Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp1094896pxb; Fri, 20 Nov 2020 00:31:54 -0800 (PST) X-Google-Smtp-Source: ABdhPJz2kULA4qLETFANh8f2fwBgv+5orD1LxdhKrTeGmdu6G0jDrC8csUK3tmD4rMXAS0MDocqF X-Received: by 2002:a17:906:dbf4:: with SMTP id yd20mr30994780ejb.53.1605861114569; Fri, 20 Nov 2020 00:31:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605861114; cv=none; d=google.com; s=arc-20160816; b=rBdoZoB1CeBYH7G0WChMiULCFFxDgUsLI6HpFB49s4uLZUjmlg5PL807NWjyG9naaC YyDqOQVT09uoKnFqt7vBqYFS1qRQ7rwWMu+OsX8S4FquhFY45HkSLP/P+MrkZ/Vx9COk Bu2gP9rWn/cG1Ppos6BAW4Yofmy5j1LEK6kyBEnQInJqtvwzBV+7NTib8S5KavvdLuYM u4yMjk9K4R3TwsGzZ4YLaGzNurkWRJxeRegXDQ/GRNPh3IaJqvowTotAV0T7oM2rCxpc cxFxle1r1CEa7Gz4/AK+6l39iyhRs35WVnkgQNDQA/Z66hFiWvqIUVko6LNC/7cs5wzV q4vg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=rWbZEsDNMrBmucoEConqyOcylLo9ZXVEx2NFHzehCJk=; b=RoyaTsbMG4+wySj3qKgx/UedmbrUrq5qmKm4A0dFp3NZ1YWrJvCKuH7aioNfgUZ3uH dJZL3s+1GaZRd97AGiI5gkqrpjUTksu98KVXkR33wDukPUpEr3kCGWopotDfNsIsi07U 1jfvlGXmw6i5R/vXE/WzxrHAjSdcI9t2klahdmJng+sTpD9AVCrrTvd7ovF66ik6i67r icHMYjuwhq5nygwLucG1zstzz/+psOZBZLl4jc4vbziEvkiXzJmg9v/2Wql8f7OtFeaZ PyvswTVWMXrs5ikHVG4eCdjt9P1idwI7neu6u4mpKsU2Kd+jBW3DPq/SglvGsPQcSkT+ zTMw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k12si1325334eds.191.2020.11.20.00.31.31; Fri, 20 Nov 2020 00:31:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727118AbgKTI37 (ORCPT + 99 others); Fri, 20 Nov 2020 03:29:59 -0500 Received: from szxga04-in.huawei.com ([45.249.212.190]:7709 "EHLO szxga04-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725801AbgKTI37 (ORCPT ); Fri, 20 Nov 2020 03:29:59 -0500 Received: from DGGEMS403-HUB.china.huawei.com (unknown [172.30.72.58]) by szxga04-in.huawei.com (SkyGuard) with ESMTP id 4CcqTq21P7zkc9s; Fri, 20 Nov 2020 16:29:35 +0800 (CST) Received: from [10.174.179.81] (10.174.179.81) by DGGEMS403-HUB.china.huawei.com (10.3.19.203) with Microsoft SMTP Server id 14.3.487.0; Fri, 20 Nov 2020 16:29:53 +0800 Subject: Re: [PATCH net] ipvs: fix possible memory leak in ip_vs_control_net_init To: Julian Anastasov CC: , , , , , , , , , , , , References: <20201119104102.67427-1-wanghai38@huawei.com> From: "wanghai (M)" Message-ID: <0574c34c-60a8-8d8d-38b1-962898e55801@huawei.com> Date: Fri, 20 Nov 2020 16:29:52 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="gbk"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.174.179.81] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ?? 2020/11/20 2:22, Julian Anastasov ะด??: > Hello, > > On Thu, 19 Nov 2020, Wang Hai wrote: > >> kmemleak report a memory leak as follows: >> >> BUG: memory leak >> unreferenced object 0xffff8880759ea000 (size 256): >> comm "syz-executor.3", pid 6484, jiffies 4297476946 (age 48.546s) >> hex dump (first 32 bytes): >> 00 00 00 00 01 00 00 00 08 a0 9e 75 80 88 ff ff ...........u.... [...] >> Reported-by: Hulk Robot >> Signed-off-by: Wang Hai >> --- >> net/netfilter/ipvs/ip_vs_ctl.c | 3 +++ >> 1 file changed, 3 insertions(+) >> >> diff --git a/net/netfilter/ipvs/ip_vs_ctl.c b/net/netfilter/ipvs/ip_vs_ctl.c >> index e279ded4e306..d99bb89e7c25 100644 >> --- a/net/netfilter/ipvs/ip_vs_ctl.c >> +++ b/net/netfilter/ipvs/ip_vs_ctl.c >> @@ -4180,6 +4180,9 @@ int __net_init ip_vs_control_net_init(struct netns_ipvs *ipvs) >> return 0; > May be we should add some #ifdef CONFIG_PROC_FS because > proc_create_net* return NULL when PROC is not used. For example: > > #ifdef CONFIG_PROC_FS > if (!proc_create_net... > goto err_vs; > if (!proc_create_net... > goto err_stats; > ... > #endif > ... > >> err: > #ifdef CONFIG_PROC_FS >> + remove_proc_entry("ip_vs_stats_percpu", ipvs->net->proc_net); > err_percpu: >> + remove_proc_entry("ip_vs_stats", ipvs->net->proc_net); > err_stats: >> + remove_proc_entry("ip_vs", ipvs->net->proc_net); > err_vs: > #endif > >> free_percpu(ipvs->tot_stats.cpustats); >> return -ENOMEM; >> } >> -- > Regards > > -- > Julian Anastasov > > . Thanks for your advice, I just sent v2 ??[PATCH net v2] ipvs: fix possible memory leak in ip_vs_control_net_init?? >