Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp1964086rwl; Thu, 30 Mar 2023 04:11:59 -0700 (PDT) X-Google-Smtp-Source: AKy350YrVJmPIgHdAJcT0KDgsx04CKNzNYSP1888j6L0QxwxgDFE7Lo1WDC2bQ6cLPdc9iiXRfdp X-Received: by 2002:a17:903:244e:b0:19a:839d:b67a with SMTP id l14-20020a170903244e00b0019a839db67amr1879905pls.5.1680174718968; Thu, 30 Mar 2023 04:11:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680174718; cv=none; d=google.com; s=arc-20160816; b=ljXK4E1DkGL9Y4h9JLi+PZsfPVo3/xKIhHd4PfeX318dk6jE6y111u44+kAsy6ESFD UaH8MunbBPO1IY7eI82IcG3TJ0ktjF74UBuiZU6ii+DU/+tgmLw6o6Q+M44uOoz4ykCW zi7CLXD/2+qnYiGjNHbdiZmuQHwAM6B9+Ryi0UT+HAtL9Uv/nkdhLFt4RZEeF2Rv1QRi BcqaM5V9Q1BiuSlVExctTVRrDHKzzUIIpOgww/IRgKVEjDsiCM+xSQT0jlQsq3ZEY1yc 3qWLuBds8OVs/747SPntY7niCDpeDIioyHeGc1aQ3w74dhgAaQGUyDHpWfeR4qC66Wg2 W3Og== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=xs5oLE92wLsrE7h+JAFMES0Wn+GVQzeKYdFDe+ctTyc=; b=gv8wX6NAaVrbwEiyBCDbqruBQ703CEfy/rwPFPVRwQnpvlGZZkk3f5WNgtbswginJi eSBlja35XTeTfF4gvlaa8qCzRUGSAkEOpv2JxUk5o+CH2kTopsNCsMhxMxILv3OjffFz kAyu2+nI+JbIhZ43Hp/kDRMpjnC7Zy0GQRtSb9BgT8LZbcrkQFeQkJIizeFH5HelKjG2 +tAgiDd/jZSkRwGa+ED8zSrx8ByGH57CAWLtlRJaSX8x37lD/y9jemeYkpdg3JP5rUJS XIEeBGD8ms4mnsfhlOMVsWS7U9og1UMa68kvEKFFTWZ/dozi+H6P2Kz6wd8whS+dhAcH Ec8w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ot5-20020a17090b3b4500b002335ea8726dsi4053756pjb.88.2023.03.30.04.11.46; Thu, 30 Mar 2023 04:11:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231482AbjC3LGV (ORCPT + 99 others); Thu, 30 Mar 2023 07:06:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39240 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231493AbjC3LGQ (ORCPT ); Thu, 30 Mar 2023 07:06:16 -0400 Received: from szxga08-in.huawei.com (szxga08-in.huawei.com [45.249.212.255]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ACB4B6A71 for ; Thu, 30 Mar 2023 04:05:59 -0700 (PDT) Received: from kwepemm600013.china.huawei.com (unknown [172.30.72.54]) by szxga08-in.huawei.com (SkyGuard) with ESMTP id 4PnL9X1c9lz17Lbs; Thu, 30 Mar 2023 19:02:40 +0800 (CST) Received: from [10.174.178.46] (10.174.178.46) by kwepemm600013.china.huawei.com (7.193.23.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.21; Thu, 30 Mar 2023 19:05:56 +0800 Subject: Re: [PATCH v2] ubifs: Free memory for tmpfile name To: =?UTF-8?Q?M=c3=a5rten_Lindahl?= , Richard Weinberger CC: , , References: <20230329-memleak-fix-v2-1-cb8d9394300b@axis.com> From: Zhihao Cheng Message-ID: <72ffd9c6-e203-be55-6663-768262fb611e@huawei.com> Date: Thu, 30 Mar 2023 19:05:55 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: <20230329-memleak-fix-v2-1-cb8d9394300b@axis.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.174.178.46] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To kwepemm600013.china.huawei.com (7.193.23.68) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-2.3 required=5.0 tests=NICE_REPLY_A, RCVD_IN_DNSWL_MED,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > When opening a ubifs tmpfile on an encrypted directory, function > fscrypt_setup_filename allocates memory for the name that is to be > stored in the directory entry, but after the name has been copied to the > directory entry inode, the memory is not freed. > > When running kmemleak on it we see that it is registered as a leak. The > report below is triggered by a simple program 'tmpfile' just opening a > tmpfile: > > unreferenced object 0xffff88810178f380 (size 32): > comm "tmpfile", pid 509, jiffies 4294934744 (age 1524.742s) > backtrace: > __kmem_cache_alloc_node > __kmalloc > fscrypt_setup_filename > ubifs_tmpfile > vfs_tmpfile > path_openat > > Free this memory after it has been copied to the inode. > > Signed-off-by: MÃ¥rten Lindahl > --- > Changes in v2: > - Call fscrypt_free_filename after ubifs_release_budget > - Link to v1: https://lore.kernel.org/r/20230329-memleak-fix-v1-1-7133da56ea8f@axis.com > --- > fs/ubifs/dir.c | 1 + > 1 file changed, 1 insertion(+) Reviewed-by: Zhihao Cheng > > diff --git a/fs/ubifs/dir.c b/fs/ubifs/dir.c > index 0f29cf201136..7dd6dd34b84c 100644 > --- a/fs/ubifs/dir.c > +++ b/fs/ubifs/dir.c > @@ -492,6 +492,7 @@ static int ubifs_tmpfile(struct user_namespace *mnt_userns, struct inode *dir, > unlock_2_inodes(dir, inode); > > ubifs_release_budget(c, &req); > + fscrypt_free_filename(&nm); > > return finish_open_simple(file, 0); > > > --- > base-commit: c9c3395d5e3dcc6daee66c6908354d47bf98cb0c > change-id: 20230329-memleak-fix-87a01daf469e > > Best regards, >