Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4812555yba; Sun, 12 May 2019 23:25:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqzxX02/tDyJwWB2qF/Sl/1JxzspJxSrVJcOEj6oyI5vO7cpEHsfic1ocLBpUjcY5Pd+nCW3 X-Received: by 2002:a17:902:e409:: with SMTP id ci9mr18408634plb.103.1557728736215; Sun, 12 May 2019 23:25:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557728736; cv=none; d=google.com; s=arc-20160816; b=Xb9wYErhZbHyrTDGtLZTVdPeawMWld+TuKM5j6XH2GGYRiE9Q/qppvTVWNSXlHHtKZ zhjszPxOMxjbN+zjibOYH5qPqS7CY8HjUxIETXuhrd+O+jeuXupxuflk3lOYPRdweYgl 7QpPFQoNc1xJochXG0FOxIBbEG/tpQ4+evXoPjoQJCq7MDtBk1BxIhmFYZs31QbbXApL AEjK54j6Ci+JxM8OpkejB9DBryGy292rAX0VtF93fH+xboBfgetL+Oxju5FsdU9AxJlB QibEWl1M4khIGzYkP6NZ/f/EdMaiN/G8DYU1/dcJi8FHjwVtlbll0XAymWGBgs9/QHxz eCrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:openpgp:from:references:cc:to:subject; bh=rLDYWIbhzQJlwhkwx2o0XuyY5sJnV+97tAnFomBSmjs=; b=Ro6r95m0OP1XG8XIOk1Sfv8LTsckVwzqVHF8AFo+MClM0YTBqE4Q2HNtp1IjdPrKxW 251iGU4t8xjkazwLxjE0W/8tbFykYqCxsCnAWEA4Y/PnDDHnjyQKkyRPnCX7cuJSObWn 7gMq8uEpKcbce0yNi75y8HkD0zLbjyeQ2NQsTeqsF73j3Hrm2LOnO3dS12d/sbTfoXeB IuA2Wr06KIheyhYXJGoWWC85w0h42HzlC6/LS29ByzchGqwCF7O8I2glfUG+Z+3SaISg ekfRBJR7LisrDSTqaz7pjRx8fmH86L1625M6tE0RPRz4hlYn9eqUXumIeWCwVc1rqbTg bdKQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q8si16669894pgf.3.2019.05.12.23.25.20; Sun, 12 May 2019 23:25:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727322AbfEMGEx (ORCPT + 99 others); Mon, 13 May 2019 02:04:53 -0400 Received: from mx2.suse.de ([195.135.220.15]:56792 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727272AbfEMGEw (ORCPT ); Mon, 13 May 2019 02:04:52 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id E28B7AF51; Mon, 13 May 2019 06:04:50 +0000 (UTC) Subject: Re: [PATCH 2/2] fs: btrfs: Don't leak memory when failing add fsid To: "Tobin C. Harding" , Chris Mason , Josef Bacik , David Sterba Cc: Greg Kroah-Hartman , "Rafael J. Wysocki" , linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org References: <20190513033912.3436-1-tobin@kernel.org> <20190513033912.3436-3-tobin@kernel.org> From: Nikolay Borisov Openpgp: preference=signencrypt Autocrypt: addr=nborisov@suse.com; prefer-encrypt=mutual; keydata= mQINBFiKBz4BEADNHZmqwhuN6EAzXj9SpPpH/nSSP8YgfwoOqwrP+JR4pIqRK0AWWeWCSwmZ T7g+RbfPFlmQp+EwFWOtABXlKC54zgSf+uulGwx5JAUFVUIRBmnHOYi/lUiE0yhpnb1KCA7f u/W+DkwGerXqhhe9TvQoGwgCKNfzFPZoM+gZrm+kWv03QLUCr210n4cwaCPJ0Nr9Z3c582xc bCUVbsjt7BN0CFa2BByulrx5xD9sDAYIqfLCcZetAqsTRGxM7LD0kh5WlKzOeAXj5r8DOrU2 