Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2259208imm; Mon, 16 Jul 2018 05:10:52 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcU+5+ZgfVs2qa842C8sdk18rO+ZoQuUqZOgZBGS8u4O+naFIEstoSCSfJvZZW0YX/57mb6 X-Received: by 2002:a17:902:201:: with SMTP id 1-v6mr16527894plc.310.1531743052192; Mon, 16 Jul 2018 05:10:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531743052; cv=none; d=google.com; s=arc-20160816; b=og2Hyaph2b9+C9O6xknW061hD3GkGEDk+X0uoRd8dVumvJRRPCn24qblQJguOPkj/P qRNJpOS13IbSTd+ftN/fyPBk2HbpWC0WvRQ97sGmqkr/jWX6iNpZE+TTm1WaScZZpcD6 6Ba8d2lGoxFvqdQ8X0DseSp06VSojwRLWifBHS7/JZmzf14bQcuGNqVdQ/C3HyOdsfn0 5atdo+RIbn0ZJ6w/AwhpNck6ynWsJhkzyKdPEBsGMjbFx32TqqY3JJ3B4I0gQ9DcLXXp t51F1+ozOWfXrUVQXL4YocsFsWL0zPQHzv1UmsEIitoZTWT+IyGYJjHG8zIWOCkAFIqg S2PA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:arc-authentication-results; bh=V0wfK+4l5kolcD4k7JRe2SuaIw2GZc1VvJWu2m6/j58=; b=h2UAJv/aclZdjoMybaBOiPW7RAh+na5uefVXBHDJ37Z1aoCcd8cfpDy4pyL50yuIAT G5SEAwESnnxLjOCyBq0PlhztqmJpL52w/+enyROg8cliuW+gYkVZB5mmi/fh/pkA5Ktc z85agYNi0UoxFOmlilFTQpnutJsKvBgrncP9xqLdMl2CKfP5a1tXovSJfKqzbuNDZIer JigmCGR56DXN2HBqD3ccaUDgIQKXHt+eultLNWhpJgx44r7wY4GEjQ2uPf2wJmnp821B M6m0Xg0YZpvgpSBnG2u5dK1cbTT2Jv73ITwP/nEiRW6WrdGZxMJf5Srs3f9PxCQBY4D3 2QWA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w24-v6si29401536plp.386.2018.07.16.05.10.34; Mon, 16 Jul 2018 05:10:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728643AbeGPMhG (ORCPT + 99 others); Mon, 16 Jul 2018 08:37:06 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:46715 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727857AbeGPMhF (ORCPT ); Mon, 16 Jul 2018 08:37:05 -0400 Received: from 1.general.cking.uk.vpn ([10.172.193.212] helo=localhost) by youngberry.canonical.com with esmtpsa (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.76) (envelope-from ) id 1ff2KA-00070b-VT; Mon, 16 Jul 2018 12:09:55 +0000 From: Colin King To: "J . Bruce Fields" , Jeff Layton , linux-nfs@vger.kernel.org Cc: kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] nfsd: fix memory leak of async_copy Date: Mon, 16 Jul 2018 13:09:54 +0100 Message-Id: <20180716120954.6720-1-colin.king@canonical.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin Ian King In the case where async_copy is successfully allocated but the call to nfs4_init_cp_state fails, async_copy is not currently freed and the memory is leaked. Fix this by kfree'ing it before returning. Detected by CoverityScan, CID#1471823 ("Resource leak") Fixes: beb1814d5a8a ("NFSD create new stateid for async copy") Signed-off-by: Colin Ian King --- fs/nfsd/nfs4proc.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/fs/nfsd/nfs4proc.c b/fs/nfsd/nfs4proc.c index 8f3368353aaf..3fb96a2708b9 100644 --- a/fs/nfsd/nfs4proc.c +++ b/fs/nfsd/nfs4proc.c @@ -1295,8 +1295,10 @@ nfsd4_copy(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, async_copy = kzalloc(sizeof(struct nfsd4_copy), GFP_KERNEL); if (!async_copy) goto out; - if (!nfs4_init_cp_state(nn, copy)) + if (!nfs4_init_cp_state(nn, copy)) { + kfree(async_copy); goto out; + } refcount_set(&async_copy->refcount, 1); memcpy(©->cp_res.cb_stateid, ©->cp_stateid, sizeof(copy->cp_stateid)); -- 2.17.1