Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2270716imc; Tue, 12 Mar 2019 10:17:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqyk6qHEnEI/QMrxxJcLlkFxFBpRxkIItiOSDF4Zz8it7gygyEJbusaAj3c01BTZPw6gn3E9 X-Received: by 2002:aa7:8150:: with SMTP id d16mr39966657pfn.172.1552411067821; Tue, 12 Mar 2019 10:17:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552411067; cv=none; d=google.com; s=arc-20160816; b=g9B1rgMqPEkx2IoUZ5/GMUrInzGYcxa2fSTkVuhkUbFt+dPI87eBZk4e4Ib65KBz+h jL37VDxZsxLCLoB+3lOX9Qzt05S+VC6dVihkGe1xtnXXET0EPPRuhxEHlyQ3VEde9if1 yN9jTYB0hsEBprPVDk0p46sT0IcR+T4nAaNSMjRkCDo8WS6abOrHBotgBfIzRqfj259a Oy7HkX6QCMTIKe6BRzxWmviZDLKiV4euuiiKBbXSNYNZcNtON0O7OK8k8DlGnzWKnkZ8 V3ROw3SGjRb9ymTUwRuzl/39u/0Tuet02F456gVDlH9qW1uC/n8S659g2a+ZG9D4dk8O 4gpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=iTEmKjkP09ycEFdFctc+7Nxh8OoH29yheTaJzTb0Wqc=; b=Kx2a6gVYaOz7BDF36g60qDRTH/OA+ti0U84pM83iE8c6iKntGF7ItXBTr+NiO+N5PL lN76uqirdozGSDR7vyZo9YrRzjWyT2KuZTqlnr+2FC5bCvMnBDFvu2w78Tj3KejjMoid X3vnFAtBiOXVrd+jQ/EIaz4osiBBhDyCaFSEwhVdpP8YngTu5EsGPCo6hi00UggT/jq3 w6CHKegOjdYCHK9m+tvMXMasJJFRe+SbbY35c5AEwgI4Sjx5eSvP+oRMlp3CfwVZ0TSZ Kv4Pb+hjEUFYhllMHLo9ebXo4EAVfdcpMz3KVu6AA/LnUbarMDwoMj+O0B/mJcZ/Ax4D Wokw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=r4m70Dgo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m26si8194114pfi.247.2019.03.12.10.17.32; Tue, 12 Mar 2019 10:17:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=r4m70Dgo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728266AbfCLRQV (ORCPT + 99 others); Tue, 12 Mar 2019 13:16:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:55678 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728680AbfCLRPV (ORCPT ); Tue, 12 Mar 2019 13:15:21 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6A3B1217D4; Tue, 12 Mar 2019 17:15:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552410920; bh=enDXOaDASJgw6FXTis/ccT470vw4wD6559Ss+nuuCIk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=r4m70DgoIf5zZHESjXSgVVedndg/qHrYoK0z+KuyfxHsOg/LchqYeWUiV20ghPJKj 462as0qZvulN6E8EqThIcLa2RB83zqOz4N5fCbYXci6eWMXmmOJU7I1+Cjq7IU7wCU 0ddlu2kuKGBfAh7sFdOAG8oFa0vjVOeiT6CBKv/I= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Greg Kroah-Hartman , Sheng Yong , Gao Xiang Subject: [PATCH 4.19 140/149] staging: erofs: fix memleak of inodes shared xattr array Date: Tue, 12 Mar 2019 10:09:18 -0700 Message-Id: <20190312170401.043164728@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312170349.421581206@linuxfoundation.org> References: <20190312170349.421581206@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Gao Xiang From: Sheng Yong commit 3b1b5291f79d040d549d7c746669fc30e8045b9b upstream. If it fails to read a shared xattr page, the inode's shared xattr array is not freed. The next time the inode's xattr is accessed, the previously allocated array is leaked. Signed-off-by: Sheng Yong Fixes: b17500a0fdba ("staging: erofs: introduce xattr & acl support") Cc: # 4.19+ Reviewed-by: Gao Xiang Signed-off-by: Gao Xiang Signed-off-by: Greg Kroah-Hartman --- drivers/staging/erofs/xattr.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) --- a/drivers/staging/erofs/xattr.c +++ b/drivers/staging/erofs/xattr.c @@ -109,8 +109,11 @@ static int init_inode_xattrs(struct inod it.page = erofs_get_meta_page(inode->i_sb, ++it.blkaddr, S_ISDIR(inode->i_mode)); - if (IS_ERR(it.page)) + if (IS_ERR(it.page)) { + kfree(vi->xattr_shared_xattrs); + vi->xattr_shared_xattrs = NULL; return PTR_ERR(it.page); + } it.kaddr = kmap_atomic(it.page); atomic_map = true;