Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp408680pxu; Tue, 1 Dec 2020 14:32:02 -0800 (PST) X-Google-Smtp-Source: ABdhPJyXzB2d+NI4NGduEidftoSw8kbUTuzZpwg+vNSCrGu59990+3gIe2tnyS1g+6N0712r6C3R X-Received: by 2002:a17:906:edb2:: with SMTP id sa18mr5028040ejb.264.1606861922429; Tue, 01 Dec 2020 14:32:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606861922; cv=none; d=google.com; s=arc-20160816; b=Aiu+7UsHbRwFsVq9MOJj2ls8gk+AaBjMU3tNZZ5cjeIHvf6JBdmt6xVHjRQdOqOhLb rXArTDEcBZjtMreXVAN7wdbZiP9711nMore5UD3uyxu6zrhvkf2CiLGWH4gD4TNXy1uU ESIpqyta/CNhvuRC2G+1PKlOH5L8Va0D0SjjuUxffmgafjFsfNRx7qs7MrmLM3gWA12I tFqMzNFXWT3UlaYmv1G1gq180TjvWedWSc//H0597d70YBStGha7nIkkBU7KEcwsnfyj Ib6xeMVjPsfE0W3IchhomYMfig/3zu4CKX0gSirlexXcYpOjQflxB0SLbt73PW2/pEAm 9YPg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=hub4cCuTQUxrW3XQPkRVELjDg3JIFHTZdYozsGBw9P4=; b=b8GY+LJ7fwVEzzN5/8MeVz7xVReuAZrqqGLXuGBxr8zWBZKheZS4w0fK3kPg2VZ6GB gNrgGc9CJB09aX9n1C0aHrXiug7w6SNE2n7U4JilfJsaMLLS5fqiJwvoKBaFv9t1mTHC ZIOoZgoQT/wiUKuQfb44MIgms9hvx4H5BjcY9Zd45v4m0+CRShd0/tozxA+KnZ8GHOxT yIoro8D2282mUylkDoYeqjDc9s/jNKgX+6K6Y5KSj9GttR1OnQFDQWluDOeCBNhIZYWG dcyzRKVRASF7kZVgeQW5Hno4a4ixfpRJHrRGwkIqJ/v77G5r7ePbufmqPK8pQ55zSHRf K0Nw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=dfxM7Xau; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y6si777447edm.399.2020.12.01.14.31.40; Tue, 01 Dec 2020 14:32:02 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=dfxM7Xau; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390686AbgLAJ1p (ORCPT + 99 others); Tue, 1 Dec 2020 04:27:45 -0500 Received: from mail.kernel.org ([198.145.29.99]:37284 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388583AbgLAJBm (ORCPT ); Tue, 1 Dec 2020 04:01:42 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6A4FA2067D; Tue, 1 Dec 2020 09:01:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1606813281; bh=pyLb39sxkFy3SOqNh8X0cHTtddtuP5J9fl4PhM2QnIM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dfxM7Xau10V3DsRL8v+39aU6X5cANtO+cU5w3xP5N0opAspF3S5AwN4tV3UHDmuLA Iw7HdKXDIdLHlTMdYgYeo2kYFzKearGkDxH4NjzX78Ubr5xpZvUcr6z2Ju2svqrShs WcaTspcvp+KtYjmyJ6yhbS3H7U2kaGvM+xyfFwnM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vamshi K Sthambamkadi , David Laight , Ard Biesheuvel , Sasha Levin Subject: [PATCH 4.19 44/57] efivarfs: revert "fix memory leak in efivarfs_create()" Date: Tue, 1 Dec 2020 09:53:49 +0100 Message-Id: <20201201084651.264895053@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201201084647.751612010@linuxfoundation.org> References: <20201201084647.751612010@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ard Biesheuvel [ Upstream commit ff04f3b6f2e27f8ae28a498416af2a8dd5072b43 ] The memory leak addressed by commit fe5186cf12e3 is a false positive: all allocations are recorded in a linked list, and freed when the filesystem is unmounted. This leads to double frees, and as reported by David, leads to crashes if SLUB is configured to self destruct when double frees occur. So drop the redundant kfree() again, and instead, mark the offending pointer variable so the allocation is ignored by kmemleak. Cc: Vamshi K Sthambamkadi Fixes: fe5186cf12e3 ("efivarfs: fix memory leak in efivarfs_create()") Reported-by: David Laight Signed-off-by: Ard Biesheuvel Signed-off-by: Sasha Levin --- fs/efivarfs/inode.c | 2 ++ fs/efivarfs/super.c | 1 - 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/fs/efivarfs/inode.c b/fs/efivarfs/inode.c index 8c6ab6c95727e..7f40343b39b05 100644 --- a/fs/efivarfs/inode.c +++ b/fs/efivarfs/inode.c @@ -10,6 +10,7 @@ #include #include #include +#include #include #include @@ -106,6 +107,7 @@ static int efivarfs_create(struct inode *dir, struct dentry *dentry, var->var.VariableName[i] = '\0'; inode->i_private = var; + kmemleak_ignore(var); err = efivar_entry_add(var, &efivarfs_list); if (err) diff --git a/fs/efivarfs/super.c b/fs/efivarfs/super.c index 7808a26bd33fa..834615f13f3e3 100644 --- a/fs/efivarfs/super.c +++ b/fs/efivarfs/super.c @@ -23,7 +23,6 @@ LIST_HEAD(efivarfs_list); static void efivarfs_evict_inode(struct inode *inode) { clear_inode(inode); - kfree(inode->i_private); } static const struct super_operations efivarfs_ops = { -- 2.27.0