* [syzbot] [usb?] memory leak in hub_event (4)
@ 2026-04-25 2:12 syzbot
2026-04-27 11:40 ` Oliver Neukum
` (2 more replies)
0 siblings, 3 replies; 16+ messages in thread
From: syzbot @ 2026-04-25 2:12 UTC (permalink / raw)
To: gregkh, linux-kernel, linux-usb, syzkaller-bugs
Hello,
syzbot found the following issue on:
HEAD commit: dd6c438c3e64 Merge tag 'vfs-7.1-rc1.fixes' of git://git.ke..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=15cf7702580000
kernel config: https://syzkaller.appspot.com/x/.config?x=ac5083db84233db3
dashboard link: https://syzkaller.appspot.com/bug?extid=2afd7e71155c7e241560
compiler: gcc (Debian 14.2.0-19) 14.2.0, GNU ld (GNU Binutils for Debian) 2.44
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=13cf7702580000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=17941c36580000
Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/dea6ab846ab3/disk-dd6c438c.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/acebe380aa03/vmlinux-dd6c438c.xz
kernel image: https://storage.googleapis.com/syzbot-assets/2cdbd012d0d3/bzImage-dd6c438c.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+2afd7e71155c7e241560@syzkaller.appspotmail.com
BUG: memory leak
unreferenced object 0xffff8881277dc000 (size 2048):
comm "kworker/0:2", pid 1783, jiffies 4294946784
hex dump (first 32 bytes):
ff ff ff ff 31 00 00 00 00 00 00 00 00 00 00 00 ....1...........
00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 ................
backtrace (crc 20105372):
kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
slab_post_alloc_hook mm/slub.c:4574 [inline]
slab_alloc_node mm/slub.c:4898 [inline]
__kmalloc_cache_noprof+0x371/0x480 mm/slub.c:5410
kmalloc_noprof include/linux/slab.h:950 [inline]
kzalloc_noprof include/linux/slab.h:1188 [inline]
usb_alloc_dev+0x36/0x4e0 drivers/usb/core/usb.c:651
hub_port_connect drivers/usb/core/hub.c:5470 [inline]
hub_port_connect_change drivers/usb/core/hub.c:5707 [inline]
port_event drivers/usb/core/hub.c:5871 [inline]
hub_event+0x14d0/0x2180 drivers/usb/core/hub.c:5953
process_one_work+0x277/0x5b0 kernel/workqueue.c:3302
process_scheduled_works kernel/workqueue.c:3385 [inline]
worker_thread+0x255/0x4a0 kernel/workqueue.c:3466
kthread+0x14e/0x1a0 kernel/kthread.c:436
ret_from_fork+0x219/0x490 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
BUG: memory leak
unreferenced object 0xffff888128b06c00 (size 1024):
comm "kworker/0:2", pid 1783, jiffies 4294946815
hex dump (first 32 bytes):
09 02 49 00 02 01 00 10 40 00 00 00 00 00 00 00 ..I.....@.......
00 00 00 00 00 00 00 00 89 b8 69 09 81 88 ff ff ..........i.....
backtrace (crc b43c3ef8):
kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
slab_post_alloc_hook mm/slub.c:4574 [inline]
slab_alloc_node mm/slub.c:4898 [inline]
__do_kmalloc_node mm/slub.c:5294 [inline]
__kmalloc_noprof+0x3b7/0x550 mm/slub.c:5307
kmalloc_noprof include/linux/slab.h:954 [inline]
kzalloc_noprof include/linux/slab.h:1188 [inline]
usb_get_configuration+0xeb/0x2110 drivers/usb/core/config.c:940
usb_enumerate_device drivers/usb/core/hub.c:2527 [inline]
usb_new_device+0x1b4/0x300 drivers/usb/core/hub.c:2665
hub_port_connect drivers/usb/core/hub.c:5567 [inline]
hub_port_connect_change drivers/usb/core/hub.c:5707 [inline]
port_event drivers/usb/core/hub.c:5871 [inline]
hub_event+0x1723/0x2180 drivers/usb/core/hub.c:5953
process_one_work+0x277/0x5b0 kernel/workqueue.c:3302
process_scheduled_works kernel/workqueue.c:3385 [inline]
worker_thread+0x255/0x4a0 kernel/workqueue.c:3466
kthread+0x14e/0x1a0 kernel/kthread.c:436
ret_from_fork+0x219/0x490 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
BUG: memory leak
unreferenced object 0xffff88810c3d5a50 (size 8):
comm "kworker/0:2", pid 1783, jiffies 4294946815
hex dump (first 8 bytes):
80 b8 69 09 81 88 ff ff ..i.....
backtrace (crc 66af3167):
kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
slab_post_alloc_hook mm/slub.c:4574 [inline]
slab_alloc_node mm/slub.c:4898 [inline]
__do_kmalloc_node mm/slub.c:5294 [inline]
__kmalloc_noprof+0x3b7/0x550 mm/slub.c:5307
kmalloc_noprof include/linux/slab.h:954 [inline]
kzalloc_noprof include/linux/slab.h:1188 [inline]
usb_get_configuration+0x11d/0x2110 drivers/usb/core/config.c:945
usb_enumerate_device drivers/usb/core/hub.c:2527 [inline]
usb_new_device+0x1b4/0x300 drivers/usb/core/hub.c:2665
hub_port_connect drivers/usb/core/hub.c:5567 [inline]
hub_port_connect_change drivers/usb/core/hub.c:5707 [inline]
port_event drivers/usb/core/hub.c:5871 [inline]
hub_event+0x1723/0x2180 drivers/usb/core/hub.c:5953
process_one_work+0x277/0x5b0 kernel/workqueue.c:3302
process_scheduled_works kernel/workqueue.c:3385 [inline]
worker_thread+0x255/0x4a0 kernel/workqueue.c:3466
kthread+0x14e/0x1a0 kernel/kthread.c:436
ret_from_fork+0x219/0x490 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
BUG: memory leak
unreferenced object 0xffff888113c25840 (size 64):
comm "kworker/0:2", pid 1783, jiffies 4294946817
hex dump (first 32 bytes):
01 00 00 00 01 00 00 00 09 04 00 00 00 01 01 30 ...............0
00 00 00 00 0a 00 00 00 9a b8 69 09 81 88 ff ff ..........i.....
