Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp832746pxb; Tue, 3 Nov 2020 13:51:34 -0800 (PST) X-Google-Smtp-Source: ABdhPJyTiaDHgv5oG8XvLelDxZ4b27xGpRy9vrWwRn2A6DsE2mKuX4KB6D7vGZ7dIFEDDcWUGK04 X-Received: by 2002:a17:906:2e8e:: with SMTP id o14mr12135041eji.324.1604440294723; Tue, 03 Nov 2020 13:51:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604440294; cv=none; d=google.com; s=arc-20160816; b=SGqymIoer+R9ymxPFatSJyLpjSRWlPW7gWGPZtXuhJ3Qy2p4aQa27+xNWs1zWUDNH9 Ao8mUHMtgbuMb/5fZ22zR0r/nA3HuM2M0LPWxlz9mI/m3lLxAON3OrgG0+MOODxnzpIh 3BfuQwtzl181JxcDNgzu8wW979PuEfmKKDEqDitZNrRWP5N1dCDO6qTrhRewiXVdREk9 YQUHtwhsQzPKGhb4iIsFgHVqfgNQgSb8F9F9qDxBepw6JaP1Sv8HLDnx5uNQqzCaWuTP lmm5CQwmo08GDHbelSno8v1Ujfztwu4NZeIVsQoAoUqg6Jcr8BL3q5KOQuDiJsvBnwc+ VDxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=voSJdnAeBjT6m/ZwUmFOqe6HSyQMA9dkGHpzxUdCT/Q=; b=cjnGzqpENGeoT+G/4KyLc05XqW7qDg75bFdS/id9jLgczoUT6bb8j06MDMdx5W8Foq XAIx8qokZiZ2OmVWXWux6c4qbf1ulLqy7eAMBtjT1JIU85aR/zlMLBc6W2AqV4F7s5eC 05rAl/B1BA0G9Fd9DK9Rv8gDFNj41DuCOy5RG+m1+Eghf4oNPyZu3cQzBmaP6e86nG+Z Y2oETr5Xm2vj+aJRJV37KmQ1VM1J7pYxDujiQuru/K1h58cJT5HWNiFMpzbKroModrnf 26Asc/fCfvYc/2ndOuR8UEQjKo1gB3CG8bdsLR1ygxfMZx0OeHicGAIB9OWGdmqY2Ir3 OYyA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HjEmQ1Lx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l2si79303ejf.667.2020.11.03.13.51.11; Tue, 03 Nov 2020 13:51:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HjEmQ1Lx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731900AbgKCUvC (ORCPT + 99 others); Tue, 3 Nov 2020 15:51:02 -0500 Received: from mail.kernel.org ([198.145.29.99]:45568 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731888AbgKCUu6 (ORCPT ); Tue, 3 Nov 2020 15:50:58 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 78BCC223FD; Tue, 3 Nov 2020 20:50:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604436658; bh=0iF8I9YAUIfLbPPrzUGyLLeDPMKrBWwDnJa4MK0o+A8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HjEmQ1LxFszYK385lUluluQ81fUoBKW/muC7PwcQgZQAUYgj81Hxeaxdjx/kucSja TIzy/EdbDinOtHuc0SDprB5+NXiVMwC7C5nbaal8D6L9LFo6hfiyc52TK0afF1El3Z 0ftRhPHXoaXqg0elntYs6PXtBYEFIgUrIwJaJk30= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Zhihao Cheng , Sascha Hauer , Richard Weinberger Subject: [PATCH 5.9 308/391] ubifs: mount_ubifs: Release authentication resource in error handling path Date: Tue, 3 Nov 2020 21:35:59 +0100 Message-Id: <20201103203407.887841528@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201103203348.153465465@linuxfoundation.org> References: <20201103203348.153465465@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Zhihao Cheng commit e2a05cc7f8229e150243cdae40f2af9021d67a4a upstream. Release the authentication related resource in some error handling branches in mount_ubifs(). Signed-off-by: Zhihao Cheng Cc: # 4.20+ Fixes: d8a22773a12c6d7 ("ubifs: Enable authentication support") Reviewed-by: Sascha Hauer Signed-off-by: Richard Weinberger Signed-off-by: Greg Kroah-Hartman --- fs/ubifs/super.c | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) --- a/fs/ubifs/super.c +++ b/fs/ubifs/super.c @@ -1331,7 +1331,7 @@ static int mount_ubifs(struct ubifs_info err = ubifs_read_superblock(c); if (err) - goto out_free; + goto out_auth; c->probing = 0; @@ -1343,18 +1343,18 @@ static int mount_ubifs(struct ubifs_info ubifs_err(c, "'compressor \"%s\" is not compiled in", ubifs_compr_name(c, c->default_compr)); err = -ENOTSUPP; - goto out_free; + goto out_auth; } err = init_constants_sb(c); if (err) - goto out_free; + goto out_auth; sz = ALIGN(c->max_idx_node_sz, c->min_io_size) * 2; c->cbuf = kmalloc(sz, GFP_NOFS); if (!c->cbuf) { err = -ENOMEM; - goto out_free; + goto out_auth; } err = alloc_wbufs(c); @@ -1629,6 +1629,8 @@ out_wbufs: free_wbufs(c); out_cbuf: kfree(c->cbuf); +out_auth: + ubifs_exit_authentication(c); out_free: kfree(c->write_reserve_buf); kfree(c->bu.buf);