Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp163647pxb; Mon, 2 Nov 2020 17:25:11 -0800 (PST) X-Google-Smtp-Source: ABdhPJw3iMucDtu33bfxH2rCSWdOnkMEFzL7qaFTe1qHf0MpSJ2v5DZY/dy/T+R2OZ47lmGZAYSt X-Received: by 2002:a50:aa84:: with SMTP id q4mr19586460edc.331.1604366710931; Mon, 02 Nov 2020 17:25:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604366710; cv=none; d=google.com; s=arc-20160816; b=CJa14m+ljAbvZZA9kg7/0r+75C6Sxw+MxoImcZ+4nqwNtcN7hsbMYw1nhkv5yxIN7m eMKjMP0+vwMe7xrFEsi8Zfnv7n2OU3trob5kIoLBaQJ8vxgeaKXBerIPw3Ho74CWFY51 G/erLkjQLFhOQbShPEkyeHfVseDpBORkdQzcC/iRH6ZgaEkrkJQ9MSkA10gAtKojcBDn FgOXS9bfix1RBb0lHVCRY4bH4EPkg62Hcem8LfcLSJnmjStQoY+bfMADqMkMoDp8fVo/ znfc6iL0QrlxrPgOL8PddOtpzLEQXhDeR3U4fECmvWP6kStGdFATNCzMHCGG1HNuewrd es/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=6ElMtOLKQmwL34hXlcc0X9VijJc//3JL/Jq8N4mb+0Y=; b=nwzj6MWql03zk/VtrdAn9oj0o8KpugSO+FTg242sCnfnzo0YetiOy7hcl9/PweA5iD evJA6bF1k5X2Z/osQBuO3LRdpmchLtPCY4rkVCXxnXb+B/PsD8cQSzga+XA4VblA0WFE xVThK+xXD8zJ520sQxpbsJVOkGp93f3pySsLQreAFS8BZQggVnC4NzAvx6+AVVRJrHkC 5uXnA2Dzl1ebRzhsjEZ9xGbhxeJxH0RMMHx8LEJrPv6odo8Mk/ZH2hrPn+epB3thJ2EB QHmmbyxRPxhCOQbX57D6++BoZ7XlBZJCP/azn9q0Z55aNvqJTUgtOhj/iP8iGrCDs2y9 TXOQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GpOXik4f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k8si4037320eje.152.2020.11.02.17.24.48; Mon, 02 Nov 2020 17:25:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GpOXik4f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728212AbgKCBUu (ORCPT + 99 others); Mon, 2 Nov 2020 20:20:50 -0500 Received: from mail.kernel.org ([198.145.29.99]:35858 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728188AbgKCBUr (ORCPT ); Mon, 2 Nov 2020 20:20:47 -0500 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8FE0B2225E; Tue, 3 Nov 2020 01:20:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604366446; bh=iyOK1jee0ofzuWK2iruqh5P+w/16VMaZeppQ6bw4obg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GpOXik4fZ+mQmIH/onL517syqfE7sFTkP75Byd8ZioCqRpLZHErlZ2aN1kAVATfE4 FTDVhOTioXaqd+h9VievOSXY+FYAPUIoAzOZWdjZB4iG1zIGwbDLpl1Uo92sx4o9NM AgWT4Ov57SCZ87T7LgiGFZPVeJ5mcvWAcvBKjN98= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Gabriel Krisman Bertazi , Tejun Heo , Jens Axboe , Sasha Levin , cgroups@vger.kernel.org, linux-block@vger.kernel.org Subject: [PATCH AUTOSEL 4.19 05/11] blk-cgroup: Fix memleak on error path Date: Mon, 2 Nov 2020 20:20:33 -0500 Message-Id: <20201103012039.183672-5-sashal@kernel.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20201103012039.183672-1-sashal@kernel.org> References: <20201103012039.183672-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Gabriel Krisman Bertazi [ Upstream commit 52abfcbd57eefdd54737fc8c2dc79d8f46d4a3e5 ] If new_blkg allocation raced with blk_policy change and blkg_lookup_check fails, new_blkg is leaked. Acked-by: Tejun Heo Signed-off-by: Gabriel Krisman Bertazi Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- block/blk-cgroup.c | 1 + 1 file changed, 1 insertion(+) diff --git a/block/blk-cgroup.c b/block/blk-cgroup.c index a06547fe6f6b4..51fc803c999d7 100644 --- a/block/blk-cgroup.c +++ b/block/blk-cgroup.c @@ -882,6 +882,7 @@ int blkg_conf_prep(struct blkcg *blkcg, const struct blkcg_policy *pol, blkg = blkg_lookup_check(pos, pol, q); if (IS_ERR(blkg)) { ret = PTR_ERR(blkg); + blkg_free(new_blkg); goto fail_unlock; } -- 2.27.0