backtrace (crc a90fa323):
kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
slab_post_alloc_hook mm/slub.c:4574 [inline]
slab_alloc_node mm/slub.c:4898 [inline]
__do_kmalloc_node mm/slub.c:5294 [inline]
__kmalloc_noprof+0x3b7/0x550 mm/slub.c:5307
kmalloc_noprof include/linux/slab.h:954 [inline]
kzalloc_noprof include/linux/slab.h:1188 [inline]
usb_parse_configuration drivers/usb/core/config.c:826 [inline]
usb_get_configuration+0x88f/0x2110 drivers/usb/core/config.c:1002
usb_enumerate_device drivers/usb/core/hub.c:2527 [inline]
usb_new_device+0x1b4/0x300 drivers/usb/core/hub.c:2665
hub_port_connect drivers/usb/core/hub.c:5567 [inline]
hub_port_connect_change drivers/usb/core/hub.c:5707 [inline]
port_event drivers/usb/core/hub.c:5871 [inline]
hub_event+0x1723/0x2180 drivers/usb/core/hub.c:5953
process_one_work+0x277/0x5b0 kernel/workqueue.c:3302
process_scheduled_works kernel/workqueue.c:3385 [inline]
worker_thread+0x255/0x4a0 kernel/workqueue.c:3466
kthread+0x14e/0x1a0 kernel/kthread.c:436
ret_from_fork+0x219/0x490 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
BUG: memory leak
unreferenced object 0xffff88811d54a500 (size 256):
comm "kworker/0:2", pid 1783, jiffies 4294946821
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 08 a5 54 1d 81 88 ff ff ..........T.....
08 a5 54 1d 81 88 ff ff 20 e7 41 83 ff ff ff ff ..T..... .A.....
backtrace (crc 85d09f91):
kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
slab_post_alloc_hook mm/slub.c:4574 [inline]
slab_alloc_node mm/slub.c:4898 [inline]
__kmalloc_cache_noprof+0x371/0x480 mm/slub.c:5410
kmalloc_noprof include/linux/slab.h:950 [inline]
kzalloc_noprof include/linux/slab.h:1188 [inline]
device_private_init drivers/base/core.c:3536 [inline]
device_add+0x73c/0xc70 drivers/base/core.c:3587
usb_new_device.cold+0x115/0x626 drivers/usb/core/hub.c:2695
hub_port_connect drivers/usb/core/hub.c:5567 [inline]
hub_port_connect_change drivers/usb/core/hub.c:5707 [inline]
port_event drivers/usb/core/hub.c:5871 [inline]
hub_event+0x1723/0x2180 drivers/usb/core/hub.c:5953
process_one_work+0x277/0x5b0 kernel/workqueue.c:3302
process_scheduled_works kernel/workqueue.c:3385 [inline]
worker_thread+0x255/0x4a0 kernel/workqueue.c:3466
kthread+0x14e/0x1a0 kernel/kthread.c:436
ret_from_fork+0x219/0x490 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
connection error: failed to recv *flatrpc.ExecutorMessageRawT: EOF
---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title
If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.
If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)
If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report
If you want to undo deduplication, reply with:
#syz undup
^ permalink raw reply [flat|nested] 16+ messages in thread* Re: [syzbot] [usb?] memory leak in hub_event (4) 2026-04-25 2:12 [syzbot] [usb?] memory leak in hub_event (4) syzbot @ 2026-04-27 11:40 ` Oliver Neukum 2026-04-27 12:37 ` syzbot 2026-04-27 14:19 ` Alan Stern 2026-04-29 10:42 ` [PATCH] usb: core: hcd: fix possible deadlock in rh control transfers Oliver Neukum 2026-04-29 10:45 ` [PATCH] sound: usb: caiaq: fix reference leak in probe error Oliver Neukum 2 siblings, 2 replies; 16+ messages in thread From: Oliver Neukum @ 2026-04-27 11:40 UTC (permalink / raw) To: syzbot, gregkh, linux-kernel, linux-usb, syzkaller-bugs [-- Attachment #1: Type: text/plain, Size: 81 bytes --] On 25.04.26 04:12, syzbot wrote: #syz test: git://repo/address.git dd6c438c3e64 [-- Attachment #2: 0001-usb-core-fix-memory-of-error-case-in-usb_get_configu.patch --] [-- Type: text/x-patch, Size: 1527 bytes --] From 001175f4d2e1c2ceac98b4af2521fc4d0253d0c8 Mon Sep 17 00:00:00 2001 From: Oliver Neukum <oneukum@suse.com> Date: Mon, 27 Apr 2026 13:35:38 +0200 Subject: [PATCH] usb: core: fix memory of error case in usb_get_configuration Prior allocations need to be reversed if subsequent allocations fail. Fixes: dd2057e544dc9 ("USB: core: drop OOM message") Signed-off-by: Oliver Neukum <oneukum@suse.com> Reported-by: syzbot+2afd7e71155c7e241560@syzkaller.appspotmail.com --- drivers/usb/core/config.c | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-) diff --git a/drivers/usb/core/config.c b/drivers/usb/core/config.c index 417140b012bb..67475ff81641 100644 --- a/drivers/usb/core/config.c +++ b/drivers/usb/core/config.c @@ -944,11 +944,11 @@ int usb_get_configuration(struct usb_device *dev) length = ncfg * sizeof(char *); dev->rawdescriptors = kzalloc(length, GFP_KERNEL); if (!dev->rawdescriptors) - return -ENOMEM; + goto bailout2; desc = kmalloc(USB_DT_CONFIG_SIZE, GFP_KERNEL); if (!desc) - return -ENOMEM; + goto bailout; for (cfgno = 0; cfgno < ncfg; cfgno++) { /* We grab just the first descriptor so we know how long @@ -1012,6 +1012,15 @@ int usb_get_configuration(struct usb_device *dev) dev->descriptor.bNumConfigurations = cfgno; return result; + +bailout: + kfree(dev->rawdescriptors); + dev->rawdescriptors = NULL; +bailout2: + kfree(dev->config); + dev->config = NULL; + + return -ENOMEM; } void usb_release_bos_descriptor(struct usb_device *dev) -- 2.54.0 ^ permalink raw reply related [flat|nested] 16+ messages in thread
