Received: by 2002:a25:d783:0:0:0:0:0 with SMTP id o125csp555318ybg; Thu, 19 Mar 2020 04:45:35 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtiS/QJ+qkJb7qgftpJxoYRcoMEh5AYUnIqkUvCCXUZp0H1wnhIRLO1cxsCbIDCvdqZLK3k X-Received: by 2002:a9d:694a:: with SMTP id p10mr2008475oto.151.1584618335702; Thu, 19 Mar 2020 04:45:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584618335; cv=none; d=google.com; s=arc-20160816; b=GMWvNGyLTbol4cTAylxZmYtCsrcoQt/azHBWVcFfh+vkWuv4W14YmFIAk0pgBlFgsj /i6gXIRLQ4H3VMggHheIxhS/TpSA1KbmcnwAfm53CK7CCcXe7RGzUJUSZpwN2cwYyZsR 4np7v88cuP7uz+OTjbO1fK4OZHtDXM6/G+2zFn1wIXLUuI88Q9MJknb9R78M/oS59Es4 CSIspwSgsKMKf6qdtZ0nTIoGVn1aQr5GuR7qrD6wAPkS/MHSoUPx3+4eS7fY/v18+P2F VVDIgBcFQN/CtFwgkv/nRJsRVC9LT6K0BuqGGCKw+2ZdLtF1IKfIOxLIxN7RgVY98eLS M92Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition:mime-version :message-id:subject:cc:to:from:date; bh=HN9nX1fSWEko8pHSHd+MgbsQy9yspLxRfZfuYEyxP4w=; b=rovdd1AEZTuAZrR6LuqDYOue93F8SW/w4GA2ISOoHP5/LI+pfcwhuAEoAhROZ/5kIU mwIDubQpsQ8iHxJ8dnrHMLoCmGPr1WWYSkQb+mBbMHQF3MIiaOitXQd/W2D+7TfKcNlN lEaMZVuF7DsR4Jb218uaiSYT1aQqEKcZkmHWTQxJTdbZRnaRRoUVO1HSK7Fg+hphH1Jx j54H2cppa8G0lnBk4tsMWh9trvg/qzoJdgB+0JK1FnSyunrcH7iUfPG9EOZzy+T65dpg MhCMx8KwRHI3OE/RYQ4SO0brej6MmDT5g+4skvC5SDCCELgLjbwiaukI3mnaO38jFobN TyTQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l185si948084oif.274.2020.03.19.04.45.23; Thu, 19 Mar 2020 04:45:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726979AbgCSLnw (ORCPT + 99 others); Thu, 19 Mar 2020 07:43:52 -0400 Received: from mx2.suse.de ([195.135.220.15]:39338 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726188AbgCSLnv (ORCPT ); Thu, 19 Mar 2020 07:43:51 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id E0501AD10; Thu, 19 Mar 2020 11:43:49 +0000 (UTC) Received: from localhost (webern.olymp [local]) by webern.olymp (OpenSMTPD) with ESMTPA id e75a8fbe; Thu, 19 Mar 2020 11:43:48 +0000 (WET) Date: Thu, 19 Mar 2020 11:43:48 +0000 From: Luis Henriques To: Jeff Layton , Sage Weil , Ilya Dryomov , "Yan, Zheng" Cc: ceph-devel@vger.kernel.org, linux-kernel@vger.kernel.org, lhenriques@suse.com Subject: [PATCH] ceph: fix memory leak in ceph_cleanup_snapid_map Message-ID: <20200319114348.GA72449@suse.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org kmemleak reports the following memory leak: unreferenced object 0xffff88821feac8a0 (size 96): comm "kworker/1:0", pid 17, jiffies 4294896362 (age 20.512s) hex dump (first 32 bytes): a0 c8 ea 1f 82 88 ff ff 00 c9 ea 1f 82 88 ff ff ................ 00 00 00 00 00 00 00 00 00 01 00 00 00 00 ad de ................ backtrace: [<00000000b3ea77fb>] ceph_get_snapid_map+0x75/0x2a0 [<00000000d4060942>] fill_inode+0xb26/0x1010 [<0000000049da6206>] ceph_readdir_prepopulate+0x389/0xc40 [<00000000e2fe2549>] dispatch+0x11ab/0x1521 [<000000007700b894>] ceph_con_workfn+0xf3d/0x3240 [<0000000039138a41>] process_one_work+0x24d/0x590 [<00000000eb751f34>] worker_thread+0x4a/0x3d0 [<000000007e8f0d42>] kthread+0xfb/0x130 [<00000000d49bd1fa>] ret_from_fork+0x3a/0x50 A kfree was missing in commit 75c9627efb72 ("ceph: map snapid to anonymous bdev ID"), while looping the 'to_free' list of ceph_snapid_map objects. Fixes: 75c9627efb72 ("ceph: map snapid to anonymous bdev ID") Signed-off-by: Luis Henriques --- Hi! A bit of mailing-list archaeology shows that v1 of this patch actually included this kfree [1], and was lost on v2 [2]. [1] https://patchwork.kernel.org/patch/10114319/ [2] https://patchwork.kernel.org/patch/10749907/ Cheers, -- Luis fs/ceph/snap.c | 1 + 1 file changed, 1 insertion(+) diff --git a/fs/ceph/snap.c b/fs/ceph/snap.c index ccfcc66aaf44..923be9399b21 100644 --- a/fs/ceph/snap.c +++ b/fs/ceph/snap.c @@ -1155,5 +1155,6 @@ void ceph_cleanup_snapid_map(struct ceph_mds_client *mdsc) pr_err("snapid map %llx -> %x still in use\n", sm->snap, sm->dev); } + kfree(sm); } }