From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3BAC7C76196 for ; Sat, 1 Apr 2023 06:28:16 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229583AbjDAG2O (ORCPT ); Sat, 1 Apr 2023 02:28:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44676 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229529AbjDAG2O (ORCPT ); Sat, 1 Apr 2023 02:28:14 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 55DA91A474; Fri, 31 Mar 2023 23:28:13 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E9FBCB83377; Sat, 1 Apr 2023 06:28:11 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0C5D9C433D2; Sat, 1 Apr 2023 06:28:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1680330490; bh=xatQZvTKR+6MYzldJT4t1KTnJ8Rt57yUO7iWzD7aoXI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=LMLZ6EUpJUlprrJ92k1qJlGkhKVNz0V0GAQEwB+A8+k7hmzeMNiqB4K92+y5HiOu4 wlfk/kigArkH8zUukN0Z3pZhyIppU3QnOMm9uqj/Bw5pvJi73vyp9TBRNSXMbMhmPv ZtnAZdb2W5LCIT6uK67oO4n1arvi1cxiKcf4XuHA= Date: Sat, 1 Apr 2023 08:28:07 +0200 From: Greg KH To: Mirsad Goran Todorovac Cc: LKML , Thorsten Leemhuis , Maxim Levitsky , Alex Dubov , Ulf Hansson , Jens Axboe , Christophe JAILLET , Hannes Reinecke , Jiasheng Jiang , ye xingchen , linux-mmc@vger.kernel.org Subject: Re: BUG FIX: [PATCH RFC v3] memstick_check() memleak in kernel 6.1.0+ introduced pre 4.17 Message-ID: References: <7d873dd3-9bab-175b-8158-c458b61a7122@alu.unizg.hr> <2023033124-causing-cassette-4d96@gregkh> <4d80549f-e59d-6319-07fd-1fbed75d7a1c@alu.unizg.hr> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4d80549f-e59d-6319-07fd-1fbed75d7a1c@alu.unizg.hr> Precedence: bulk List-ID: X-Mailing-List: linux-mmc@vger.kernel.org On Sat, Apr 01, 2023 at 08:23:26AM +0200, Mirsad Goran Todorovac wrote: > > This patch is implying that anyone who calls "dev_set_name()" also has > > to do this hack, which shouldn't be the case at all. > > > > thanks, > > > > greg k-h > > This is my best guess. Unless there is dev_free_name() or kobject_free_name(), I don't > see a more sensible way to patch this up. In sleeping on this, I think this has to move to the driver core. I don't understand why we haven't seen this before, except maybe no one has really noticed before (i.e. we haven't had good leak detection tools that run with removable devices?) Anyway, let me see if I can come up with something this weekend, give me a chance... thanks, greg k-h