* Re: [syzbot] [usb?] memory leak in hub_event (4) 2026-04-27 11:40 ` Oliver Neukum @ 2026-04-27 12:37 ` syzbot 2026-04-27 14:19 ` Alan Stern 1 sibling, 0 replies; 16+ messages in thread From: syzbot @ 2026-04-27 12:37 UTC (permalink / raw) To: gregkh, linux-kernel, linux-usb, oneukum, syzkaller-bugs Hello, syzbot tried to test the proposed patch but the build/boot failed: failed to checkout kernel repo git://repo/address.git on commit dd6c438c3e64: failed to run ["git" "fetch" "--force" "--tags" "b7cf8f2fbfc36c709a08e0b9c77990e491473738"]: exit status 128 Tested on: commit: [unknown git tree: git://repo/address.git dd6c438c3e64 kernel config: https://syzkaller.appspot.com/x/.config?x=ac5083db84233db3 dashboard link: https://syzkaller.appspot.com/bug?extid=2afd7e71155c7e241560 compiler: patch: https://syzkaller.appspot.com/x/patch.diff?x=1575b236580000 ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [syzbot] [usb?] memory leak in hub_event (4) 2026-04-27 11:40 ` Oliver Neukum 2026-04-27 12:37 ` syzbot @ 2026-04-27 14:19 ` Alan Stern 2026-04-28 11:33 ` Oliver Neukum 1 sibling, 1 reply; 16+ messages in thread From: Alan Stern @ 2026-04-27 14:19 UTC (permalink / raw) To: Oliver Neukum; +Cc: syzbot, gregkh, linux-kernel, linux-usb, syzkaller-bugs On Mon, Apr 27, 2026 at 01:40:02PM +0200, Oliver Neukum wrote: > On 25.04.26 04:12, syzbot wrote: > > #syz test: git://repo/address.git dd6c438c3e64 > From 001175f4d2e1c2ceac98b4af2521fc4d0253d0c8 Mon Sep 17 00:00:00 2001 > From: Oliver Neukum <oneukum@suse.com> > Date: Mon, 27 Apr 2026 13:35:38 +0200 > Subject: [PATCH] usb: core: fix memory of error case in usb_get_configuration > > Prior allocations need to be reversed if subsequent > allocations fail. > > Fixes: dd2057e544dc9 ("USB: core: drop OOM message") > Signed-off-by: Oliver Neukum <oneukum@suse.com> > Reported-by: syzbot+2afd7e71155c7e241560@syzkaller.appspotmail.com > --- > drivers/usb/core/config.c | 13 +++++++++++-- > 1 file changed, 11 insertions(+), 2 deletions(-) > > diff --git a/drivers/usb/core/config.c b/drivers/usb/core/config.c > index 417140b012bb..67475ff81641 100644 > --- a/drivers/usb/core/config.c > +++ b/drivers/usb/core/config.c > @@ -944,11 +944,11 @@ int usb_get_configuration(struct usb_device *dev) > length = ncfg * sizeof(char *); > dev->rawdescriptors = kzalloc(length, GFP_KERNEL); > if (!dev->rawdescriptors) > - return -ENOMEM; > + goto bailout2; > > desc = kmalloc(USB_DT_CONFIG_SIZE, GFP_KERNEL); > if (!desc) > - return -ENOMEM; > + goto bailout; > > for (cfgno = 0; cfgno < ncfg; cfgno++) { > /* We grab just the first descriptor so we know how long > @@ -1012,6 +1012,15 @@ int usb_get_configuration(struct usb_device *dev) > dev->descriptor.bNumConfigurations = cfgno; > > return result; > + > +bailout: > + kfree(dev->rawdescriptors); > + dev->rawdescriptors = NULL; > +bailout2: > + kfree(dev->config); > + dev->config = NULL; > + > + return -ENOMEM; > } This is not needed. dev->rawdescriptors and dev->config are deallocated in usb_destroy_configuration(), which gets called when the usb_device structure is released. The memory leak must have a different cause. Alan Stern ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [syzbot] [usb?] memory leak in hub_event (4) 2026-04-27 14:19 ` Alan Stern @ 2026-04-28 11:33 ` Oliver Neukum 2026-04-28 15:12 ` Alan Stern 0 siblings, 1 reply; 16+ messages in thread From: Oliver Neukum @ 2026-04-28 11:33 UTC (permalink / raw) To: Alan Stern; +Cc: syzbot, gregkh, linux-kernel, linux-usb, syzkaller-bugs On 27.04.26 16:19, Alan Stern wrote: > This is not needed. dev->rawdescriptors and dev->config are deallocated > in usb_destroy_configuration(), which gets called when the usb_device > structure is released. > > The memory leak must have a different cause. You are correct. Yet I can see no way for usb_destroy_configuration() to not run. Hence we must be overlooking something. Regards Oliver ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [syzbot] [usb?] memory leak in hub_event (4) 2026-04-28 11:33 ` Oliver Neukum @ 2026-04-28 15:12 ` Alan Stern 0 siblings, 0 replies; 16+ messages in thread From: Alan Stern @ 2026-04-28 15:12 UTC (permalink / raw) To: Oliver Neukum; +Cc: syzbot, gregkh, linux-kernel, linux-usb, syzkaller-bugs On Tue, Apr 28, 2026 at 01:33:20PM +0200, Oliver Neukum wrote: > > > On 27.04.26 16:19, Alan Stern wrote: > > This is not needed. dev->rawdescriptors and dev->config are deallocated > > in usb_destroy_configuration(), which gets called when the usb_device > > structure is released. > > > > The memory leak must have a different cause. > > You are correct. Yet I can see no way for usb_destroy_configuration() > to not run. Hence we must be overlooking something. Maybe the usb_device structures are not being released at all. For instance, the snd_usb_audio or snd_usb_caiaq driver may forget to drop a reference in an error pathway. It seems odd that the bug report says there are 5 suspected memory leaks right after 5 devices have disconnected, yet the tracebacks are for different size allocations, implying that they all refer to the same device (i.e., not the same allocation for each of the 5 devices). But it could just be a coincidence. Alan Stern ^ permalink raw reply [flat|nested] 16+ messages in thread
