Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp1765664rdb; Sun, 24 Dec 2023 00:22:36 -0800 (PST) X-Google-Smtp-Source: AGHT+IHpCccmB4pfwLJ/oL4hjVk1ph5Gl1rASpYw15aVvBIa/kk0XIP32nH0ccw7uauMxqQNWSo+ X-Received: by 2002:ac8:4e82:0:b0:425:4043:5f25 with SMTP id 2-20020ac84e82000000b0042540435f25mr5630499qtp.99.1703406156544; Sun, 24 Dec 2023 00:22:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703406156; cv=none; d=google.com; s=arc-20160816; b=YQWb+yRBqwC86h8pYGWBi6exOc8L02vXTX20zcn75TlRNq/5lZMg3VnA/gVIzj+r9Z NeWfLRQzRTfV0wZdLHy1EnHQJDA7DBVvcUDzolbkNKWZfxbwB5VxSs7vN8pcyc/6Orrh 063RHaVaA8WY35jRMao9QKOFsPWaRZgigfFEjX2quvuStySivTxN5EL6+eD4JEey0acp Mc+NeTuIRGFZMZzWoKcWMDHOJoVGCM+7KF3Gq5cJIMc4lZpCd+ER6c5fXxzMHt+7aljs oo6PAbNmDNZ3QLZZk+ipdTJiPn3g6dgxNEfW30X3r37u2aG44MVzr+GdLnDYL0bHLYes RK7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from; bh=yVKMqqDdwt67FI91JhpAis/I2gEm2OkH/Olxhe1G6hs=; fh=1xiDAqkkVHZii2GdWpMofN9yB5ISN5eVVPZabuSIzY4=; b=TZNrBxcnKl4vu1URQDcowQG6SJrmj67sfEDMk3dYVVT6S3hb9wDl6t2VzQlwCXmcqO jSVUuvvwQLRG1u23RvfBTzBsfdIfSERRhJ77tXaOm083dAX8e9GrgtETK9J+/JbpX/nD MWXfZy+PglkGICyyh++Yp4t+k4wOeVWC8mNo/2t6cp8DWGsqwZRuRg7tforlaGqV4zMj 8ek/43HWlHFrXKON7hqzUXyLhh8Lwrjhrpf76vpj9p4U9VSRtM+MiKbXGhIzwbGWwu9d o4oTksXvB4m1r3pL4jgsLFdfYTXYg5PwnVMYg7wMhVyHC0GcnwQIJtjEOCpLdbZxjbVc 3kwA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs+bounces-789-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-nfs+bounces-789-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id u21-20020ac858d5000000b004277f654077si8500191qta.132.2023.12.24.00.22.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 24 Dec 2023 00:22:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs+bounces-789-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs+bounces-789-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-nfs+bounces-789-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 3D50E1C20C1C for ; Sun, 24 Dec 2023 08:22:36 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C86051398; Sun, 24 Dec 2023 08:22:32 +0000 (UTC) X-Original-To: linux-nfs@vger.kernel.org Received: from azure-sdnproxy.icoremail.net (azure-sdnproxy.icoremail.net [52.237.72.81]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 6EC655663; Sun, 24 Dec 2023 08:22:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=zju.edu.cn Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=zju.edu.cn Received: from luzhipeng.223.5.5.5 (unknown [122.235.137.177]) by mail-app3 (Coremail) with SMTP id cC_KCgCnERga6odlIsVjAQ--.39108S2; Sun, 24 Dec 2023 16:21:47 +0800 (CST) From: Zhipeng Lu To: alexious@zju.edu.cn Cc: Trond Myklebust , Anna Schumaker , Chuck Lever , Jeff Layton , Neil Brown , Olga Kornievskaia , Dai Ngo , Tom Talpey , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simo Sorce , Steve Dickson , Kevin