Re: [PATCH -next v2] scsi: core: fix error handling for dev_set_name

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



There is a Smatch static checker warning of this commit shown as following, please do not consider this patch again.

I'm sorry for the inconvenience for it.


Hello Zhu Wang,

The patch 04b5b5cb0136: "scsi: core: Fix possible memory leak if
device_add() fails" from Aug 3, 2023 (linux-next), leads to the
following Smatch static checker warning:

    drivers/scsi/raid_class.c:255 raid_component_add()
    warn: freeing device managed memory (UAF): 'rc'

drivers/scsi/raid_class.c
   212  static void raid_component_release(struct device *dev)
   213  {
   214          struct raid_component *rc =
   215                  container_of(dev, struct raid_component, dev);
   216          dev_printk(KERN_ERR, rc->dev.parent, "COMPONENT RELEASE\n");
   217          put_device(rc->dev.parent);
   218          kfree(rc);
   219  }
   220
   221  int raid_component_add(struct raid_template *r,struct device *raid_dev,
   222                         struct device *component_dev)
   223  {
   224          struct device *cdev =
   225 attribute_container_find_class_device(&r->raid_attrs.ac,
   226 raid_dev);
   227          struct raid_component *rc;
   228          struct raid_data *rd = dev_get_drvdata(cdev);
   229          int err;
   230
   231          rc = kzalloc(sizeof(*rc), GFP_KERNEL);
   232          if (!rc)
   233                  return -ENOMEM;
   234
   235          INIT_LIST_HEAD(&rc->node);
   236          device_initialize(&rc->dev);

The comments for device_initialize() say we cannot call kfree(rc) after
this point.

   237          rc->dev.release = raid_component_release;
                                  ^^^^^^^^^^^^^^^^^^^^^^^
>From this point on calling put_device(&rc->dev) is the same as calling
raid_component_release(&rc->dev);

   238          rc->dev.parent = get_device(component_dev);
   239          rc->num = rd->component_count++;
   240
   241          dev_set_name(&rc->dev, "component-%d", rc->num);
   242          list_add_tail(&rc->node, &rd->component_list);
   243          rc->dev.class = &raid_class.class;
   244          err = device_add(&rc->dev);
   245          if (err)
   246                  goto err_out;
   247
   248          return 0;
   249
   250  err_out:
   251          put_device(&rc->dev);
   252          list_del(&rc->node);
   253          rd->component_count--;
   254          put_device(component_dev);
   255          kfree(rc);

So this code is clearly a double free.  However, fixing it is not
obvious because why does raid_component_release() not call?

    list_del(&rc->node);
    rd->component_count--;

   256          return err;
   257  }

regards,
dan carpenter



On 2023/8/3 0:34, John Garry wrote:
On 02/08/2023 04:10, Zhu Wang wrote:
The driver do not handle the possible returning error of dev_set_name,
if it returned fail, some operations should be rollback or there may be
possible memory leak.

What memory are we possibly leaking? Please explain how.

We use put_device to free the device and use kfree
to free the memory in the error handle path.

Much of the core driver code in drivers/base - where dev_set_name() lives - does not check the return code. Why is SCSI special?

I'd say that the core driver code should be fixed up first in terms of usage, and then the rest.

BTW, as I see, dev_set_name() only fails for a small memory alloc failure. If memory alloc failure like this occurs, then things are not going to work properly anyway. Just not having the device name set should not make things worse.


Fixes: 71610f55fa4d ("[SCSI] struct device - replace bus_id with dev_name(), dev_set_name()")
Signed-off-by: Zhu Wang <wangzhu9@xxxxxxxxxx>
Reviewed-by: Bart Van Assche <bvanassche@xxxxxxx>

---
Changes in v2:
- Add put_device(parent) in the error path.
---
  drivers/scsi/scsi_scan.c | 9 ++++++++-
  1 file changed, 8 insertions(+), 1 deletion(-)

diff --git a/drivers/scsi/scsi_scan.c b/drivers/scsi/scsi_scan.c
index aa13feb17c62..de7e503bfcab 100644
--- a/drivers/scsi/scsi_scan.c
+++ b/drivers/scsi/scsi_scan.c
@@ -509,7 +509,14 @@ static struct scsi_target *scsi_alloc_target(struct device *parent,
      device_initialize(dev);
      kref_init(&starget->reap_ref);
      dev->parent = get_device(parent);
-    dev_set_name(dev, "target%d:%d:%d", shost->host_no, channel, id);
+    error = dev_set_name(dev, "target%d:%d:%d", shost->host_no, channel, id);
+    if (error) {
+        dev_err(dev, "%s: dev_set_name failed, error %d\n", __func__, error);

Ironically dev_err() is used, but the dev name could not be set. And this dev has no init_name. So how does the print look in practice?

+        put_device(parent);
+        put_device(dev);
+        kfree(starget);
+        return NULL;
+    }
      dev->bus = &scsi_bus_type;
      dev->type = &scsi_target_type;
      scsi_enable_async_suspend(dev);

Thanks,
John




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [SCSI Target Devel]     [Linux SCSI Target Infrastructure]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Linux IIO]     [Samba]     [Device Mapper]

  Powered by Linux