* [PATCH] usb: core: hcd: fix possible deadlock in rh control transfers 2026-04-25 2:12 [syzbot] [usb?] memory leak in hub_event (4) syzbot 2026-04-27 11:40 ` Oliver Neukum @ 2026-04-29 10:42 ` Oliver Neukum 2026-04-29 19:04 ` Alan Stern 2026-04-29 10:45 ` [PATCH] sound: usb: caiaq: fix reference leak in probe error Oliver Neukum 2 siblings, 1 reply; 16+ messages in thread From: Oliver Neukum @ 2026-04-29 10:42 UTC (permalink / raw) To: syzbot+2afd7e71155c7e241560; +Cc: linux-usb, tiwai, Oliver Neukum From within the SCSI error handler memory allocations must not trigger IO. Handling errors in UAS and the storage driver may involve resetting a device. The thread doing the reset itself relies on VM magic. However, that is insufficient, as resetting a device involves resuming it. Resumption as well as resetting involves conrol transfers to the parent of the device to be reset. That may be a root hub. Hence usbcore must heed the flags passed to usb_submit_urb() processing control transfers to root hubs. The problem exist since the storage driver has been merged. Signed-off-by: Oliver Neukum <oneukum@suse.com> --- drivers/usb/core/hcd.c | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/drivers/usb/core/hcd.c b/drivers/usb/core/hcd.c index 89221f1ce769..29c74ed40526 100644 --- a/drivers/usb/core/hcd.c +++ b/drivers/usb/core/hcd.c @@ -448,7 +448,8 @@ rh_string(int id, struct usb_hcd const *hcd, u8 *data, unsigned len) /* Root hub control transfers execute synchronously */ -static int rh_call_control (struct usb_hcd *hcd, struct urb *urb) +static int rh_call_control(struct usb_hcd *hcd, + struct urb *urb, gfp_t mem_flags) { struct usb_ctrlrequest *cmd; u16 typeReq, wValue, wIndex, wLength; @@ -483,8 +484,8 @@ static int rh_call_control (struct usb_hcd *hcd, struct urb *urb) * tbuf should be at least as big as the * USB hub descriptor. */ - tbuf_size = max_t(u16, sizeof(struct usb_hub_descriptor), wLength); - tbuf = kzalloc(tbuf_size, GFP_KERNEL); + tbuf_size = max_t(u16, sizeof(struct usb_hub_descriptor), wLength); + tbuf = kzalloc(tbuf_size, mem_flags); if (!tbuf) { status = -ENOMEM; goto err_alloc; @@ -809,12 +810,13 @@ static int rh_queue_status (struct usb_hcd *hcd, struct urb *urb) return retval; } -static int rh_urb_enqueue (struct usb_hcd *hcd, struct urb *urb) +static int rh_urb_enqueue(struct usb_hcd *hcd, + struct urb *urb, gfp_t mem_flags) { if (usb_endpoint_xfer_int(&urb->ep->desc)) return rh_queue_status (hcd, urb); if (usb_endpoint_xfer_control(&urb->ep->desc)) - return rh_call_control (hcd, urb); + return rh_call_control(hcd, urb, mem_flags); return -EINVAL; } @@ -1535,7 +1537,7 @@ int usb_hcd_submit_urb (struct urb *urb, gfp_t mem_flags) */ if (is_root_hub(urb->dev)) { - status = rh_urb_enqueue(hcd, urb); + status = rh_urb_enqueue(hcd, urb, mem_flags); } else { status = map_urb_for_dma(hcd, urb, mem_flags); if (likely(status == 0)) { -- 2.54.0 ^ permalink raw reply related [flat|nested] 16+ messages in thread
* Re: [PATCH] usb: core: hcd: fix possible deadlock in rh control transfers 2026-04-29 10:42 ` [PATCH] usb: core: hcd: fix possible deadlock in rh control transfers Oliver Neukum @ 2026-04-29 19:04 ` Alan Stern 2026-04-29 19:13 ` Oliver Neukum 0 siblings, 1 reply; 16+ messages in thread From: Alan Stern @ 2026-04-29 19:04 UTC (permalink / raw) To: Oliver Neukum; +Cc: syzbot+2afd7e71155c7e241560, linux-usb, tiwai On Wed, Apr 29, 2026 at 12:42:06PM +0200, Oliver Neukum wrote: > From within the SCSI error handler memory allocations must not > trigger IO. Handling errors in UAS and the storage driver may > involve resetting a device. The thread doing the reset itself > relies on VM magic. However, that is insufficient, as resetting > a device involves resuming it. Resumption as well as resetting > involves conrol transfers to the parent of the device to be reset. > That may be a root hub. Hence usbcore must heed the flags passed > to usb_submit_urb() processing control transfers to root hubs. The SCSI core prevents devices from suspending while they are in use. If the error handler wants to do a reset (or if a USB transfer fails and the driver does a reset to recover), the device won't be in runtime suspend at the time, and so neither will its root hub. Besides, even if a resume was necessary, wouldn't the same VM magic that works for the reset thread also work for the resume? After all, they will be the same thread; the usb_autoresume_device() call in usb_reset_device() is synchronous and it is called after memalloc_noio_save(). Alan Stern ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH] usb: core: hcd: fix possible deadlock in rh control transfers 2026-04-29 19:04 ` Alan Stern @ 2026-04-29 19:13 ` Oliver Neukum 2026-04-29 19:18 ` Alan Stern 0 siblings, 1 reply; 16+ messages in thread From: Oliver Neukum @ 2026-04-29 19:13 UTC (permalink / raw) To: Alan Stern, Oliver Neukum; +Cc: linux-usb, tiwai On 29.04.26 21:04, Alan Stern wrote: > Besides, even if a resume was necessary, wouldn't the same VM magic that > works for the reset thread also work for the resume? After all, they They need not be the same thread. That is the point. usb_reset_device() does a resume. However, it is possible for this to race with another thread doing a resume or a suspend. In that case it will block and wait for another thread. Hence we essentially get priority inversion more or less. Regards Oliver ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH] usb: core: hcd: fix possible deadlock in rh control transfers 2026-04-29 19:13 ` Oliver Neukum @ 2026-04-29 19:18 ` Alan Stern 0 siblings, 0 replies; 16+ messages in thread From: Alan Stern @ 2026-04-29 19:18 UTC (permalink / raw) To: Oliver Neukum; +Cc: linux-usb, tiwai On Wed, Apr 29, 2026 at 09:13:59PM +0200, Oliver Neukum wrote: > On 29.04.26 21:04, Alan Stern wrote: > > > Besides, even if a resume was necessary, wouldn't the same VM magic that > > works for the reset thread also work for the resume? After all, they > > They need not be the same thread. That is the point. usb_reset_device() > does a resume. However, it is possible for this to race with another thread > doing a resume or a suspend. In that case it will block and wait for > another thread. Hence we essentially get priority inversion more or > less. Okay, I see. Good point. You should include this in the patch description. Alan Stern ^ permalink raw reply [flat|nested] 16+ messages in thread