GdZS33uKZI/kZJZVytSmZpswDsKhnGzRN1BANGP8sC+WD4eRXajOmNh2HL4P+meO1TlM3GLl EQd2shHFY0qjEo7wxKZI1RyZZ5AgJnSmehrPCyuIyVY210CbMaIKHUIsTqRgY5GaNME24w7h TyyVCy2qAM8fLJ4Vw5bycM/u5xfWm7gyTb9V1TkZ3o1MTrEsrcqFiRrBY94Rs0oQkZvunqia c+NprYSaOG1Cta14o94eMH271Kka/reEwSZkC7T+o9hZ4zi2CcLcY0DXj0qdId7vUKSJjEep c++s8ncFekh1MPhkOgNj8pk17OAESanmDwksmzh1j12lgA5lTFPrJeRNu6/isC2zyZhTwMWs k3LkcTa8ZXxh0RfWAqgx/ogKPk4ZxOXQEZetkEyTFghbRH2BIwARAQABtCNOaWtvbGF5IEJv cmlzb3YgPG5ib3Jpc292QHN1c2UuY29tPokCOAQTAQIAIgUCWIo48QIbAwYLCQgHAwIGFQgC CQoLBBYCAwECHgECF4AACgkQcb6CRuU/KFc0eg/9GLD3wTQz9iZHMFbjiqTCitD7B6dTLV1C ddZVlC8Hm/TophPts1bWZORAmYIihHHI1EIF19+bfIr46pvfTu0yFrJDLOADMDH+Ufzsfy2v HSqqWV/nOSWGXzh8bgg/ncLwrIdEwBQBN9SDS6aqsglagvwFD91UCg/TshLlRxD5BOnuzfzI Leyx2c6YmH7Oa1R4MX9Jo79SaKwdHt2yRN3SochVtxCyafDlZsE/efp21pMiaK1HoCOZTBp5 VzrIP85GATh18pN7YR9CuPxxN0V6IzT7IlhS4Jgj0NXh6vi1DlmKspr+FOevu4RVXqqcNTSS E2rycB2v6cttH21UUdu/0FtMBKh+rv8+yD49FxMYnTi1jwVzr208vDdRU2v7Ij/TxYt/v4O8 V+jNRKy5Fevca/1xroQBICXsNoFLr10X5IjmhAhqIH8Atpz/89ItS3+HWuE4BHB6RRLM0gy8 T7rN6ja+KegOGikp/VTwBlszhvfLhyoyjXI44Tf3oLSFM+8+qG3B7MNBHOt60CQlMkq0fGXd mm4xENl/SSeHsiomdveeq7cNGpHi6i6ntZK33XJLwvyf00PD7tip/GUj0Dic/ZUsoPSTF/mG EpuQiUZs8X2xjK/AS/l3wa4Kz2tlcOKSKpIpna7V1+CMNkNzaCOlbv7QwprAerKYywPCoOSC 7P25Ag0EWIoHPgEQAMiUqvRBZNvPvki34O/dcTodvLSyOmK/MMBDrzN8Cnk302XfnGlW/YAQ csMWISKKSpStc6tmD+2Y0z9WjyRqFr3EGfH1RXSv9Z1vmfPzU42jsdZn667UxrRcVQXUgoKg QYx055Q2FdUeaZSaivoIBD9WtJq/66UPXRRr4H/+Y5FaUZx+gWNGmBT6a0S/GQnHb9g3nonD jmDKGw+YO4P6aEMxyy3k9PstaoiyBXnzQASzdOi39BgWQuZfIQjN0aW+Dm8kOAfT5i/yk59h VV6v3NLHBjHVw9kHli3jwvsizIX9X2W8tb1SefaVxqvqO1132AO8V9CbE1DcVT8fzICvGi42 FoV/k0QOGwq+LmLf0t04Q0csEl+h69ZcqeBSQcIMm/Ir+NorfCr6HjrB6lW7giBkQl6hhomn l1mtDP6MTdbyYzEiBFcwQD4terc7S/8ELRRybWQHQp7sxQM/Lnuhs77MgY/e6c5AVWnMKd/z MKm4ru7A8+8gdHeydrRQSWDaVbfy3Hup0Ia76J9FaolnjB8YLUOJPdhI2vbvNCQ2ipxw3Y3c KhVIpGYqwdvFIiz0Fej7wnJICIrpJs/+XLQHyqcmERn3s/iWwBpeogrx2Lf8AGezqnv9woq7 OSoWlwXDJiUdaqPEB/HmGfqoRRN20jx+OOvuaBMPAPb+aKJyle8zABEBAAGJAh8EGAECAAkF AliKBz4CGwwACgkQcb6CRuU/KFdacg/+M3V3Ti9JYZEiIyVhqs+yHb6NMI1R0kkAmzsGQ1jU zSQUz9AVMR6T7v2fIETTT/f5Oout0+Hi9cY8uLpk8CWno9V9eR/B7Ifs2pAA8lh2nW43FFwp IDiSuDbH6oTLmiGCB206IvSuaQCp1fed8U6yuqGFcnf0ZpJm/sILG2ECdFK9RYnMIaeqlNQm iZicBY2lmlYFBEaMXHoy+K7nbOuizPWdUKoKHq+tmZ3iA+qL5s6Qlm4trH28/fPpFuOmgP8P K+7LpYLNSl1oQUr+WlqilPAuLcCo5Vdl7M7VFLMq4xxY/dY99aZx0ZJQYFx0w/6UkbDdFLzN upT7NIN68lZRucImffiWyN7CjH23X3Tni8bS9ubo7OON68NbPz1YIaYaHmnVQCjDyDXkQoKC R82Vf9mf5slj0Vlpf+/Wpsv/TH8X32ajva37oEQTkWNMsDxyw3aPSps6MaMafcN7k60y2Wk/ TCiLsRHFfMHFY6/lq/c0ZdOsGjgpIK0G0z6et9YU6MaPuKwNY4kBdjPNBwHreucrQVUdqRRm RcxmGC6ohvpqVGfhT48ZPZKZEWM+tZky0mO7bhZYxMXyVjBn4EoNTsXy1et9Y1dU3HVJ8fod 5UqrNrzIQFbdeM0/JqSLrtlTcXKJ7cYFa9ZM2AP7UIN9n1UWxq+OPY9YMOewVfYtL8M= Message-ID: <3473fcfa-88cf-b372-3beb-69d59320d50a@suse.com> Date: Mon, 13 May 2019 09:04:49 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <20190513033912.3436-3-tobin@kernel.