Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3106522pxv; Mon, 12 Jul 2021 09:25:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyfN0kPE6sShqg3ywKyDzGTxcE2hPNW6FG5Sy+9M5kdw73BM6CLzWkw/AF3AtN0ruAXT1xC X-Received: by 2002:a05:6e02:1091:: with SMTP id r17mr23172539ilj.160.1626107132676; Mon, 12 Jul 2021 09:25:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626107132; cv=none; d=google.com; s=arc-20160816; b=v3/WUkC2oQxJOyc//pBgTMj1ccUHdni3tPaVfp0DMjj9NxZ4tMmS/lwcwO4RjAWKMQ IKjFUYngEaFZaOhD7h8/X3rMC1A7SfhmfP1RTuXyxU1eZlS4K9VwvpjOZtoE5qDgkM2O kbPb1TFcfwsNjaTwfyRtXlyFxYgr/gCpiA4giPqi7jGQ2sZH6WP5BOnC9RJUaCMoq0BK TEbth6WD6kcRc6EfDRyzUmBRNlqCLs2RjCaXIfVVsh2yJNAgeOc4Y6GNOuZ6/1LmBUwx MkHyJKnGWEyhZRlSyI9/mmiSZknQP1ix8sUiBrY5OgIJpq5Tf++6W2T2nlp9Ote1tmD0 NxVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=nzUQ5PQkQlYn/Cllz//w9vdJHqABUsXTabedhTI0/K4=; b=sfhtp0+3U+ftDB5e7IPIJCWzaZVX4RVUkHsRIhFFezSVqz1xJaiZ5uN7zLBCYt3kzi KSANcFDOBcuIIWOczwLfMZqefVJLZFB6+Mh3mB/zUe8pqORrggqWAQqdQhAz3yViqWbK BkZnEPQkkR3d9ImFEE8OpUPfI7E5dNTH5vwgeYHB4qguA0Wm1dQSzlfu4xSD+0qxchjB JIgoYhfgeYOz23r8/q5qypee+bPDnZ/ZfrIQcOwAniDjec+Dzw+y/mkUzq7KxL/2J3LW /2MvH1hAHJOaqFhGoTzhvYpmDfPmlyRe3qL84ljQ7OEGeOJY7w0UR1SwvDAoZHynWn2F qHxQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=RY1+fQlF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w25si13319555iot.26.2021.07.12.09.25.19; Mon, 12 Jul 2021 09:25:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=RY1+fQlF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233642AbhGLQ1W (ORCPT + 99 others); Mon, 12 Jul 2021 12:27:22 -0400 Received: from smtp-relay-canonical-1.canonical.com ([185.125.188.121]:45336 "EHLO smtp-relay-canonical-1.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233609AbhGLQ1U (ORCPT ); Mon, 12 Jul 2021 12:27:20 -0400 Received: from localhost (1.general.cking.uk.vpn [10.172.193.212]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id B36104049F; Mon, 12 Jul 2021 16:24:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1626107070; bh=nzUQ5PQkQlYn/Cllz//w9vdJHqABUsXTabedhTI0/K4=; h=From:To:Subject:Date:Message-Id:MIME-Version:Content-Type; b=RY1+fQlFVSitDYQDBfHlgiutDVkphMnUDk0iOZpE5+aFNj6+ACLQJ4F1C753bqkBU MNqz1azyPoK47wkwzwja8fRoWEZzg067AKndURsdKknu8gm/87UL//adRoZwhIhgnI 21kj8EclG039FiMUtKy0rKU4oimdaq7omQzD1CT/5McMqfEovGzPrIOhK/I9D4rOKn fhh7r9w+eovE9+euRyz9q1Ryhn9KBcCcluwkSdbotPAIQoHVDnX4i11K7Sx3PaWghX PBnB5IDjav+f1c9KGEw9pOoEC/wqkw92GsteVnxa8EOBO/Ri2u07mHu3LuyJSeOF7m vyxjfDS9+ZOAA== From: Colin King To: Bob Peterson , Andreas Gruenbacher , Abhi Das , cluster-devel@redhat.com Cc: kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] gfs2: Fix memory leak of object lsi on error return path Date: Mon, 12 Jul 2021 17:24:30 +0100 Message-Id: <20210712162430.104913-1-colin.king@canonical.com> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin Ian King In the case where IS_ERR(lsi->si_sc_inode) is true the error exit path to free_local does not kfree the allocated object lsi leading to a memory leak. Fix this by kfree'ing lst before taking the error exit path. Addresses-Coverity: ("Resource leak") Fixes: 97fd734ba17e ("gfs2: lookup local statfs inodes prior to journal recovery") Signed-off-by: Colin Ian King --- fs/gfs2/ops_fstype.c | 1 + 1 file changed, 1 insertion(+) diff --git a/fs/gfs2/ops_fstype.c b/fs/gfs2/ops_fstype.c index 5f4504dd0875..bd3b3be1a473 100644 --- a/fs/gfs2/ops_fstype.c +++ b/fs/gfs2/ops_fstype.c @@ -677,6 +677,7 @@ static int init_statfs(struct gfs2_sbd *sdp) error = PTR_ERR(lsi->si_sc_inode); fs_err(sdp, "can't find local \"sc\" file#%u: %d\n", jd->jd_jid, error); + kfree(lsi); goto free_local; } lsi->si_jid = jd->jd_jid; -- 2.31.1