* [PATCH] sound: usb: caiaq: fix reference leak in probe error 2026-04-25 2:12 [syzbot] [usb?] memory leak in hub_event (4) syzbot 2026-04-27 11:40 ` Oliver Neukum 2026-04-29 10:42 ` [PATCH] usb: core: hcd: fix possible deadlock in rh control transfers Oliver Neukum @ 2026-04-29 10:45 ` Oliver Neukum 2026-04-29 10:53 ` Takashi Iwai ` (3 more replies) 2 siblings, 4 replies; 16+ messages in thread From: Oliver Neukum @ 2026-04-29 10:45 UTC (permalink / raw) To: syzbot+2afd7e71155c7e241560; +Cc: linux-usb, tiwai, Oliver Neukum If probing a device fails early a reference to a device is leaked. Signed-off-by: Oliver Neukum <oneukum@suse.com> --- sound/usb/caiaq/device.c | 21 +++++++++++++++++---- 1 file changed, 17 insertions(+), 4 deletions(-) diff --git a/sound/usb/caiaq/device.c b/sound/usb/caiaq/device.c index 8af0c04041ee..1a9ddbdc2cd1 100644 --- a/sound/usb/caiaq/device.c +++ b/sound/usb/caiaq/device.c @@ -442,7 +442,8 @@ static int init_card(struct snd_usb_caiaqdev *cdev) if (usb_set_interface(usb_dev, 0, 1) != 0) { dev_err(dev, "can't set alt interface.\n"); - return -EIO; + err = -EIO; + goto dev_err_put; } usb_init_urb(&cdev->ep1_in_urb); @@ -462,14 +463,18 @@ static int init_card(struct snd_usb_caiaqdev *cdev) if (usb_urb_ep_type_check(&cdev->ep1_in_urb) || usb_urb_ep_type_check(&cdev->midi_out_urb)) { dev_err(dev, "invalid EPs\n"); - return -EINVAL; + err = -EINVAL; + goto dev_err_put; } init_waitqueue_head(&cdev->ep1_wait_queue); init_waitqueue_head(&cdev->prepare_wait_queue); - if (usb_submit_urb(&cdev->ep1_in_urb, GFP_KERNEL) != 0) - return -EIO; + if (usb_submit_urb(&cdev->ep1_in_urb, GFP_KERNEL) != 0) { + err = -EIO; + goto dev_err_put; + } + err = snd_usb_caiaq_send_command(cdev, EP1_CMD_GET_DEVICE_INFO, NULL, 0); if (err) @@ -520,6 +525,14 @@ static int init_card(struct snd_usb_caiaqdev *cdev) err_kill_urb: usb_kill_urb(&cdev->ep1_in_urb); + + /* + * private_free has not been set. + * Undoing the usb_get_dev() from + * create_card() + */ + err_dev_put: + usb_put_dev(usb_dev); return err; } -- 2.54.0 ^ permalink raw reply related [flat|nested] 16+ messages in thread
* Re: [PATCH] sound: usb: caiaq: fix reference leak in probe error 2026-04-29 10:45 ` [PATCH] sound: usb: caiaq: fix reference leak in probe error Oliver Neukum @ 2026-04-29 10:53 ` Takashi Iwai 2026-04-29 11:05 ` Oliver Neukum 2026-04-29 19:42 ` kernel test robot ` (2 subsequent siblings) 3 siblings, 1 reply; 16+ messages in thread From: Takashi Iwai @ 2026-04-29 10:53 UTC (permalink / raw) To: Oliver Neukum; +Cc: syzbot+2afd7e71155c7e241560, linux-usb, tiwai On Wed, 29 Apr 2026 12:45:24 +0200, Oliver Neukum wrote: > > If probing a device fails early a reference to a device > is leaked. > > Signed-off-by: Oliver Neukum <oneukum@suse.com> Thanks, but I believe it's been already fixed in my tree for 7.1-rc2: 7a5f1cd22d47f8ca4b760b6334378ae42c1bd24b ALSA: caiaq: fix usb_dev refcount leak on probe failure Also, there are a couple of fixes for caiaq queued for 7.1-rc2, too. Takashi > --- > sound/usb/caiaq/device.c | 21 +++++++++++++++++---- > 1 file changed, 17 insertions(+), 4 deletions(-) > > diff --git a/sound/usb/caiaq/device.c b/sound/usb/caiaq/device.c > index 8af0c04041ee..1a9ddbdc2cd1 100644 > --- a/sound/usb/caiaq/device.c > +++ b/sound/usb/caiaq/device.c > @@ -442,7 +442,8 @@ static int init_card(struct snd_usb_caiaqdev *cdev) > > if (usb_set_interface(usb_dev, 0, 1) != 0) { > dev_err(dev, "can't set alt interface.\n"); > - return -EIO; > + err = -EIO; > + goto dev_err_put; > } > > usb_init_urb(&cdev->ep1_in_urb); > @@ -462,14 +463,18 @@ static int init_card(struct snd_usb_caiaqdev *cdev) > if (usb_urb_ep_type_check(&cdev->ep1_in_urb) || > usb_urb_ep_type_check(&cdev->midi_out_urb)) { > dev_err(dev, "invalid EPs\n"); > - return -EINVAL; > + err = -EINVAL; > + goto dev_err_put; > } > > init_waitqueue_head(&cdev->ep1_wait_queue); > init_waitqueue_head(&cdev->prepare_wait_queue); > > - if (usb_submit_urb(&cdev->ep1_in_urb, GFP_KERNEL) != 0) > - return -EIO; > + if (usb_submit_urb(&cdev->ep1_in_urb, GFP_KERNEL) != 0) { > + err = -EIO; > + goto dev_err_put; > + } > + > > err = snd_usb_caiaq_send_command(cdev, EP1_CMD_GET_DEVICE_INFO, NULL, 0); > if (err) > @@ -520,6 +525,14 @@ static int init_card(struct snd_usb_caiaqdev *cdev) > > err_kill_urb: > usb_kill_urb(&cdev->ep1_in_urb); > + > + /* > + * private_free has not been set. > + * Undoing the usb_get_dev() from > + * create_card() > + */ > + err_dev_put: > + usb_put_dev(usb_dev); > return err; > } > > -- > 2.54.0 > ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH] sound: usb: caiaq: fix reference leak in probe error 2026-04-29 10:53 ` Takashi Iwai @ 2026-04-29 11:05 ` Oliver Neukum 0 siblings, 0 replies; 16+ messages in thread From: Oliver Neukum @ 2026-04-29 11:05 UTC (permalink / raw) To: Takashi Iwai, Oliver Neukum; +Cc: syzbot+2afd7e71155c7e241560, linux-usb, tiwai On 29.04.26 12:53, Takashi Iwai wrote: > On Wed, 29 Apr 2026 12:45:24 +0200, > Oliver Neukum wrote: >> >> If probing a device fails early a reference to a device >> is leaked. >> >> Signed-off-by: Oliver Neukum <oneukum@suse.com> > > Thanks, but I believe it's been already fixed in my tree for 7.1-rc2: > 7a5f1cd22d47f8ca4b760b6334378ae42c1bd24b > ALSA: caiaq: fix usb_dev refcount leak on probe failure > > Also, there are a couple of fixes for caiaq queued for 7.1-rc2, too. Very good. Such things happen. Regards Oliver ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH] sound: usb: caiaq: fix reference leak in probe error 2026-04-29 10:45 ` [PATCH] sound: usb: caiaq: fix reference leak in probe error Oliver Neukum 2026-04-29 10:53 ` Takashi Iwai @ 2026-04-29 19:42 ` kernel test robot 2026-04-30 5:33 ` kernel test robot 2026-04-30 11:02 ` kernel test robot 3 siblings, 0 replies; 16+ messages in thread From: kernel test robot @ 2026-04-29 19:42 UTC (permalink / raw) To: Oliver Neukum, syzbot+2afd7e71155c7e241560 Cc: oe-kbuild-all, linux-usb, tiwai, Oliver Neukum Hi Oliver, kernel test robot noticed the following build errors: [auto build test ERROR on tiwai-sound/for-next] [also build test ERROR on tiwai-sound/for-linus usb/usb-testing usb/usb-next usb/usb-linus westeri-thunderbolt/next peter-chen-usb/for-usb-next linus/master v7.1-rc1 next-20260429] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Oliver-Neukum/sound-usb-caiaq-fix-reference-leak-in-probe-error/20260429-205539 base: https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git for-next patch link: https://lore.kernel.org/r/20260429104527.19927-1-oneukum%40suse.com patch subject: [PATCH] sound: usb: caiaq: fix reference leak in probe error config: x86_64-rhel-9.4 (https://download.01.org/0day-ci/archive/20260429/202604292126.d4xbRC4p-lkp@intel.com/config) compiler: gcc-14 (Debian 14.2.0-19) 14.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20260429/202604292126.d4xbRC4p-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp@intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202604292126.d4xbRC4p-lkp@intel.com/ All error/warnings (new ones prefixed by >>): sound/usb/caiaq/device.c: In function 'init_card': >> sound/usb/caiaq/device.c:534:2: warning: label 'err_dev_put' defined but not used [-Wunused-label] 534 | err_dev_put: | ^~~~~~~~~~~ >> sound/usb/caiaq/device.c:475:17: error: label 'dev_err_put' used but not defined 475 | goto dev_err_put; | ^~~~ vim +/dev_err_put +475 sound/usb/caiaq/device.c 434 435 static int init_card(struct snd_usb_caiaqdev *cdev) 436 { 437 char *c, usbpath[32]; 438 struct usb_device *usb_dev = cdev->chip.dev; 439 struct snd_card *card = cdev->chip.card; 440 struct device *dev = caiaqdev_to_dev(cdev); 441 int err, len; 442 443 if (usb_set_interface(usb_dev, 0, 1) != 0) { 444 dev_err(dev, "can't set alt interface.\n"); 445 err = -EIO; 446 goto dev_err_put; 447 } 448 449 usb_init_urb(&cdev->ep1_in_urb); 450 usb_init_urb(&cdev->midi_out_urb); 451 452 usb_fill_bulk_urb(&cdev->ep1_in_urb, usb_dev, 453 usb_rcvbulkpipe(usb_dev, 0x1), 454 cdev->ep1_in_buf, EP1_BUFSIZE, 455 usb_ep1_command_reply_dispatch, cdev); 456 457 usb_fill_bulk_urb(&cdev->midi_out_urb, usb_dev, 458 usb_sndbulkpipe(usb_dev, 0x1), 459 cdev->midi_out_buf, EP1_BUFSIZE, 460 snd_usb_caiaq_midi_output_done, cdev); 461 462 /* sanity checks of EPs before actually submitting */ 463 if (usb_urb_ep_type_check(&cdev->ep1_in_urb) || 464 usb_urb_ep_type_check(&cdev->midi_out_urb)) { 465 dev_err(dev, "invalid EPs\n"); 466 err = -EINVAL; 467 goto dev_err_put; 468 } 469 470 init_waitqueue_head(&cdev->ep1_wait_queue); 471 init_waitqueue_head(&cdev->prepare_wait_queue); 472 473 if (usb_submit_urb(&cdev->ep1_in_urb, GFP_KERNEL) != 0) { 474 err = -EIO; > 475 goto dev_err_put; 476 } 477 478 479 err = snd_usb_caiaq_send_command(cdev, EP1_CMD_GET_DEVICE_INFO, NULL, 0); 480 if (err) 481 goto err_kill_urb; 482 483 if (!wait_event_timeout(cdev->ep1_wait_queue, cdev->spec_received, HZ)) { 484 err = -ENODEV; 485 goto err_kill_urb; 486 } 487 488 usb_string(usb_dev, usb_dev->descriptor.iManufacturer, 489 cdev->vendor_name, CAIAQ_USB_STR_LEN); 490 491 usb_string(usb_dev, usb_dev->descriptor.iProduct, 492 cdev->product_name, CAIAQ_USB_STR_LEN); 493 494 strscpy(card->driver, MODNAME, sizeof(card->driver)); 495 strscpy(card->shortname, cdev->product_name, sizeof(card->shortname)); 496 strscpy(card->mixername, cdev->product_name, sizeof(card->mixername)); 497 498 /* if the id was not passed as module option, fill it with a shortened 499 * version of the product string which does not contain any 500 * whitespaces */ 501 502 if (*card->id == '\0') { 503 char id[sizeof(card->id)]; 504 505 memset(id, 0, sizeof(id)); 506 507 for (c = card->shortname, len = 0; 508 *c && len < sizeof(card->id) - 1; c++) 509 if (*c != ' ') 510 id[len++] = *c; 511 512 snd_card_set_id(card, id); 513 } 514 515 usb_make_path(usb_dev, usbpath, sizeof(usbpath)); 516 scnprintf(card->longname, sizeof(card->longname), "%s %s (%s)", 517 cdev->vendor_name, cdev->product_name, usbpath); 518 519 card->private_free = card_free; 520 err = setup_card(cdev); 521 if (err < 0) 522 return err; 523 524 return 0; 525 526 err_kill_urb: 527 usb_kill_urb(&cdev->ep1_in_urb); 528 529 /* 530 * private_free has not been set. 531 * Undoing the usb_get_dev() from 532 * create_card() 533 */ > 534 err_dev_put: 535 usb_put_dev(usb_dev); 536 return err; 