Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp373186rwi; Tue, 18 Oct 2022 19:29:31 -0700 (PDT) X-Google-Smtp-Source: AMsMyM69lPu6r5KcT4Wfkp4ODCJq1nbb+TTnZUi/rmf27d2w63NOotazSfLlSp/AR+gD/6Ct+jBk X-Received: by 2002:a63:3348:0:b0:439:db24:8b02 with SMTP id z69-20020a633348000000b00439db248b02mr5105831pgz.425.1666146570858; Tue, 18 Oct 2022 19:29:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666146570; cv=none; d=google.com; s=arc-20160816; b=cGEtCK3G5xksM3Wr/pk8Psbli5ai8xUH4lY/YCUz3PRMW1NQMGPtvwQMLiC5Yey5kb XKHNnT/nRUEJO14J6lYkRfqpD3dlmDWPlX9RT6h7o6SPubyfOZiATF/CzMmxyEEbDYCL Vcy4cKgZ/S8mpeD4RfiA6VeNj8vmX9tG93rZ2wsp/KATwT/tRNW6F1T04evLoLCeMXKT egPrYHDTU3d4bXGrczg2hIBPiwRzrc49S2wAIYceE4+apE0x8OmuyekwVL6n9d+uVWP3 3IGUh9FO9Jj9twpuiKn1i0dvnraBqrLfAEn3ISsrCUT00sASXUaCBD5k+WLHaLQ5cPZR pKEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:references:cc:to:subject:user-agent:mime-version :date:message-id; bh=YPc2021btL4vBPAH0V8NeiVgoj7W9+PX0jbc6pBuHWA=; b=RpGTEwQGkkl8oVHmhtehs+oU7PyO0QSYsOPdD/wjiYvbKVjiove1bbA9PLkjU2rvji JpI4yaqTnMFN7YBbwFvzWGc9bhwjML9MoQ3CkgE5SMXZj81Gh0A7btiz7u515jM4Y0eJ VU6x9ExPx68DSZI4VoGVqanGcA4ALksuESRYBa8yRChNbCVyJdrFFAP39a6x0XKlmL0e gvjtf1UUUbRDFyW32ryt6iSAi1ZfgB2pjS0jBSkaisH9iIkEf627OqOwcKm7fgAQd+Ds pfiuvqrnErYix+f3+tS4q6AiK97LQjFGXF+aixDV6qz7rztEX58Jk10NAYhF1Nzd5zE2 euQA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t3-20020a170902e84300b001836e51050esi19051826plg.572.2022.10.18.19.29.18; Tue, 18 Oct 2022 19:29:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229833AbiJSC02 (ORCPT + 99 others); Tue, 18 Oct 2022 22:26:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42084 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229848AbiJSC0X (ORCPT ); Tue, 18 Oct 2022 22:26:23 -0400 Received: from out30-133.freemail.mail.aliyun.com (out30-133.freemail.mail.aliyun.com [115.124.30.133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D2C016A4B1 for ; Tue, 18 Oct 2022 19:26:20 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R661e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018045176;MF=joseph.qi@linux.alibaba.com;NM=1;PH=DS;RN=7;SR=0;TI=SMTPD_---0VSYJtJM_1666146375; Received: from 30.221.128.228(mailfrom:joseph.qi@linux.alibaba.com fp:SMTPD_---0VSYJtJM_1666146375) by smtp.aliyun-inc.com; Wed, 19 Oct 2022 10:26:17 +0800 Message-ID: <1adbbf98-2700-27c8-4aca-9510bca91458@linux.alibaba.com> Date: Wed, 19 Oct 2022 10:26:15 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.3.3 Subject: Re: [PATCH] ocfs2: possible memory leak in mlog_sys_init() To: Yang Yingliang , linux-kernel@vger.kernel.org, ocfs2-devel@oss.oracle.com Cc: mark@fasheh.com, jlbec@evilplan.org, gregkh@linuxfoundation.org, akpm@linux-foundation.org References: <20221018075213.736562-1-yangyingliang@huawei.com> <09bb2844-e20a-98e8-c2af-5b6c4795d48e@huawei.com> <0db486eb-6927-927e-3629-958f8f211194@huawei.com> Content-Language: en-US From: Joseph Qi In-Reply-To: <0db486eb-6927-927e-3629-958f8f211194@huawei.