Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp434329pxx; Wed, 28 Oct 2020 08:15:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzTxwEszfajCuB8Wm1mqo99eVw796Jye5EogpJmyMKwSQd+lD6aPsgqVsPxQQ56EjeIinHE X-Received: by 2002:aa7:cd90:: with SMTP id x16mr8048150edv.302.1603898145513; Wed, 28 Oct 2020 08:15:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603898145; cv=none; d=google.com; s=arc-20160816; b=fj4q1kTuoxGLlozs+brxedox3jI6AHwKxU5tBKeL2VI/B+Rmjb29+xlkMvSbqHdVTG 0tBbGVm5MHnJUsY7YGUojzLws3n3mSlEU/q9WlDSGMQY9Mcu15ZMcA88SSM04gr5SCYo h/fQ+YaLaCHW+zTM8KyfkkEs1wkPCYN+XHY7PyJ9X8pdg/G64tLGStCjWuQyWQwhxWnp mzRl3hIMRl/VikcvlX7BoEtQDP2HDrYwcUn7aR0LSgJFSJLi6eDA5KPAd9J86bc897Ng wU1uxyVrZ5XW8zprQNZZhZFdPIGePQSp6nv3fSWmRMnrG9DGyrs6XM+K1l4sd6rlDRdN 1SEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Bl23onnciX35RXRcgmQhqPmGvM+I+Bys+DrPWvJsQ6I=; b=euknuKxdBSp75+7NPRRzIII6Ka3BzSVDeZqlnLdIwN4+03kfsFgBg3BtHkGjvvFLqu cakni5/Kj121nE8icsTaycDQ/UYEEHKkAIYY+xD06Zvk7phVbOcQLlR/LPj6WGK3TlBa RDQAjVrH8A/+IeqYg6pI9/6729HksnXUhx8csgD1ERsEEhzG1RP8+0Eq361NAVX+zhKn FGmY7RjgdO5lTxUfrHZg+FKc/0UsI96vaXCFka6wTjp7rLsJ3pIt6w2aMbQgCtaVaucD 99KqiRx/8jrx2xTFiMov6vB4uAtNCfZ6B8JBJAFm+ke8hwVBG56DAGYqy62M+KHvAwwu xm/Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=y9v3VFu+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jr1si3058858ejb.164.2020.10.28.08.15.22; Wed, 28 Oct 2020 08:15:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=y9v3VFu+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1809982AbgJ0Qcl (ORCPT + 99 others); Tue, 27 Oct 2020 12:32:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:50138 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1802505AbgJ0Pts (ORCPT ); Tue, 27 Oct 2020 11:49:48 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E9EBB2072C; Tue, 27 Oct 2020 15:49:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603813787; bh=a+BJ7GJFIleTVPFL9oPqI9yETMNmCOB+dSc4uY2elB0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=y9v3VFu+3/aIpC+ywt+O+onSumK1QjnziTaty+2TpHNjJCLc9WVST3qD2H+7tMgxw xejEDwm87STkpy10hfm9uqhTQ8IlnzOQR2RwCISepg970CdwlPzTA6mbI+MVz29vo/ 3/oEkDyUeTrMmN510KllaVE9eIGiQdUrL7xyseCk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexander Aring , David Teigland , Sasha Levin Subject: [PATCH 5.9 670/757] fs: dlm: fix configfs memory leak Date: Tue, 27 Oct 2020 14:55:20 +0100 Message-Id: <20201027135521.971208514@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135450.497324313@linuxfoundation.org> References: <20201027135450.497324313@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexander Aring [ Upstream commit 3d2825c8c6105b0f36f3ff72760799fa2e71420e ] This patch fixes the following memory detected by kmemleak and umount gfs2 filesystem which removed the last lockspace: unreferenced object 0xffff9264f482f600 (size 192): comm "dlm_controld", pid 325, jiffies 4294690276 (age 48.136s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 6e 6f 64 65 73 00 00 00 ........nodes... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000060481d7>] make_space+0x41/0x130 [<000000008d905d46>] configfs_mkdir+0x1a2/0x5f0 [<00000000729502cf>] vfs_mkdir+0x155/0x210 [<000000000369bcf1>] do_mkdirat+0x6d/0x110 [<00000000cc478a33>] do_syscall_64+0x33/0x40 [<00000000ce9ccf01>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 The patch just remembers the "nodes" entry pointer in space as I think it's created as subdirectory when parent "spaces" is created. In function drop_space() we will lost the pointer reference to nds because configfs_remove_default_groups(). However as this subdirectory is always available when "spaces" exists it will just be freed when "spaces" will be freed. Signed-off-by: Alexander Aring Signed-off-by: David Teigland Signed-off-by: Sasha Levin --- fs/dlm/config.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/fs/dlm/config.c b/fs/dlm/config.c index 47f0b98b707f8..f33a7e4ae917b 100644 --- a/fs/dlm/config.c +++ b/fs/dlm/config.c @@ -221,6 +221,7 @@ struct dlm_space { struct list_head members; struct mutex members_lock; int members_count; + struct dlm_nodes *nds; }; struct dlm_comms { @@ -430,6 +431,7 @@ static struct config_group *make_space(struct config_group *g, const char *name) INIT_LIST_HEAD(&sp->members); mutex_init(&sp->members_lock); sp->members_count = 0; + sp->nds = nds; return &sp->group; fail: @@ -451,6 +453,7 @@ static void drop_space(struct config_group *g, struct config_item *i) static void release_space(struct config_item *i) { struct dlm_space *sp = config_item_to_space(i); + kfree(sp->nds); kfree(sp); } -- 2.25.1