Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp403857pxu; Tue, 1 Dec 2020 14:23:50 -0800 (PST) X-Google-Smtp-Source: ABdhPJx7y/xaCb48TRQ7EfnPUM+HVHQG1RUvmnsMFntPp+h+3WwvsZRv2gnB4rIlmnhiqR3vZpi7 X-Received: by 2002:aa7:c248:: with SMTP id y8mr5429400edo.344.1606861430661; Tue, 01 Dec 2020 14:23:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606861430; cv=none; d=google.com; s=arc-20160816; b=GlbKZH2WHWElCRUigN2U7ZimDeL5FvYIuUhYWLgbI2oauAVm5w6Ag1LUez6ubUaNQv YYvVIYfKUsTvKPSqjrKvrSfzdMSld3LuYCrk0YIJc8P/tuEf8hcuSScDquML48bGE9mm 5s5KTKnLOcCbk3aKd9Ew3UBuCVjjRSaycZwLDJ7leCYVwzgiy6Be0BYgybC50ITV1w1Z E1hOAhKH33lWgm5oXOgvy9igMJtewZTjBU+uVPh7Xx0V+JsJ0sEtnTfB/RYordDeyb3N 7MzVILv7FjufcugXxg6AflQtg7wvDXJZyMATBzCT55HZu80c6BJCiyvigIrfqKMCA2tt Qa/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=/AIXAePFy/Fy5Fd4CUGAOhOYvZaLdosOrmfAlD5qaSw=; b=R5kDALaMjYclgjVpZWjINKe34jvxw5zYhmPb6T8ubkXu3kELLzBfq0k//S4F57CgP2 h39bxzzXEtwOHaKqUDnruRm+qDM2jLxiHXhG9ej9AZQAvzBZmqi18wvSwd2sD7cGDTnY yn+cQMg2PANP4NkFeYVqVr4pNg//ULd1YLcYQ5v5lAESVYc/CA9ZiZP8D1og488vfgyY z1vCCuLgch4lEA4kSF0pkOrqxp1RKAmu6R8wuC/mcSdQgpBPOhUEc/8ZFMJY+rph8oYO UsGL6dNQxvIxkY6cirQk+aBVwYN40jWMWr8hEpEsXwS5luck7x680nuS5/D51Ci4/Fg0 rRxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=k34w3tCZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a1si814730edn.203.2020.12.01.14.23.28; Tue, 01 Dec 2020 14:23:50 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=k34w3tCZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389040AbgLAJHy (ORCPT + 99 others); Tue, 1 Dec 2020 04:07:54 -0500 Received: from mail.kernel.org ([198.145.29.99]:42944 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388521AbgLAJGE (ORCPT ); Tue, 1 Dec 2020 04:06:04 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AE3862222A; Tue, 1 Dec 2020 09:05:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1606813523; bh=3wPlLN3W0AFyPE6UOuf9HETxZ6LGO6D/6qGJAU0OUDs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=k34w3tCZ9PPR6lxemtClimnnNcV/iD9Pxl7JRNOhHmX6rBzK3SYogsMtKq+g5PEB9 6AJD+JqgllCQi0yohFhZH0/AMMq0l3aUfiotGQustDpPq6GUOxtAUzRo3fTc1EQaRU R47SSA7L52+Hvi5jc/3Qttemv1cEQZhY+JRtSOYY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vamshi K Sthambamkadi , David Laight , Ard Biesheuvel , Sasha Levin Subject: [PATCH 5.4 69/98] efivarfs: revert "fix memory leak in efivarfs_create()" Date: Tue, 1 Dec 2020 09:53:46 +0100 Message-Id: <20201201084658.465023247@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201201084652.827177826@linuxfoundation.org> References: <20201201084652.827177826@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ard Biesheuvel [ Upstream commit ff04f3b6f2e27f8ae28a498416af2a8dd5072b43 ] The memory leak addressed by commit fe5186cf12e3 is a false positive: all allocations are recorded in a linked list, and freed when the filesystem is unmounted. This leads to double frees, and as reported by David, leads to crashes if SLUB is configured to self destruct when double frees occur. So drop the redundant kfree() again, and instead, mark the offending pointer variable so the allocation is ignored by kmemleak. Cc: Vamshi K Sthambamkadi Fixes: fe5186cf12e3 ("efivarfs: fix memory leak in efivarfs_create()") Reported-by: David Laight Signed-off-by: Ard Biesheuvel Signed-off-by: Sasha Levin --- fs/efivarfs/inode.c | 2 ++ fs/efivarfs/super.c | 1 - 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/fs/efivarfs/inode.c b/fs/efivarfs/inode.c index 96c0c86f3fffe..0297ad95eb5cc 100644 --- a/fs/efivarfs/inode.c +++ b/fs/efivarfs/inode.c @@ -7,6 +7,7 @@ #include #include #include +#include #include #include @@ -103,6 +104,7 @@ static int efivarfs_create(struct inode *dir, struct dentry *dentry, var->var.VariableName[i] = '\0'; inode->i_private = var; + kmemleak_ignore(var); err = efivar_entry_add(var, &efivarfs_list); if (err) diff --git a/fs/efivarfs/super.c b/fs/efivarfs/super.c index edcd6769a94b4..9760a52800b42 100644 --- a/fs/efivarfs/super.c +++ b/fs/efivarfs/super.c @@ -21,7 +21,6 @@ LIST_HEAD(efivarfs_list); static void efivarfs_evict_inode(struct inode *inode) { clear_inode(inode); - kfree(inode->i_private); } static const struct super_operations efivarfs_ops = { -- 2.27.0