Received: by 2002:ab2:6857:0:b0:1ef:ffd0:ce49 with SMTP id l23csp2518414lqp; Mon, 25 Mar 2024 00:48:51 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXSCqCGTCgGDvn7Xsg0uTl1a82/3ojgS7j6Ni8VX6S6tdLVb1YtSECJsZTIK7Vcf6P4GIOkCPOW68NTx2pXeaG5qzwMlFxKxE9FKknu1A== X-Google-Smtp-Source: AGHT+IEWwouxaW3ocsF4/blHVFZ19Acz70gVKxMsWg1FvEnFBS6/WB01s0+fW7yaKeEndUbIDdNI X-Received: by 2002:a17:906:593:b0:a46:c510:261e with SMTP id 19-20020a170906059300b00a46c510261emr4042452ejn.49.1711352931321; Mon, 25 Mar 2024 00:48:51 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711352931; cv=pass; d=google.com; s=arc-20160816; b=Egje04swBsHK9H239l0NwM04K0DT6uifEo2iyAdu60f2uMXIy69KCco84Mheui7k5o m3UG08DgFX3CzVKVHJRsDH1YCtFySgUzz6uPyY8scfN8WlYaxHlvMwEwZ3SSP4GJZpvE YZAPb4q66s5X1DlYsG08jFZO/CbaHRkq4OMdy/TlC8bKO1dyqkQ7Xh5/iQxRjcrKkfcp UmctIAcxA6TPDdV2lrEIXNcmCinthI/sRrS4291k9WSYVZJ//rkjf57ORmhTrJwhxEee TSIKs9myQegzebw3KYDHGqWn8l5wTGiZxujF7WGahtxcOnP2UMyFiHx5aNqaKb+SABRX emDg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=OhRgoCg1yiWXu0kZsyRbSrTR1DUnhwr+HyQKBdqsCfw=; fh=gztaZlEV/IhaCTI9OXrOTx7G3T0xX7o1SJxZFm84PTI=; b=cN0mqzc+aJRYfhWhZH0x0SdtzrVVjimYi9yzZtqDtSh2xvUT+e9HotHQ9XoJjO8ahN woOITAmQ+k4WiogffXET5DZFNqtvqyVL9aMKax06wC1vu04lsYGGDrNbYGAaoFXL3w6c +e/1iBmidoqu5kU8NUbm/e4BX81Vl05NG3YCimXTVHj2ao5zTDnWqbKIKo6igNxJaha1 oRXrktMYFMeqZUoWpiuZd5I05Czo7bDdjW7wAeW7+fAk4vLt6FxmKZno1BiB7kT64Kwv wgOAXt5xSN7/pIxcMfqer1993RTf35sr9q2qCKclFML4c7fuhpf3cvHBtCRKsPn1SYqq umaA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=m1MbBpuu; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-115576-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-115576-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id x18-20020a170906135200b00a46a7d00b45si2175990ejb.125.2024.03.25.00.48.51 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 25 Mar 2024 00:48:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-115576-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=m1MbBpuu; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-115576-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-115576-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id CE7BD1F2EDE6 for ; Mon, 25 Mar 2024 07:48:50 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7142624EDBC; Mon, 25 Mar 2024 02:44:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="m1MbBpuu" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4F5161F30C8; Sun, 24 Mar 2024 22:58:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711321127; cv=none; b=U4+hA0yji6sWSYMe6dT76k/beRHRL/QeWK7vPxNdRNVMtNl+9Y9BaLQq5LN6F9NW/55ecOvsg2uYQUWdAz/bnbmH7GFy9L6wNtRnWUuXUzyDX4X+glPg4KV2Ld9m1Wd+CnxylRDFXWzuwhEgwbl6h9oJpvvYVWkUufEe4kKZD48= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711321127; c=relaxed/simple; bh=2VIL+MLt/7XqLixGaICvTuQvPKug+Yb+u6KBIUa/lxY=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=pd/ndxiJ1H+WMKQWkOGAOU55JGWIk9LMG0WRzdxieKWjwXsjOsEku/B9Y9NmmwOKGA1ALdXrgWQEs8OvKzGRbTVcpnktWGp14LR8iJuK8VA4dfVsl7d0p/6Em8ilhhBEzqjzSEFVR5duwNCHpL4znr2FMM1Jq96FZl9uHzwUyIA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=m1MbBpuu; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 877B1C43394; Sun, 24 Mar 2024 22:58:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1711321126; bh=2VIL+MLt/7XqLixGaICvTuQvPKug+Yb+u6KBIUa/lxY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=m1MbBpuulXhgJ9AVapaug+DJ23p7j+QpPp1WRgdfXBCCfYPukHnAZAHemnLxj7zmp a2zUJbu7jhF+byKDnLuUXfSsRty+6Yo+awqghasEF5iG2ovedodekHQdX0WKvXVc3V dpWJFk4x4h5oaLh6julMZ+CeQm68DADXkTy5Ioc0HDZs8qnWpV8tEKelRGPFYePqnY vgMgZM8248b74nPCHLF5TRC36JRVi5sokGfOpOhcBJhEcbYsZbrZpkBfFAnsFWC8Bv SqXjGMuo+iPetGR3Ol3jTl57o/5mThDNKPYJ4CKt2a+x33lul6rlxpiRQd+nOGcBoE 6LHO5BMuiLB/Q== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Mikulas Patocka , Mike Snitzer , Sasha Levin Subject: [PATCH 6.7 687/713] dm-integrity: fix a memory leak when rechecking the data Date: Sun, 24 Mar 2024 18:46:53 -0400 Message-ID: <20240324224720.1345309-688-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240324224720.1345309-1-sashal@kernel.org> References: <20240324224720.1345309-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit From: Mikulas Patocka [ Upstream commit 55e565c42dce81a4e49c13262d5bc4eb4c2e588a ] Memory for the "checksums" pointer will leak if the data is rechecked after checksum failure (because the associated kfree won't happen due to 'goto skip_io'). Fix this by freeing the checksums memory before recheck, and just use the "checksum_onstack" memory for storing checksum during recheck. Fixes: c88f5e553fe3 ("dm-integrity: recheck the integrity tag after a failure") Signed-off-by: Mikulas Patocka Signed-off-by: Mike Snitzer Signed-off-by: Sasha Levin --- drivers/md/dm-integrity.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/md/dm-integrity.c b/drivers/md/dm-integrity.c index e8e8fc33d3440..cc834c8423bcf 100644 --- a/drivers/md/dm-integrity.c +++ b/drivers/md/dm-integrity.c @@ -1848,12 +1848,12 @@ static void integrity_metadata(struct work_struct *w) r = dm_integrity_rw_tag(ic, checksums, &dio->metadata_block, &dio->metadata_offset, checksums_ptr - checksums, dio->op == REQ_OP_READ ? TAG_CMP : TAG_WRITE); if (unlikely(r)) { + if (likely(checksums != checksums_onstack)) + kfree(checksums); if (r > 0) { - integrity_recheck(dio, checksums); + integrity_recheck(dio, checksums_onstack); goto skip_io; } - if (likely(checksums != checksums_onstack)) - kfree(checksums); goto error; } -- 2.43.0