24           ` Luben Tuikov
2022-10-21  8:24           ` Luben Tuikov via Linux-erofs
2022-10-21  8:41           ` Luben Tuikov
2022-10-21  8:41             ` [Ocfs2-devel] " Luben Tuikov via Ocfs2-devel
2022-10-21  8:41             ` [f2fs-dev] " Luben Tuikov via Linux-f2fs-devel
2022-10-21  8:41             ` Luben Tuikov via Linux-erofs
2022-10-21  8:41             ` Luben Tuikov
2022-10-21  8:41             ` Luben Tuikov
2022-10-21  9:23             ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  9:23               ` Yang Yingliang
2022-10-21  9:23               ` Yang Yingliang via
2022-10-21  9:23               ` Yang Yingliang
2022-10-21  9:23               ` Yang Yingliang via Linux-erofs
2022-10-21  9:23               ` Yang Yingliang
2022-10-21  9:23               ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  8:24     ` Yang Yingliang
2022-10-21  8:24       ` Yang Yingliang
2022-10-21  8:24       ` Yang Yingliang via
2022-10-21  8:24       ` Yang Yingliang
2022-10-21  8:24       ` Yang Yingliang via Linux-erofs
2022-10-21  8:24       ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  8:24       ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  8:36       ` Greg KH
2022-10-21  8:36         ` Greg KH
2022-10-21  8:36         ` Greg KH
2022-10-21  8:36         ` Greg KH
2022-10-21  8:36         ` [f2fs-dev] " Greg KH
2022-10-21  8:36         ` [Ocfs2-devel] " Greg KH via Ocfs2-devel
2022-10-21  8:52         ` Luben Tuikov
2022-10-21  8:52           ` [Ocfs2-devel] " Luben Tuikov via Ocfs2-devel
2022-10-21  8:52           ` Luben Tuikov
2022-10-21  8:52           ` Luben Tuikov via Linux-erofs
2022-10-21  8:52           ` Luben Tuikov
2022-10-21  8:52           ` [f2fs-dev] " Luben Tuikov via Linux-f2fs-devel
2022-10-21  8:59         ` Yang Yingliang [this message]
2022-10-21  8:59           ` Yang Yingliang
2022-10-21  8:59           ` Yang Yingliang via
2022-10-21  8:59           ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  8:59           ` Yang Yingliang via Linux-erofs
2022-10-21  8:59           ` Yang Yingliang
2022-10-21  8:59           ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  9:08           ` Luben Tuikov
2022-10-21  9:08             ` [Ocfs2-devel] " Luben Tuikov via Ocfs2-devel
2022-10-21  9:08             ` Luben Tuikov
2022-10-21  9:08             ` Luben Tuikov via Linux-erofs
2022-10-21  9:08             ` Luben Tuikov
2022-10-21  9:08             ` [f2fs-dev] " Luben Tuikov via Linux-f2fs-devel
2022-10-21  9:56             ` Yang Yingliang
2022-10-21  9:56               ` Yang Yingliang
2022-10-21  9:56               ` Yang Yingliang via
2022-10-21  9:56               ` Yang Yingliang via Linux-erofs
2022-10-21  9:56               ` Yang Yingliang
2022-10-21  9:56               ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  9:56               ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21 23:45               ` Luben Tuikov
2022-10-21 23:45                 ` Luben Tuikov
2022-10-21 23:45                 ` Luben Tuikov via Linux-erofs
2022-10-21 23:45                 ` Luben Tuikov
2022-10-21 23:45                 ` [f2fs-dev] " Luben Tuikov via Linux-f2fs-devel
2022-10-21 23:45                 ` [Ocfs2-devel] " Luben Tuikov via Ocfs2-devel
2022-10-21  9:12         ` Yang Yingliang
2022-10-21  9:12           ` Yang Yingliang
2022-10-21  9:12           ` Yang Yingliang via
2022-10-21  9:12           ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel
2022-10-21  9:12           ` Yang Yingliang
2022-10-21  9:12           ` Yang Yingliang via Linux-erofs
2022-10-21  9:12           ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21 23:48           ` Luben Tuikov
2022-10-21 23:48             ` [f2fs-dev] " Luben Tuikov via Linux-f2fs-devel
2022-10-21 23:48             ` Luben Tuikov via Linux-erofs
2022-10-21 23:48             ` Luben Tuikov
2022-10-21 23:48             ` [Ocfs2-devel] " Luben Tuikov via Ocfs2-devel
2022-10-21 23:48             ` Luben Tuikov
2022-10-21  7:25   ` Yang Yingliang
2022-10-21  7:25     ` Yang Yingliang
2022-10-21  7:25     ` Yang Yingliang via
2022-10-21  7:25     ` Yang Yingliang
2022-10-21  7:25     ` Yang Yingliang via Linux-erofs
2022-10-21  7:25     ` [f2fs-dev] " Yang Yingliang via Linux-f2fs-devel
2022-10-21  7:25     ` [Ocfs2-devel] " Yang Yingliang via Ocfs2-devel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=f1210e20-d167-26c4-7aba-490d8fb7241e@huawei.com \
    --to=yangyingliang@huawei.com \
    --cc=akpm@linux-foundation.org \
    --cc=alexander.deucher@amd.com \
    --cc=amd-gfx@lists.freedesktop.org \
    --cc=chao@kernel.org \
    --cc=gregkh@linuxfoundation.org \
    --cc=hsiangkao@linux.alibaba.com \
    --cc=huangjianan@oppo.com \
    --cc=jaegeuk@kernel.org \
    --cc=jlbec@evilplan.org \
    --cc=joseph.qi@linux.alibaba.com \
    --cc=linux-erofs@lists.ozlabs.org \
    --cc=linux-f2fs-devel@lists.sourceforge.net \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mtd@lists.infradead.org \
    --cc=liushixin2@huawei.com \
    --cc=luben.tuikov@amd.com \
    --cc=mark@fasheh.com \
    --cc=mst@redhat.com \
    --cc=ocfs2-devel@oss.oracle.com \
    --cc=qemu-devel@nongnu.org \
    --cc=rafael@kernel.org \
    --cc=richard@nod.at \
    --cc=somlo@cmu.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.