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-9.9 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE, SPF_PASS,UNPARSEABLE_RELAY,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/18/22 10:28 PM, Yang Yingliang wrote: > > On 2022/10/18 21:39, Joseph Qi wrote: >> >> On 10/18/22 6:33 PM, Yang Yingliang wrote: >>> Hi, >>> >>> On 2022/10/18 17:02, Joseph Qi wrote: >>>> Hi, >>>> >>>> On 10/18/22 3:52 PM, Yang Yingliang wrote: >>>>> Inject fault while probing module, kset_register() may fail, >>>>> if it fails, but the refcount of kobject is not decreased to >>>>> 0, the name allocated in kobject_set_name() is leaked. Fix >>>>> this by calling kset_put(), so that name can be freed in >>>>> callback function kobject_cleanup(). >>>>> >>>>> unreferenced object 0xffff888100da9348 (size 8): >>>>>     comm "modprobe", pid 257, jiffies 4294701096 (age 33.334s) >>>>>     hex dump (first 8 bytes): >>>>>       6c 6f 67 6d 61 73 6b 00                          logmask. >>>>>     backtrace: >>>>>       [<00000000306e441c>] __kmalloc_node_track_caller+0x44/0x1b0 >>>>>       [<000000007c491a9e>] kstrdup+0x3a/0x70 >>>>>       [<0000000015719a3b>] kstrdup_const+0x63/0x80 >>>>>       [<0000000084e458ea>] kvasprintf_const+0x149/0x180 >>>>>       [<0000000091302b42>] kobject_set_name_vargs+0x56/0x150 >>>>>       [<000000005f48eeac>] kobject_set_name+0xab/0xe0 >>>>> >>>>> Fixes: 34980ca8faeb ("Drivers: clean up direct setting of the name of a kset") >>>>> Signed-off-by: Yang Yingliang >>>>> --- >>>>>    fs/ocfs2/cluster/masklog.c | 7 ++++++- >>>>>    1 file changed, 6 insertions(+), 1 deletion(-) >>>>> >>>>> diff --git a/fs/ocfs2/cluster/masklog.c b/fs/ocfs2/cluster/masklog.c >>>>> index 563881ddbf00..7f9ba816d955 100644 >>>>> --- a/fs/ocfs2/cluster/masklog.c >>>>> +++ b/fs/ocfs2/cluster/masklog.c >>>>> @@ -156,6 +156,7 @@ static struct kset mlog_kset = { >>>>>    int mlog_sys_init(struct kset *o2cb_kset) >>>>>    { >>>>>        int i = 0; >>>>> +    int ret; >>>>>          while (mlog_attrs[i].attr.mode) { >>>>>            mlog_default_attrs[i] = &mlog_attrs[i].attr; >>>>> @@ -165,7 +166,11 @@ int mlog_sys_init(struct kset *o2cb_kset) >>>>>          kobject_set_name(&mlog_kset.kobj, "logmask"); >>>>>        mlog_kset.kobj.kset = o2cb_kset; >>>>> -    return kset_register(&mlog_kset); >>>>> +    ret = kset_register(&mlog_kset); >>>> If register fails, it will call unregister in o2cb_sys_init(), which >>>> will put kobject. >>> They are different ksets, the kset unregistered in o2cb_sys_init() is 'o2cb_kset', the >>> kset used to registered in mlog_sys_init() is 'mlog_kset', and they hold difference >>> refcounts. >>> Yes, you are right. I've mixed the two ksets up. >> In theory, kset_register() may return error because of a NULL kset, so >> here we may not call kset_put() directly, I'm not sure if a static >> checker will happy. >> Though this can't happen since it's already statically allocated... > kset_register() may fail if kobject_add_internal() return error (can't allocate memory), the name > "logmask" is dynamically alloctated while ocfs2 is compile as module and insert it (if ocfs2 is > built in kernel, the name is constant, it won't cause a leak), so the name can be leaked. What I mean is kset_register() may fail with many reasons, or even without kset_init(). I wonder if we have to handle this internal kset_register(), but not leave it to caller. This may benefit other callers as well. Something like: err = kobject_add_internal(&k->kobj); if (err) { kset_put(k); return err; } Thanks, Joseph