Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp2900850rwb; Mon, 19 Sep 2022 11:41:51 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5te0jgWlqxzmTBC25UINT/tTPtWWs0Ra3DvbzVRYRS+q28QXdew/Cb8BuRvUnx5iZklASm X-Received: by 2002:a17:90b:350d:b0:202:ff91:a0bd with SMTP id ls13-20020a17090b350d00b00202ff91a0bdmr32477322pjb.46.1663612910940; Mon, 19 Sep 2022 11:41:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663612910; cv=none; d=google.com; s=arc-20160816; b=h6KXlMZb7PEcsI1HCM6VHSOPhmTdfory7s04NnUjIFRlNmgX6zXdlr78JGnvmMXKtT btCrh9Ri6tdvFx0iqwJ9r2GvCtowfCBWorK79A6TROS7fiO6Ao39ok8C4iIWUuuK78o9 bjBw/34m2jNdkvf8v5/JRAwpSZxdJlNfsOJRIbsxi7G8Ow5BlS9NL1NuV8Lq6forjdfx uzNf5hgdS01gSQqsz4nlUkFeNf6ldYLbkAuGTTcabMGDJQWsEMrxMeChL1WnJy8lSOYD L/gJB6Z71pF23rVNIjDPVQ4KTedvbRArVtw0MlG7QoFgwZgAaibSdEbIqQZkRCEDGXyz Ql+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=w05HtaycO5Xkx8HzorlgaiKYueZeWwrDRAdIdYc9HuQ=; b=srXbL7XzEFLsMRaz6vbP7c+9ca/+pDImSoNMCoc8CUO5jCbabsDS6aAu057lPABCdS pWD8xny710tDL0KqpGyvYuX0WGD24iYIGuWgFs+2Mzq6ZtgMa8kiznDM0a2I5/hqPIwH sh+igmrtfkiz9r9dYdJA81F5nWhbP6d2Z9w1AGGpne5jgsCr74KVJrNtb3Dz1/TPAdTT bki1CZKotwRf7sNt1HAk3mvAL31EVPGYjypNxcUcSIVAsRSTHGFRB9GVgvBx9OiL0GuB i5e16+ILaQ58/PVFtFQn0qe5uexa8FCwTM6kGIgmXjBcDb96FyhRMF3yTTeG/LWb9Oje NSjw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c16-20020a170903235000b0016efb38cf39si33146775plh.141.2022.09.19.11.41.30; Mon, 19 Sep 2022 11:41:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229676AbiISSkp (ORCPT + 99 others); Mon, 19 Sep 2022 14:40:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41672 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229663AbiISSko (ORCPT ); Mon, 19 Sep 2022 14:40:44 -0400 Received: from smtp6-g21.free.fr (smtp6-g21.free.fr [IPv6:2a01:e0c:1:1599::15]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DFE3A3AE75; Mon, 19 Sep 2022 11:40:42 -0700 (PDT) Received: from [192.168.103.121] (unknown [88.163.97.197]) by smtp6-g21.free.fr (Postfix) with ESMTPS id 0166E780371; Mon, 19 Sep 2022 20:40:34 +0200 (CEST) Message-ID: <02fc228b-7cc5-b470-9b5c-8ad726b18158@partition-saving.com> Date: Mon, 19 Sep 2022 20:40:34 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: [PATCH -next 1/2] ext4: fix potential memory leak in ext4_fc_record_regions() Content-Language: en-US To: Ye Bin , tytso@mit.edu, adilger.kernel@dilger.ca, linux-ext4@vger.kernel.org Cc: linux-kernel@vger.kernel.org, jack@suse.cz References: <20220919144021.2162295-1-yebin10@huawei.com> <20220919144021.2162295-2-yebin10@huawei.com> From: Damien Guibouret In-Reply-To: <20220919144021.2162295-2-yebin10@huawei.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org Hello, Le 19/09/2022 à 16:40, Ye Bin a écrit : > As krealloc may return NULL, in this case 'state->fc_regions' may not be > freed by krealloc, but 'state->fc_regions' already set NULL. Then will > lead to 'state->fc_regions' memory leak. > > Signed-off-by: Ye Bin > --- > fs/ext4/fast_commit.c | 14 ++++++++------ > 1 file changed, 8 insertions(+), 6 deletions(-) > > diff --git a/fs/ext4/fast_commit.c b/fs/ext4/fast_commit.c > index 9217a588afd1..cc8c8db075ba 100644 > --- a/fs/ext4/fast_commit.c > +++ b/fs/ext4/fast_commit.c > @@ -1677,15 +1677,17 @@ int ext4_fc_record_regions(struct super_block *sb, int ino, > if (replay && state->fc_regions_used != state->fc_regions_valid) > state->fc_regions_used = state->fc_regions_valid; > if (state->fc_regions_used == state->fc_regions_size) { > + struct ext4_fc_alloc_region *fc_regions; > + > state->fc_regions_size += > EXT4_FC_REPLAY_REALLOC_INCREMENT; > - state->fc_regions = krealloc( > - state->fc_regions, > - state->fc_regions_size * > - sizeof(struct ext4_fc_alloc_region), > - GFP_KERNEL); > - if (!state->fc_regions) > + fc_regions = krealloc(state->fc_regions, > + state->fc_regions_size * > + sizeof(struct ext4_fc_alloc_region), > + GFP_KERNEL); > + if (!fc_regions) Would it not be safer to restore state->fc_regions_size to its previous value in that case to keep consistency between size value and allocated size (or to update state->fc_regions_size only after allocation as it is done in second part of this patch) ? > return -ENOMEM; > + state->fc_regions = fc_regions; > } > region = &state->fc_regions[state->fc_regions_used++]; > region->ino = ino; Regards, Damien