537 } 538 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH] sound: usb: caiaq: fix reference leak in probe error 2026-04-29 10:45 ` [PATCH] sound: usb: caiaq: fix reference leak in probe error Oliver Neukum 2026-04-29 10:53 ` Takashi Iwai 2026-04-29 19:42 ` kernel test robot @ 2026-04-30 5:33 ` kernel test robot 2026-04-30 11:02 ` kernel test robot 3 siblings, 0 replies; 16+ messages in thread From: kernel test robot @ 2026-04-30 5:33 UTC (permalink / raw) To: Oliver Neukum, syzbot+2afd7e71155c7e241560 Cc: oe-kbuild-all, linux-usb, tiwai, Oliver Neukum Hi Oliver, kernel test robot noticed the following build errors: [auto build test ERROR on tiwai-sound/for-next] [also build test ERROR on tiwai-sound/for-linus usb/usb-testing usb/usb-next usb/usb-linus westeri-thunderbolt/next peter-chen-usb/for-usb-next linus/master v7.1-rc1 next-20260429] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Oliver-Neukum/sound-usb-caiaq-fix-reference-leak-in-probe-error/20260429-205539 base: https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git for-next patch link: https://lore.kernel.org/r/20260429104527.19927-1-oneukum%40suse.com patch subject: [PATCH] sound: usb: caiaq: fix reference leak in probe error config: m68k-allmodconfig (https://download.01.org/0day-ci/archive/20260430/202604301315.U4YJaZc3-lkp@intel.com/config) compiler: m68k-linux-gcc (GCC) 15.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20260430/202604301315.U4YJaZc3-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp@intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202604301315.U4YJaZc3-lkp@intel.com/ All error/warnings (new ones prefixed by >>): sound/usb/caiaq/device.c: In function 'init_card': >> sound/usb/caiaq/device.c:534:2: warning: label 'err_dev_put' defined but not used [-Wunused-label] 534 | err_dev_put: | ^~~~~~~~~~~ >> sound/usb/caiaq/device.c:475:17: error: label 'dev_err_put' used but not defined 475 | goto dev_err_put; | ^~~~ vim +/dev_err_put +475 sound/usb/caiaq/device.c 434 435 static int init_card(struct snd_usb_caiaqdev *cdev) 436 { 437 char *c, usbpath[32]; 438 struct usb_device *usb_dev = cdev->chip.dev; 439 struct snd_card *card = cdev->chip.card; 440 struct device *dev = caiaqdev_to_dev(cdev); 441 int err, len; 442 443 if (usb_set_interface(usb_dev, 0, 1) != 0) { 444 dev_err(dev, "can't set alt interface.\n"); 445 err = -EIO; 446 goto dev_err_put; 447 } 448 449 usb_init_urb(&cdev->ep1_in_urb); 450 usb_init_urb(&cdev->midi_out_urb); 451 452 usb_fill_bulk_urb(&cdev->ep1_in_urb, usb_dev, 453 usb_rcvbulkpipe(usb_dev, 0x1), 454 cdev->ep1_in_buf, EP1_BUFSIZE, 455 usb_ep1_command_reply_dispatch, cdev); 456 457 usb_fill_bulk_urb(&cdev->midi_out_urb, usb_dev, 458 usb_sndbulkpipe(usb_dev, 0x1), 459 cdev->midi_out_buf, EP1_BUFSIZE, 460 snd_usb_caiaq_midi_output_done, cdev); 461 462 /* sanity checks of EPs before actually submitting */ 463 if (usb_urb_ep_type_check(&cdev->ep1_in_urb) || 464 usb_urb_ep_type_check(&cdev->midi_out_urb)) { 465 dev_err(dev, "invalid EPs\n"); 466 err = -EINVAL; 467 goto dev_err_put; 468 } 469 470 init_waitqueue_head(&cdev->ep1_wait_queue); 471 init_waitqueue_head(&cdev->prepare_wait_queue); 472 473 if (usb_submit_urb(&cdev->ep1_in_urb, GFP_KERNEL) != 0) { 474 err = -EIO; > 475 goto dev_err_put; 476 } 477 478 479 err = snd_usb_caiaq_send_command(cdev, EP1_CMD_GET_DEVICE_INFO, NULL, 0); 480 if (err) 481 goto err_kill_urb; 482 483 if (!wait_event_timeout(cdev->ep1_wait_queue, cdev->spec_received, HZ)) { 484 err = -ENODEV; 485 goto err_kill_urb; 486 } 487 488 usb_string(usb_dev, usb_dev->descriptor.iManufacturer, 489 cdev->vendor_name, CAIAQ_USB_STR_LEN); 490 491 usb_string(usb_dev, usb_dev->descriptor.iProduct, 492 cdev->product_name, CAIAQ_USB_STR_LEN); 493 494 strscpy(card->driver, MODNAME, sizeof(card->driver)); 495 strscpy(card->shortname, cdev->product_name, sizeof(card->shortname)); 496 strscpy(card->mixername, cdev->product_name, sizeof(card->mixername)); 497 498 /* if the id was not passed as module option, fill it with a shortened 499 * version of the product string which does not contain any 500 * whitespaces */ 501 502 if (*card->id == '\0') { 503 char id[sizeof(card->id)]; 504 505 memset(id, 0, sizeof(id)); 506 507 for (c = card->shortname, len = 0; 508 *c && len < sizeof(card->id) - 1; c++) 509 if (*c != ' ') 510 id[len++] = *c; 511 512 snd_card_set_id(card, id); 513 } 514 515 usb_make_path(usb_dev, usbpath, sizeof(usbpath)); 516 scnprintf(card->longname, sizeof(card->longname), "%s %s (%s)", 517 cdev->vendor_name, cdev->product_name, usbpath); 518 519 card->private_free = card_free; 520 err = setup_card(cdev); 521 if (err < 0) 522 return err; 523 524 return 0; 525 526 err_kill_urb: 527 usb_kill_urb(&cdev->ep1_in_urb); 528 529 /* 530 * private_free has not been set. 531 * Undoing the usb_get_dev() from 532 * create_card() 533 */ > 534 err_dev_put: 535 usb_put_dev(usb_dev); 536 return err; 537 } 538 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH] sound: usb: caiaq: fix reference leak in probe error 2026-04-29 10:45 ` [PATCH] sound: usb: caiaq: fix reference leak in probe error Oliver Neukum ` (2 preceding siblings ...) 