Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp2273860pxb; Mon, 12 Apr 2021 20:24:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx62a6vm50gX6y6mnYmuniHt9OcyN9nretSjZwIX4XLcal64r1WdyBDBpbABwzHga251pmS X-Received: by 2002:a05:6402:1013:: with SMTP id c19mr32455097edu.213.1618284267148; Mon, 12 Apr 2021 20:24:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618284267; cv=none; d=google.com; s=arc-20160816; b=t+SgwzPgMgJZsRxtbUHLxSmzGeSNMzbFAwYltqkh/7NaS3yLFwKpUgxqBiagSaugSC k7g5Ig84l3cnYAskWgieZoj7GWpx4USip3Hoc/fM8gVKOYfXJhWOeJAC3aOa4Bdn3EjI lZJfow1Y9v/eHdCoCNY1eonlnuZBkj1n2GINMJL/jZDyBmMf+LkRHXyNTmM30dhJhPJJ 1gByxk22RUjMfdeTpAvadouL/k8YlgaWbLmikPTaiaJQfH6eXrCiko5kDn8efFE0Kn5R btPS9trzn7G7aWBr/S2MUvpL14afX/flqmVO+MggS+e9GI7ic14Qxw1ng73XS8D01FZi 1HQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=QKoalR9J+WU3bjJGvLXhcQGEnQVWi1PGcVr9Ehq2xVw=; b=mF/zaGaUnG3fiCqpL+1DtFT5pXfG7yQ6Yt/35NPMrhI6Fl8TixoBOX6RwrxX6kiDwf mYdZtvfTgWoUkJT8mjgOf+U+CCnNO7opyRpW+3q5dhsEk3b/zK8G6snNoRDjFbC/s5Df iknOLAACTMoU9Uipks4zpAkdyYU/Myxj8cYXeJ6fkGCQlgjzfLo+XX7OHI8lx9hYh1T4 jStAYJDaC0tEGBaOCydo7c2UcTBlCS2+Ynb2rK3WZ4vIwedHGWigjO2tYDgoaIe2MUpQ iBlVmrpRF5Mof3Bs6KBvaSQKW+9/XpsU0wm/oWxksUQLte1TFxLev9GJA7V4xwkxrimE wuZg== ARC-Authentication-Results: i=1; mx.google.com; dkim=temperror (no key for signature) header.i=@szeredi.hu header.s=google header.b=fO8IYqoA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e9si8945116ejq.308.2021.04.12.20.24.04; Mon, 12 Apr 2021 20:24:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=temperror (no key for signature) header.i=@szeredi.hu header.s=google header.b=fO8IYqoA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242647AbhDLPRA (ORCPT + 99 others); Mon, 12 Apr 2021 11:17:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37058 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238015AbhDLPQ7 (ORCPT ); Mon, 12 Apr 2021 11:16:59 -0400 Received: from mail-ua1-x932.google.com (mail-ua1-x932.google.com [IPv6:2607:f8b0:4864:20::932]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A0EFDC061574 for ; Mon, 12 Apr 2021 08:16:41 -0700 (PDT) Received: by mail-ua1-x932.google.com with SMTP id z23so3152362uan.8 for ; Mon, 12 Apr 2021 08:16:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=szeredi.hu; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=QKoalR9J+WU3bjJGvLXhcQGEnQVWi1PGcVr9Ehq2xVw=; b=fO8IYqoAwqhSlT3rrWn1yQEJTVt/QiQ4YaIlpZNtUdao/p4yykiL30R1EcDI+8i3+r U1TwTh50+L3N2MWymVR8NBXzztI/a3DCetrwXiLjJTqgFbzHBt/ZL2A54f+a3qXJYySM bW+ItRLEPOg5Gy7H+mSdpK8NM7IVQeI/qIgmw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=QKoalR9J+WU3bjJGvLXhcQGEnQVWi1PGcVr9Ehq2xVw=; b=jvECxz+PJHGwARwrHNlk+XzzvfYbi6YSSkHSe/2eRAKbQyujaywnC7/njWiS43Mm9K V04V7lCp1PD909nobpcbqLF3po/5cwgu2g1oFYdRYsPR5hFFkzXcgQOa+BGKZMIwN62q QMtQk79l1SJ/PHhW5yovCV6HjFX4jK7CGISC6lX9GFJMDgCmACo9j0qRyf67h+7GCiWE bWZCXuERHTpsASF0D/1Wh28QhaprYpqB460dA4vXxvAofqFB68mniE78N+Q71XHE4gju ZMvh5EXGIWqZi7lOP+RA1WNZECc73vJgZhpAg0F07qc02H35rSyP8pCX8WnPVAw2b17C f5Ig== X-Gm-Message-State: AOAM530JyC+814DAyAI/o3ddQJDy3Go+Ywnvc+mxvEjDr0WSsf5kZcwv bn31SAlXQ6Oyk4A1p35CYa2oGod8cdCH5ODKTnzOQw== X-Received: by 2002:ab0:3570:: with SMTP id e16mr5987892uaa.13.1618240600915; Mon, 12 Apr 2021 08:16:40 -0700 (PDT) MIME-Version: 1.0 References: <20210317084443.22657-1-lhenriques@suse.de> In-Reply-To: <20210317084443.22657-1-lhenriques@suse.de> From: Miklos Szeredi Date: Mon, 12 Apr 2021 17:16:29 +0200 Message-ID: Subject: Re: [PATCH v2] virtiofs: fix memory leak in virtio_fs_probe() To: Luis Henriques Cc: Vivek Goyal , Stefan Hajnoczi , virtualization@lists.linux-foundation.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, virtio-fs-list , stable Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 17, 2021 at 9:43 AM Luis Henriques wrote: > > When accidentally passing twice the same tag to qemu, kmemleak ended up > reporting a memory leak in virtiofs. Also, looking at the log I saw the > following error (that's when I realised the duplicated tag): > > virtiofs: probe of virtio5 failed with error -17 > > Here's the kmemleak log for reference: > > unreferenced object 0xffff888103d47800 (size 1024): > comm "systemd-udevd", pid 118, jiffies 4294893780 (age 18.340s) > hex dump (first 32 bytes): > 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... > ff ff ff ff ff ff ff ff 80 90 02 a0 ff ff ff ff ................ > backtrace: > [<000000000ebb87c1>] virtio_fs_probe+0x171/0x7ae [virtiofs] > [<00000000f8aca419>] virtio_dev_probe+0x15f/0x210 > [<000000004d6baf3c>] really_probe+0xea/0x430 > [<00000000a6ceeac8>] device_driver_attach+0xa8/0xb0 > [<00000000196f47a7>] __driver_attach+0x98/0x140 > [<000000000b20601d>] bus_for_each_dev+0x7b/0xc0 > [<00000000399c7b7f>] bus_add_driver+0x11b/0x1f0 > [<0000000032b09ba7>] driver_register+0x8f/0xe0 > [<00000000cdd55998>] 0xffffffffa002c013 > [<000000000ea196a2>] do_one_initcall+0x64/0x2e0 > [<0000000008f727ce>] do_init_module+0x5c/0x260 > [<000000003cdedab6>] __do_sys_finit_module+0xb5/0x120 > [<00000000ad2f48c6>] do_syscall_64+0x33/0x40 > [<00000000809526b5>] entry_SYSCALL_64_after_hwframe+0x44/0xae > > Cc: stable@vger.kernel.org > Signed-off-by: Luis Henriques > --- > Changes since v1: > - Use kfree() to free fs->vqs instead of calling virtio_fs_put() Applied, thanks. Miklos