From nobody Mon Feb 9 14:35:15 2026 Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0E66839FCE for ; Tue, 23 Dec 2025 06:30:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.169 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1766471430; cv=none; b=LGylyPx3Gl4124ASfbho4u2oqJDdLq5uuq1+K87A7hVkyj9YTtkKM8N1ceSE+BqJq0rrN3j03Y8ZAcSBIkjcYuz+0Uq+F/B08caaHi5x6VtxfBDPQR6+9j6AAs5L/jJDKzCsz9zcykIJkFJqCowOnV3i0M4EbnVGDOmkyN/rU9I= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1766471430; c=relaxed/simple; bh=UOwytaD1y1ivrxR36EtXG7k6vUSMWBbdELoZYS/80io=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=N/lCLsAI3rC3lg04bfRDHADRgORml19MkgilcoWYDdESPlURypU1eEvCFRAoFwDVyF0GqDw3pMuAOxzrYaqMDm7WA6+BPOQ3fUoYDmeUbow9rRjZVnGZBoTW4y2LYf7YwEyptCukYVugSrHQl9ZChrhBvwYq5IQYQf0l4PdeVpw= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=cse.iitm.ac.in; spf=pass smtp.mailfrom=cse.iitm.ac.in; dkim=pass (2048-bit key) header.d=cse-iitm-ac-in.20230601.gappssmtp.com header.i=@cse-iitm-ac-in.20230601.gappssmtp.com header.b=NsQLe06q; arc=none smtp.client-ip=209.85.214.169 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=cse.iitm.ac.in Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=cse.iitm.ac.in Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=cse-iitm-ac-in.20230601.gappssmtp.com header.i=@cse-iitm-ac-in.20230601.gappssmtp.com header.b="NsQLe06q" Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-2a1388cdac3so44198375ad.0 for ; Mon, 22 Dec 2025 22:30:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cse-iitm-ac-in.20230601.gappssmtp.com; s=20230601; t=1766471426; x=1767076226; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=txAko9zSpGY/XVp6x32IGp3T6LuAmbYnWNpv6bzw+e0=; b=NsQLe06quPlxn1aj3i75rRZHkx2ViwWIeW0sdVpN03nK1qKQz9h89lmExZNqnEae9H uGrc30SOhPThzEhMdG6GuOY189xRy+K4Va1K8HRTfe7JXPzGuZxYsx8D6S6ZC9wzEMzK oG/HN2iEFjKu+/GmMS0V+e2g+vpzIBoUEz+H0cDzakdh4wWAiEjrrbNNop3DoRbn3qux WrBvswHWG+lQVkDZphdqfd3AktBMuwRi3vJdje6Zv9Y+nP8Pt9wdvRjdqYt05m6Y+cHl T56Y1QN5KO2ZPkhxQXo+I0/XTSg6cEiZKf7lEfDiMBuOKc1BI4z38qgVvrfOpGTUt8dc lBXQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1766471426; x=1767076226; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=txAko9zSpGY/XVp6x32IGp3T6LuAmbYnWNpv6bzw+e0=; b=IvlzixuzRCbrGWk6NvHZMyrjbchpuLqTPfdvNKVKfhtwa0gASQ8fmJe/SvcLbCUXD3 JXgzpcYyTdOJAn/w+PYBWMelmDO6vU6AtscvJP1CRfXVSKkVXdM4b6bVFjNvJpVm9onX KAh3oApH0j3AGdGNimiuPWvkUbEavtRifXPDFfoTHVIxvcr5cO/qTrnHZaZygQTXeMNo hQ/YgDQJAqKOFRgTGlbKuQ0AacUMvTE9hw2/8UGypCkw7h8dX/7Lcr2tfRZXzX5bL2SJ uUNEVqN1QQKdxUM97kVKiY9DVTCjNxnWi6cTRXecwm4NXtpom25ctU5Ju4HtjbSK+yeh FyBw== X-Forwarded-Encrypted: i=1; AJvYcCUgxtL/oA2sbPHAkMBc0mcPt/ayv20/BjVZipu74c7zaLSnIsfAbBDjyfw9v8nYHl5TZL/ILpA9v+ar1HQ=@vger.kernel.org X-Gm-Message-State: AOJu0YwOiwSCPLRqWVYsNq1RMhcipa3GLzFz2Yi6rIVFs9K2RUPqNrwZ kD8MLBnjK3KGUG4uB13f5aQWpVa508gcvPY8EYEN6EG5Tty/67ktSjjFjs8U1JQOyng= X-Gm-Gg: AY/fxX4OIYv7c+FK4NFdAM0F4lZ2599GJG3Vs4hc3AcK2pgMrpRvWaLJiGo/K8hDslG GRQAs8h4tK5MNqTg7ILAoy/wWXoZqJfT0OIEk/HNiA5Ci6YpTug7Yi0HLdrZ+nTN0xQIsSL6xm+ FeC2WPat+2ZKUdMv2rPsFu4NAnOTNVdhzFVOl3g7aLcqyTZZOOkc3hHib2B30OMBk7ilpDOVjjA ipLgZBXLCY7coilRblW+Ps5xx3xe1YpUbP5cDfleyME4jo6l+zgW7Of0c11LRaVImY0SJuD1Y2s zZ81tndRqlqPKJTu4mXdEeRwImgKOemvaU9dXjqPjltdkRcnlxMJi6RFsbpU5y5BLHiflGBxQ3M 4RKpJA8CNO5tASirwk8GQZl3B8VyqD2VxLEmt3nzIM/2VlliPjAvVbD8Lbd22VqVhnC8OaE7xk5 7AugzqmOq3RAXjTIGIJserEpga X-Google-Smtp-Source: AGHT+IGgb03I6lSiPUZBtWVnd1QchQMvNYrRHjdG4XZUhFVdzG/yKL5vDYSme6j4qe45ab0hfvjdeQ== X-Received: by 2002:a17:903:2a8e:b0:290:ac36:2ed6 with SMTP id d9443c01a7336-2a2f2426c79mr137786605ad.14.1766471426463; Mon, 22 Dec 2025 22:30:26 -0800 (PST) Received: from localhost.localdomain ([103.158.43.19]) by smtp.googlemail.com with ESMTPSA id d9443c01a7336-2a2f3d5d32dsm116266405ad.70.2025.12.22.22.30.22 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 22 Dec 2025 22:30:26 -0800 (PST) From: Abdun Nihaal To: jgross@suse.com Cc: Abdun Nihaal , sstabellini@kernel.org, oleksandr_tyshchenko@epam.com, linux-scsi@vger.kernel.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: [PATCH] xen/scsiback: fix potential memory leak in scsiback_remove() Date: Tue, 23 Dec 2025 12:00:11 +0530 Message-ID: <20251223063012.119035-1-nihaal@cse.iitm.ac.in> X-Mailer: git-send-email 2.43.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Memory allocated for struct vscsiblk_info in scsiback_probe() is not freed in scsiback_remove() leading to potential memory leaks on remove, as well as in the scsiback_probe() error paths. Fix that by freeing it in scsiback_remove(). Cc: stable@vger.kernel.org Fixes: d9d660f6e562 ("xen-scsiback: Add Xen PV SCSI backend driver") Signed-off-by: Abdun Nihaal Reviewed-by: Juergen Gross --- Compile tested only. Issue found using static analysis. drivers/xen/xen-scsiback.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/xen/xen-scsiback.c b/drivers/xen/xen-scsiback.c index 0c51edfd13dc..7d5117e5efe0 100644 --- a/drivers/xen/xen-scsiback.c +++ b/drivers/xen/xen-scsiback.c @@ -1262,6 +1262,7 @@ static void scsiback_remove(struct xenbus_device *dev) gnttab_page_cache_shrink(&info->free_pages, 0); =20 dev_set_drvdata(&dev->dev, NULL); + kfree(info); } =20 static int scsiback_probe(struct xenbus_device *dev, --=20 2.43.0