Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4984845ybl; Tue, 14 Jan 2020 01:23:11 -0800 (PST) X-Google-Smtp-Source: APXvYqwpvlZJK7UtXZndibpwfPVHgqaEbQyDhItfQbZPsbI38C79PR2It8IqemQLP0goYkvMcbNV X-Received: by 2002:a05:6830:1c81:: with SMTP id v1mr16774970otf.83.1578993791858; Tue, 14 Jan 2020 01:23:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578993791; cv=none; d=google.com; s=arc-20160816; b=Ew1ZTaBxsux/TqYqW4K/xUMZP//WebMdbcxjQkTfmqtcomigKo1r3uDWFuee8dG8Ys Dew30f1ZQze2qyLnZ4z3IYmPijYCeM/Ab7JZeGlr95iZ98o+kni3LSyVf7tOxoOq2sJC ++NMo7C5Cu/OzAiUtHbJMjc4fDHXbIZG7K+GnCn0PMqv8wI7BgA0H/XToEAK8asmaz2e tcFKNlsCf/pcYqNoikPU6XHcL0AgHNOAyf1fLR/pxhxnb5nJP3veW0F6v7INvueiQ1H+ 0LoM6ch+1SY9LfLXe0tr3vUHz729+zc9Lwn41vE6csYf+Kmk/ivs6tVdrdBV1qHygWtB qa8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=SjRUHDWthHVyb7FidYSlxUPJ/c5ivdoOB+xD72Zr9r0=; b=OI5eP/iofkhiTEUqy6CqV9qYo2kx3nAXZioB7bI7mm22PNbHJEf/GGdrh4p46Yn5W6 A+lrdxIKgzAN/CdyV9FDUK0g7+CdN47eCcFXNyXSrMApMugIdYE5rzw0y78JMFJLsehm FIqyHaUqd0BqFxT4tJALAvsr7VFYWMNrNAhvwPZgy0baMFGL/+aQHSsBSRVJpEUGT6ze rWVTd1swZOJ6fjVUEquxyX1af9SvG9r3WkbHzFV0oTvnx/9cLnUPjnHMePbCcIiu/VYm +8fqT9J8k9KhIHZM7ToaTILcQ0uDD6uI9fxqFIXh3tMEvkrA2Hj2wEyA4YpFfIaN9kYL aCOw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v25si8337447otn.125.2020.01.14.01.22.59; Tue, 14 Jan 2020 01:23:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728876AbgANJVB (ORCPT + 99 others); Tue, 14 Jan 2020 04:21:01 -0500 Received: from metis.ext.pengutronix.de ([85.220.165.71]:43711 "EHLO metis.ext.pengutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725820AbgANJVB (ORCPT ); Tue, 14 Jan 2020 04:21:01 -0500 Received: from ptx.hi.pengutronix.de ([2001:67c:670:100:1d::c0]) by metis.ext.pengutronix.de with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1irINZ-000420-DH; Tue, 14 Jan 2020 10:20:53 +0100 Received: from sha by ptx.hi.pengutronix.de with local (Exim 4.89) (envelope-from ) id 1irINX-0004kf-RU; Tue, 14 Jan 2020 10:20:51 +0100 Date: Tue, 14 Jan 2020 10:20:51 +0100 From: Sascha Hauer To: quanyang.wang@windriver.com Cc: richard@nod.at, linux-mtd@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] ubifs: fix memory leak from c->sup_node Message-ID: <20200114092051.autszasi2rmywtyk@pengutronix.de> References: <20200114054311.8984-1-quanyang.wang@windriver.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200114054311.8984-1-quanyang.wang@windriver.com> X-Sent-From: Pengutronix Hildesheim X-URL: http://www.pengutronix.de/ X-IRC: #ptxdist @freenode X-Accept-Language: de,en X-Accept-Content-Type: text/plain X-Uptime: 10:20:10 up 190 days, 15:30, 87 users, load average: 0.30, 0.21, 0.28 User-Agent: NeoMutt/20170113 (1.7.2) X-SA-Exim-Connect-IP: 2001:67c:670:100:1d::c0 X-SA-Exim-Mail-From: sha@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jan 14, 2020 at 01:43:11PM +0800, quanyang.wang@windriver.com wrote: > From: Quanyang Wang > > The c->sup_node is allocated in function ubifs_read_sb_node but > is not freed. This will cause memory leak as below: > > unreferenced object 0xbc9ce000 (size 4096): > comm "mount", pid 500, jiffies 4294952946 (age 315.820s) > hex dump (first 32 bytes): > 31 18 10 06 06 7b f1 11 02 00 00 00 00 00 00 00 1....{.......... > 00 10 00 00 06 00 00 00 00 00 00 00 08 00 00 00 ................ > backtrace: > [] ubifs_read_superblock+0x48/0xebc > [] ubifs_mount+0x974/0x1420 > [<8589ecc3>] legacy_get_tree+0x2c/0x50 > [<5f1fb889>] vfs_get_tree+0x28/0xfc > [] do_mount+0x4f8/0x748 > [<4151f538>] ksys_mount+0x78/0xa0 > [] ret_fast_syscall+0x0/0x54 > [<1cc40005>] 0x7ea02790 > > Free it in ubifs_umount and in the error path of mount_ubifs. > > Fixes: fd6150051bec ("ubifs: Store read superblock node") > Signed-off-by: Quanyang Wang Looks good. Reviewed-by: Sascha Hauer Sascha > --- > fs/ubifs/super.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/fs/ubifs/super.c b/fs/ubifs/super.c > index 7d4547e5202d..a4412c259bb3 100644 > --- a/fs/ubifs/super.c > +++ b/fs/ubifs/super.c > @@ -1599,6 +1599,7 @@ static int mount_ubifs(struct ubifs_info *c) > vfree(c->ileb_buf); > vfree(c->sbuf); > kfree(c->bottom_up_buf); > + kfree(c->sup_node); > ubifs_debugging_exit(c); > return err; > } > @@ -1641,6 +1642,7 @@ static void ubifs_umount(struct ubifs_info *c) > vfree(c->ileb_buf); > vfree(c->sbuf); > kfree(c->bottom_up_buf); > + kfree(c->sup_node); > ubifs_debugging_exit(c); > } > > -- > 2.17.1 > > -- Pengutronix e.K. | | Steuerwalder Str. 21 | http://www.pengutronix.de/ | 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |