Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp3306487imm; Tue, 17 Jul 2018 02:31:57 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdabeklO2Zxy+GhOycsXZe3KFxguPNpohFwAh9MiivxSuZipMJ5Y2a9vy0+qm3b6d/aPfWt X-Received: by 2002:a17:902:546:: with SMTP id 64-v6mr902095plf.232.1531819917689; Tue, 17 Jul 2018 02:31:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531819917; cv=none; d=google.com; s=arc-20160816; b=NgCI32AvY4JyOw50ZoOm0xx3lYe9qp3qjNtM1gM3UwuXbWjJ5ppS+C/dIzazUjDIhG 8tbM7oirfDqQEautEH51m9EWtP4PjQCn6T5kKf5WlKn8CgHf4L3txT35TuUFUzl2BN0o hIvsimiszcr6UyTdQtPIt/uap1DFnoyfEq4VYXLy4P1+aQEYcbuTrnJODK0pyHDLan9Y nQnr7N4KuoEynic0GhvnyAl2jpWWxpYXA/1W8U8qsVK+3A3C+6o2WiNt48dxDYNy0o4G tBwfIl05wYRrn0zihx/OiMruTK8vff3zMQL4FVSdD0j8Kfjj/J/nzX5ilm8FzhAuGz7k TruQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=qyw7GgYzDnI6cjF9CHBup6wYpg/31ndRkHA/9Yv+bDU=; b=ahz7lL2YlxoUGH4nNNOvGpyD6emIjwn6lbVk0FeboNa/Zw1oRImMlLZPl1swMdfe3+ ggCD2N7uyIyHRk1hlJK5X6A6lm0W3BfOpU1p/ScKZPC+lDluN3Y76EXR2W9/CCGr44WT Hs4DzAixNadv3FUENLbd5PkXvp6mlYXeFaQUbV7KSsZiV754qGZy/fX8zKmqfPV0bAzb Di53WFwnubkP+hlAU41HVszqWACGl03bMNBZohcrIO8HzBCN7/HAFeiTal8KCjzuvsmw vmtQWjELZv07tG7JTs8hno416mBekSAy1UapZttWq9G6Z7dlqMmJl8k6Yhb0wMSMHyMh D2Kw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2018-07-02 header.b="EJ/kEE4r"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z3-v6si463931plb.228.2018.07.17.02.31.42; Tue, 17 Jul 2018 02:31:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2018-07-02 header.b="EJ/kEE4r"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729708AbeGQKCB (ORCPT + 99 others); Tue, 17 Jul 2018 06:02:01 -0400 Received: from aserp2130.oracle.com ([141.146.126.79]:57602 "EHLO aserp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728720AbeGQKCB (ORCPT ); Tue, 17 Jul 2018 06:02:01 -0400 Received: from pps.filterd (aserp2130.oracle.com [127.0.0.1]) by aserp2130.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w6H9SQBp051439; Tue, 17 Jul 2018 09:30:15 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=date : from : to : cc : subject : message-id : references : mime-version : content-type : in-reply-to; s=corp-2018-07-02; bh=qyw7GgYzDnI6cjF9CHBup6wYpg/31ndRkHA/9Yv+bDU=; b=EJ/kEE4rqHKPyzrl5EqLWTxKAHsiN5KRL+EukeOMbR7yyHa+G1KU715uy9KiDcJZXILV T45PtSJxjEch16pLpPMebWkUKZqOJp8AJrz94Xx97z437KntcSLcmAkd0AqPt2oX9SIX 68eLJYEQJ0ul0DOw29Nak/mGgcllBC6/sbJiK8QvZwBEqqTvPX+YD702TWCaLqVA2isq dkzIb8RpM1Zk1+UHd7sqMcpHJOXSm00/xdfZuWU1IXwkn3CLC2aD/KDRvmjv54k0RnXq JQzB/8XmvP8I/5CRmaPqcXCzgDNOw8bg+eEuSdK6DFJ6Sg/2fcVXI0qeG4KdvmEvIPmp CA== Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by aserp2130.oracle.com with ESMTP id 2k7a3sywrv-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 17 Jul 2018 09:30:15 +0000 Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by aserv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w6H9UEPI003369 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 17 Jul 2018 09:30:14 GMT Received: from abhmp0016.oracle.com (abhmp0016.oracle.com [141.146.116.22]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id w6H9UD3R017895; Tue, 17 Jul 2018 09:30:13 GMT Received: from mwanda (/197.179.115.196) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 17 Jul 2018 02:30:13 -0700 Date: Tue, 17 Jul 2018 12:30:05 +0300 From: Dan Carpenter To: Colin King Cc: "J . Bruce Fields" , Jeff Layton , linux-nfs@vger.kernel.org, kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] nfsd: fix memory leak of async_copy Message-ID: <20180717093005.3ggy24fskb3bxtni@mwanda> References: <20180716120954.6720-1-colin.king@canonical.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180716120954.6720-1-colin.king@canonical.com> User-Agent: NeoMutt/20170609 (1.8.3) X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8956 signatures=668706 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=887 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1806210000 definitions=main-1807170098 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 16, 2018 at 01:09:54PM +0100, Colin King wrote: > From: Colin Ian King > > In the case where async_copy is successfully allocated but > the call to nfs4_init_cp_state fails, async_copy is not > currently freed and the memory is leaked. Fix this by kfree'ing > it before returning. > > Detected by CoverityScan, CID#1471823 ("Resource leak") > > Fixes: beb1814d5a8a ("NFSD create new stateid for async copy") > Signed-off-by: Colin Ian King > --- > fs/nfsd/nfs4proc.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/fs/nfsd/nfs4proc.c b/fs/nfsd/nfs4proc.c > index 8f3368353aaf..3fb96a2708b9 100644 > --- a/fs/nfsd/nfs4proc.c > +++ b/fs/nfsd/nfs4proc.c > @@ -1295,8 +1295,10 @@ nfsd4_copy(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, > async_copy = kzalloc(sizeof(struct nfsd4_copy), GFP_KERNEL); > if (!async_copy) > goto out; > - if (!nfs4_init_cp_state(nn, copy)) > + if (!nfs4_init_cp_state(nn, copy)) { > + kfree(async_copy); > goto out; It really feels like both this and the kzalloc() failure should be doing an of fput() of copy->file_src and copy->file_dst. The goto out_err does an list_del(©->copies); but it happens before the "list_add(&async_copy->copies ..." so that's likely wrong as well. regards, dan carpenter