Coffman , linux-nfs@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] SUNRPC: fix a memleak in gss_import_v2_context Date: Sun, 24 Dec 2023 16:20:33 +0800 Message-Id: <20231224082035.3538560-1-alexious@zju.edu.cn> X-Mailer: git-send-email 2.34.1 Precedence: bulk X-Mailing-List: linux-nfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-CM-TRANSID:cC_KCgCnERga6odlIsVjAQ--.39108S2 X-Coremail-Antispam: 1UD129KBjvJXoW7CFWkGFWxKF4DGryxGr1fXrb_yoW8GFW7pF Z8Z347trZ8WFWIyFySka4jv3WxCw4kJryUWanFqw43ArnaqFykK3WUuryq9FWrZr4rXFyU CF1DGF98Z3WDuwUanT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUUvC14x267AKxVW5JVWrJwAFc2x0x2IEx4CE42xK8VAvwI8IcIk0 rVWrJVCq3wAFIxvE14AKwVWUJVWUGwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK02 1l84ACjcxK6xIIjxv20xvE14v26w1j6s0DM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26r4U JVWxJr1l84ACjcxK6I8E87Iv67AKxVW0oVCq3wA2z4x0Y4vEx4A2jsIEc7CjxVAFwI0_Gc CE3s1le2I262IYc4CY6c8Ij28IcVAaY2xG8wAqx4xG64xvF2IEw4CE5I8CrVC2j2WlYx0E 2Ix0cI8IcVAFwI0_Jr0_Jr4lYx0Ex4A2jsIE14v26r1j6r4UMcvjeVCFs4IE7xkEbVWUJV W8JwACjcxG0xvY0x0EwIxGrwACjI8F5VA0II8E6IAqYI8I648v4I1lFIxGxcIEc7CjxVA2 Y2ka0xkIwI1lc2xSY4AK67AK6r43MxAIw28IcxkI7VAKI48JMxC20s026xCaFVCjc4AY6r 1j6r4UMI8I3I0E5I8CrVAFwI0_Jr0_Jr4lx2IqxVCjr7xvwVAFwI0_JrI_JrWlx4CE17CE b7AF67AKxVW8ZVWrXwCIc40Y0x0EwIxGrwCI42IY6xIIjxv20xvE14v26r1j6r1xMIIF0x vE2Ix0cI8IcVCY1x0267AKxVW8JVWxJwCI42IY6xAIw20EY4v20xvaj40_Jr0_JF4lIxAI cVC2z280aVAFwI0_Jr0_Gr1lIxAIcVC2z280aVCY1x0267AKxVW8JVW8JrUvcSsGvfC2Kf nxnUUI43ZEXa7VUjXTm3UUUUU== X-CM-SenderInfo: qrsrjiarszq6lmxovvfxof0/ The ctx->mech_used.data allocated by kmemdup is not freed in neither gss_import_v2_context nor it only caller radeon_driver_open_kms. Thus, this patch reform the last call of gss_import_v2_context to the gss_krb5_import_ctx_v2, preventing the memleak while keepping the return formation. Fixes: 47d848077629 ("gss_krb5: handle new context format from gssd") Signed-off-by: Zhipeng Lu --- net/sunrpc/auth_gss/gss_krb5_mech.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/net/sunrpc/auth_gss/gss_krb5_mech.c b/net/sunrpc/auth_gss/gss_krb5_mech.c index e31cfdf7eadc..1e54bd63e3f0 100644 --- a/net/sunrpc/auth_gss/gss_krb5_mech.c +++ b/net/sunrpc/auth_gss/gss_krb5_mech.c @@ -398,6 +398,7 @@ gss_import_v2_context(const void *p, const void *end, struct krb5_ctx *ctx, u64 seq_send64; int keylen; u32 time32; + int ret; p = simple_get_bytes(p, end, &ctx->flags, sizeof(ctx->flags)); if (IS_ERR(p)) @@ -450,8 +451,14 @@ gss_import_v2_context(const void *p, const void *end, struct krb5_ctx *ctx, } ctx->mech_used.len = gss_kerberos_mech.gm_oid.len; - return gss_krb5_import_ctx_v2(ctx, gfp_mask); + ret = gss_krb5_import_ctx_v2(ctx, gfp_mask); + if (ret) { + p = ERR_PTR(ret); + goto out_free; + }; +out_free: + kfree(ctx->mech_used.data); out_err: return PTR_ERR(p); } -- 2.34.1