Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp407189pxu; Tue, 1 Dec 2020 14:29:24 -0800 (PST) X-Google-Smtp-Source: ABdhPJwVlZft2PJuw1CGkYOye1xmyo9uiowYYAebJpoTnxAPqniy/1StakqXwiabDZEFGkJ+rWA+ X-Received: by 2002:aa7:dacf:: with SMTP id x15mr4674932eds.134.1606861764652; Tue, 01 Dec 2020 14:29:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606861764; cv=none; d=google.com; s=arc-20160816; b=qh++ou+wpnWfclPgBrJQaStKqXUk8L8nVDyaxcqDWDvs+RyxXDnKnE4z0ASFEMMZyS fX2mlyGyhz7IDvRZaskTEWLld0qFIdYZ7jwVTgh865Pzp8/joFJxfa6+k2kiRizYHSFe hhSBn7gJcisj5YhKFVMssY+YpSWnwnzGV3nYy4kSf0eiTDi0R9+/8XNiTAaTMlccYgQx 6m7mRGNzOaLgPz/4ZdmCDdvnAaUY0YurbeelnTDPG2fgvd1sAVkHf12kmxqcwTBLUK5y pGvjKc9aOXUut2/gt5gkD9VLu1P5nfGmAcOM5ZpvDA2xxdDEieJTnFaSqsMQdg9DVu37 ZajQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=c4R4OjJ7OQqwx2+r5P6ciwJQoPEy2X3TqwnbKPoxi4U=; b=NXRKxWEiXVFNKsH9j9a1rxAnGFwJxjOfkiHI6qRwrrwLt1tSH59oV3mCP6IRRgTOvT nAnUyaNRjBZjwky5nV0r6jaBPxuehwMSccynOc4WxTMZOo+BYhnv25kTDxSIY73At49u paNM2pqkLaaFVVOOt5xnKLUUwbQ5TomAg8JksAZ6zqP/15ZtvrhfEkmjD//RnlmtB9iZ lA2VEqPjTdsao22URwiLuFixCkqc3ns1fYU4Eh7FQ0fGejUt6Lpax4PGWUWVcrdsfpu6 hxaKYUg/reG4P8kTw6vuF/mAe3GafK/w9UbwkBn+7tfllt6A32SRirw6v4L3DtJJsDxv /qfg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lIKtle4b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r15si771674edx.70.2020.12.01.14.29.02; Tue, 01 Dec 2020 14:29:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lIKtle4b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390116AbgLAJNe (ORCPT + 99 others); Tue, 1 Dec 2020 04:13:34 -0500 Received: from mail.kernel.org ([198.145.29.99]:51926 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389205AbgLAJNc (ORCPT ); Tue, 1 Dec 2020 04:13:32 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 92A412222A; Tue, 1 Dec 2020 09:12:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1606813966; bh=JtMhhAy4hy8eQXgny1H9MCcW5Ki7l+Ee4v7zUivDbjA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lIKtle4bdI8rtplA2UynfrhRzweUtFD18Dn7X3oYkmzIkKW3eLCnMMLBtcNuCJO/n Xe/4m3UUJ0C7GdILC04PdQFGwOAK5TEqxFhLev4pVUgY5Hj/+uPpdALk2HDxj74Y1L mcE9KytgjfDNuIXflJr9lizw89S6ev/RUJ+Bag+s= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vamshi K Sthambamkadi , David Laight , Ard Biesheuvel , Sasha Levin Subject: [PATCH 5.9 121/152] efivarfs: revert "fix memory leak in efivarfs_create()" Date: Tue, 1 Dec 2020 09:53:56 +0100 Message-Id: <20201201084727.640687824@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201201084711.707195422@linuxfoundation.org> References: <20201201084711.707195422@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ard Biesheuvel [ Upstream commit ff04f3b6f2e27f8ae28a498416af2a8dd5072b43 ] The memory leak addressed by commit fe5186cf12e3 is a false positive: all allocations are recorded in a linked list, and freed when the filesystem is unmounted. This leads to double frees, and as reported by David, leads to crashes if SLUB is configured to self destruct when double frees occur. So drop the redundant kfree() again, and instead, mark the offending pointer variable so the allocation is ignored by kmemleak. Cc: Vamshi K Sthambamkadi Fixes: fe5186cf12e3 ("efivarfs: fix memory leak in efivarfs_create()") Reported-by: David Laight Signed-off-by: Ard Biesheuvel Signed-off-by: Sasha Levin --- fs/efivarfs/inode.c | 2 ++ fs/efivarfs/super.c | 1 - 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/fs/efivarfs/inode.c b/fs/efivarfs/inode.c index 96c0c86f3fffe..0297ad95eb5cc 100644 --- a/fs/efivarfs/inode.c +++ b/fs/efivarfs/inode.c @@ -7,6 +7,7 @@ #include #include #include +#include #include #include @@ -103,6 +104,7 @@ static int efivarfs_create(struct inode *dir, struct dentry *dentry, var->var.VariableName[i] = '\0'; inode->i_private = var; + kmemleak_ignore(var); err = efivar_entry_add(var, &efivarfs_list); if (err) diff --git a/fs/efivarfs/super.c b/fs/efivarfs/super.c index f943fd0b0699c..15880a68faadc 100644 --- a/fs/efivarfs/super.c +++ b/fs/efivarfs/super.c @@ -21,7 +21,6 @@ LIST_HEAD(efivarfs_list); static void efivarfs_evict_inode(struct inode *inode) { clear_inode(inode); - kfree(inode->i_private); } static const struct super_operations efivarfs_ops = { -- 2.27.0