Received: by 2002:ac0:da4c:0:0:0:0:0 with SMTP id a12csp1916965imi; Sun, 24 Jul 2022 00:23:15 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vT/konZwawgSbZKLSubYVaEeztPFL5a9dqbzglneChHZCKx3iugq6nOwulJhL0waYPUtFi X-Received: by 2002:a17:907:2d0e:b0:72b:4af7:7ccd with SMTP id gs14-20020a1709072d0e00b0072b4af77ccdmr5647963ejc.209.1658647395180; Sun, 24 Jul 2022 00:23:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658647395; cv=none; d=google.com; s=arc-20160816; b=nNbWxLK1F/VeuubpVnfom96L6/ACNtckwSZfTJieadEiTVeBlZT8dCq/Hlm72qp6lX FpfkG18AjyccOM70uIxiWuV7ooNL4jysvCz4yiKPIr3ayL296xg9T18m6dDNiv2IQ712 xHMRmXi6/6Pq9haM1GSGEVJKt8zFHRAcVej0lnpD3OSZ0lDhg6fRynuDEha9csPSokfi WWrfbhXu248WS3TEJZqnO8G21qSe1EkRqQfY0pjgw6h1PTqWlxbcEpMAug0s0mhmZn4J WZoT9s+AVAZuYx9tqkyIn4Lci8I18g4E5U4xdt7c+PT2DY+rMFn+EbeUXVJ8K5MN/MFp vgOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=dpNagSI2bFC6I2IV51/vPjNxbPqO3+VsQhUx1eiC+1o=; b=NM4MEAucGQ3lWFtOzkSpis8mUi2iJ0Qpt9jaaJKE+MuXkuUamSp12xlBuLl1rs5iYb 1iXZT989tMoPyWLtlNUbpVNAXqR2jJzAry0dhsJoLxTj92py2bppViLjyPXtMxp8+mv2 I7q5aChfs212FBl+71w/Krsjt9FFleZbkqgTiKDLGilaq+V5JvvMkDru52R1MnTq2n9B eKQoxoQhVHB7g4UbVx3V4lRJEvulvaHNU6x1DoK51K2jRj43OUVnc40hQaSWeuNHmPSc BK5/pV3YnKfmFY46VuWcrPP2b4jCbpu/kCGoWM47yI7oJ/pLVUJKKa1brtcbaCJbiybV ExmA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=j3WH1Wi1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b6-20020a056402350600b0043b44f05d89si10649000edd.50.2022.07.24.00.22.49; Sun, 24 Jul 2022 00:23:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=j3WH1Wi1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239160AbiGXHTA (ORCPT + 99 others); Sun, 24 Jul 2022 03:19:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38082 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238921AbiGXHS6 (ORCPT ); Sun, 24 Jul 2022 03:18:58 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0C7C518B20; Sun, 24 Jul 2022 00:18:58 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id A29FEB80D2D; Sun, 24 Jul 2022 07:18:56 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D85E2C341C0; Sun, 24 Jul 2022 07:18:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1658647135; bh=cilKIlwRX04/ZKOXRDFJP5xqs9Q3uNUGrabQaZJDLLo=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=j3WH1Wi1dbsD67j89JBDezOse91s5xYCoDwsT6nHSrW4o7eLNPdwJoMEVL9XYG44E v+peqz/qnKjCwVbrSC6aUeMO3x8XiHy44MncJU6eieR2h4MxGWAsXbaQlWjS1y6Jax uwbP74TrDuvey7rGo+63ttT9Ma+huBfPZD7pTpbo= Date: Sun, 24 Jul 2022 09:18:52 +0200 From: Greg KH To: Jianglei Nie Cc: sj@kernel.org, akpm@linux-foundation.org, damon@lists.linux.dev, linux-mm@kvack.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: Re: [PATCH] mm/damon/reclaim: fix potential memory leak in damon_reclaim_init() Message-ID: References: <20220724065224.2555966-1-niejianglei2021@163.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220724065224.2555966-1-niejianglei2021@163.com> X-Spam-Status: No, score=-7.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Jul 24, 2022 at 02:52:24PM +0800, Jianglei Nie wrote: > damon_reclaim_init() allocates a memory chunk for ctx with > damon_new_ctx(). When damon_select_ops() fails, ctx is not released, which > will lead to a memory leak. > > We should release the ctx with damon_destroy_ctx() when damon_select_ops() > fails to fix the memory leak. > > Fixes: 4d69c3457821 ("mm/damon/reclaim: use damon_select_ops() instead of damon_{v,p}a_set_operations()") > Signed-off-by: Jianglei Nie > --- > mm/damon/reclaim.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/mm/damon/reclaim.c b/mm/damon/reclaim.c > index 4b07c29effe9..0b3c7396cb90 100644 > --- a/mm/damon/reclaim.c > +++ b/mm/damon/reclaim.c > @@ -441,8 +441,10 @@ static int __init damon_reclaim_init(void) > if (!ctx) > return -ENOMEM; > > - if (damon_select_ops(ctx, DAMON_OPS_PADDR)) > + if (damon_select_ops(ctx, DAMON_OPS_PADDR)) { > + damon_destroy_ctx(ctx); > return -EINVAL; > + } > > ctx->callback.after_wmarks_check = damon_reclaim_after_wmarks_check; > ctx->callback.after_aggregation = damon_reclaim_after_aggregation; > -- > 2.25.1 > This is not the correct way to submit patches for inclusion in the stable kernel tree. Please read: https://www.kernel.org/doc/html/latest/process/stable-kernel-rules.html for how to do this properly.