lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20260108090531.788192-1-zilin@seu.edu.cn>
Date: Thu,  8 Jan 2026 09:05:31 +0000
From: Zilin Guan <zilin@....edu.cn>
To: gregkh@...uxfoundation.org
Cc: jianhao.xu@....edu.cn,
	linux-kernel@...r.kernel.org,
	linux-usb@...r.kernel.org,
	mathias.nyman@...el.com,
	zilin@....edu.cn
Subject: Re: [PATCH] usb: xhci: Fix memory leak in xchi_disable_slot()

On Thu, Jan 08, 2026 at 06:42:51AM +0100, Greg KH wrote:
> As per our documentation, you need to describe the tool being used,
> please read and follow that, otherwise we have no idea of what is
> happening here.
> 
> thanks,
> 
> greg k-h

The tool used is an experimental static analysis tool we are developing. 
It is based on the LLVM framework and specifically designed to detect 
memory management issues.

The tool is currently under active development, so we do not have a public 
repository link at this moment. However, we plan to open-source it once 
the associated research is published.

We performed build testing on x86_64 with allyesconfig using GCC=11.4.0. 
Since triggering these error path in xhci_disable_slot() requires specific 
hardware conditions or abnormal state, we were unable to construct a test 
case to reliably trigger these specific error path at runtime.

I will send a v2 patch with the tool description included in the commit
message, and I'll further clarify why the proposed fix is safe. Do you
think there's anything else to add?

Thanks,
Zilin Guan

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