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 13.05.19 г. 6:39 ч., Tobin C. Harding wrote: > A failed call to kobject_init_and_add() must be followed by a call to > kobject_put(). Currently in the error path when adding fs_devices we > are missing this call. This could be fixed by calling > btrfs_sysfs_remove_fsid() if btrfs_sysfs_add_fsid() returns an error or > by adding a call to kobject_put() directly in btrfs_sysfs_add_fsid(). > Here we choose the second option because it prevents the slightly > unusual error path handling requirements of kobject from leaking out > into btrfs functions. > > Add a call to kobject_put() in the error path of kobject_add_and_init(). > This causes the release method to be called if kobject_init_and_add() > fails. open_tree() is the function that calls btrfs_sysfs_add_fsid() > and the error code in this function is already written with the > assumption that the release method is called during the error path of > open_tree() (as seen by the call to btrfs_sysfs_remove_fsid() under the > fail_fsdev_sysfs label). I'm not familiar with the internals of kobject but btrfs_sysfs_remove_fsid calls __btrfs_sysfs_remove_fsid which in turn does kobject_del followed by kobject_put so its sequence is not exactly identical with your change. Presumably kobject_del is only required if you want to dispose of successfully registered sysfs node. This implies that __btrfs_sysfs_remove_fsid is actually broken when it comes to handling failed sysfs_add_fsid? > > Signed-off-by: Tobin C. Harding > --- > fs/btrfs/sysfs.c | 7 ++++++- > 1 file changed, 6 insertions(+), 1 deletion(-) > > diff --git a/fs/btrfs/sysfs.c b/fs/btrfs/sysfs.c > index 5a5930e3d32b..2f078b77fe14 100644 > --- a/fs/btrfs/sysfs.c > +++ b/fs/btrfs/sysfs.c > @@ -825,7 +825,12 @@ int btrfs_sysfs_add_fsid(struct btrfs_fs_devices *fs_devs, > fs_devs->fsid_kobj.kset = btrfs_kset; > error = kobject_init_and_add(&fs_devs->fsid_kobj, > &btrfs_ktype, parent, "%pU", fs_devs->fsid); > - return error; > + if (error) { > + kobject_put(&fs_devs->fsid_kobj); > + return error; > + } > + > + return 0; > } > > int btrfs_sysfs_add_mounted(struct btrfs_fs_info *fs_info) >