2026-04-30 5:33 ` kernel test robot @ 2026-04-30 11:02 ` kernel test robot 3 siblings, 0 replies; 16+ messages in thread From: kernel test robot @ 2026-04-30 11:02 UTC (permalink / raw) To: Oliver Neukum, syzbot+2afd7e71155c7e241560 Cc: llvm, oe-kbuild-all, linux-usb, tiwai, Oliver Neukum Hi Oliver, kernel test robot noticed the following build errors: [auto build test ERROR on tiwai-sound/for-next] [also build test ERROR on tiwai-sound/for-linus usb/usb-testing usb/usb-next usb/usb-linus westeri-thunderbolt/next peter-chen-usb/for-usb-next linus/master v7.1-rc1 next-20260429] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Oliver-Neukum/sound-usb-caiaq-fix-reference-leak-in-probe-error/20260429-205539 base: https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git for-next patch link: https://lore.kernel.org/r/20260429104527.19927-1-oneukum%40suse.com patch subject: [PATCH] sound: usb: caiaq: fix reference leak in probe error config: x86_64-rhel-9.4-rust (https://download.01.org/0day-ci/archive/20260430/202604301817.kEsyTIz2-lkp@intel.com/config) compiler: clang version 20.1.8 (https://github.com/llvm/llvm-project 87f0227cb60147a26a1eeb4fb06e3b505e9c7261) rustc: rustc 1.88.0 (6b00bc388 2025-06-23) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20260430/202604301817.kEsyTIz2-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp@intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202604301817.kEsyTIz2-lkp@intel.com/ All error/warnings (new ones prefixed by >>): >> sound/usb/caiaq/device.c:446:8: error: use of undeclared label 'dev_err_put' 446 | goto dev_err_put; | ^ >> sound/usb/caiaq/device.c:534:2: warning: unused label 'err_dev_put' [-Wunused-label] 534 | err_dev_put: | ^~~~~~~~~~~~ 1 warning and 1 error generated. vim +/dev_err_put +446 sound/usb/caiaq/device.c 434 435 static int init_card(struct snd_usb_caiaqdev *cdev) 436 { 437 char *c, usbpath[32]; 438 struct usb_device *usb_dev = cdev->chip.dev; 439 struct snd_card *card = cdev->chip.card; 440 struct device *dev = caiaqdev_to_dev(cdev); 441 int err, len; 442 443 if (usb_set_interface(usb_dev, 0, 1) != 0) { 444 dev_err(dev, "can't set alt interface.\n"); 445 err = -EIO; > 446 goto dev_err_put; 447 } 448 449 usb_init_urb(&cdev->ep1_in_urb); 450 usb_init_urb(&cdev->midi_out_urb); 451 452 usb_fill_bulk_urb(&cdev->ep1_in_urb, usb_dev, 453 usb_rcvbulkpipe(usb_dev, 0x1), 454 cdev->ep1_in_buf, EP1_BUFSIZE, 455 usb_ep1_command_reply_dispatch, cdev); 456 457 usb_fill_bulk_urb(&cdev->midi_out_urb, usb_dev, 458 usb_sndbulkpipe(usb_dev, 0x1), 459 cdev->midi_out_buf, EP1_BUFSIZE, 460 snd_usb_caiaq_midi_output_done, cdev); 461 462 /* sanity checks of EPs before actually submitting */ 463 if (usb_urb_ep_type_check(&cdev->ep1_in_urb) || 464 usb_urb_ep_type_check(&cdev->midi_out_urb)) { 465 dev_err(dev, "invalid EPs\n"); 466 err = -EINVAL; 467 goto dev_err_put; 468 } 469 470 init_waitqueue_head(&cdev->ep1_wait_queue); 471 init_waitqueue_head(&cdev->prepare_wait_queue); 472 473 if (usb_submit_urb(&cdev->ep1_in_urb, GFP_KERNEL) != 0) { 474 err = -EIO; 475 goto dev_err_put; 476 } 477 478 479 err = snd_usb_caiaq_send_command(cdev, EP1_CMD_GET_DEVICE_INFO, NULL, 0); 480 if (err) 481 goto err_kill_urb; 482 483 if (!wait_event_timeout(cdev->ep1_wait_queue, cdev->spec_received, HZ)) { 484 err = -ENODEV; 485 goto err_kill_urb; 486 } 487 488 usb_string(usb_dev, usb_dev->descriptor.iManufacturer, 489 cdev->vendor_name, CAIAQ_USB_STR_LEN); 490 491 usb_string(usb_dev, usb_dev->descriptor.iProduct, 492 cdev->product_name, CAIAQ_USB_STR_LEN); 493 494 strscpy(card->driver, MODNAME, sizeof(card->driver)); 495 strscpy(card->shortname, cdev->product_name, sizeof(card->shortname)); 496 strscpy(card->mixername, cdev->product_name, sizeof(card->mixername)); 497 498 /* if the id was not passed as module option, fill it with a shortened 499 * version of the product string which does not contain any 500 * whitespaces */ 501 502 if (*card->id == '\0') { 503 char id[sizeof(card->id)]; 504 505 memset(id, 0, sizeof(id)); 506 507 for (c = card->shortname, len = 0; 508 *c && len < sizeof(card->id) - 1; c++) 509 if (*c != ' ') 510 id[len++] = *c; 511 512 snd_card_set_id(card, id); 513 } 514 515 usb_make_path(usb_dev, usbpath, sizeof(usbpath)); 516 scnprintf(card->longname, sizeof(card->longname), "%s %s (%s)", 517 cdev->vendor_name, cdev->product_name, usbpath); 518 519 card->private_free = card_free; 520 err = setup_card(cdev); 521 if (err < 0) 522 return err; 523 524 return 0; 525 526 err_kill_urb: 527 usb_kill_urb(&cdev->ep1_in_urb); 528 529 /* 530 * private_free has not been set. 531 * Undoing the usb_get_dev() from 532 * create_card() 533 */ > 534 err_dev_put: 535 usb_put_dev(usb_dev); 536 return err; 537 } 538 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki ^ permalink raw reply [flat|nested] 16+ messages in thread
end of thread, other threads:[~2026-04-30 11:03 UTC | newest] Thread overview: 16+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2026-04-25 2:12 [syzbot] [usb?] memory leak in hub_event (4) syzbot 2026-04-27 11:40 ` Oliver Neukum 2026-04-27 12:37 ` syzbot 2026-04-27 14:19 ` Alan Stern 2026-04-28 11:33 ` Oliver Neukum 2026-04-28 15:12 ` Alan Stern 2026-04-29 10:42 ` [PATCH] usb: core: hcd: fix possible deadlock in rh control transfers Oliver Neukum 2026-04-29 19:04 ` Alan Stern 2026-04-29 19:13 ` Oliver Neukum 2026-04-29 19:18 ` Alan Stern 2026-04-29 10:45 ` [PATCH] sound: usb: caiaq: fix reference leak in probe error Oliver Neukum 2026-04-29 10:53 ` Takashi Iwai 2026-04-29 11:05 ` Oliver Neukum 2026-04-29 19:42 ` kernel test robot 2026-04-30 5:33 ` kernel test robot 2026-04-30 11:02 ` kernel test robot
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox