Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp4294727rwb; Tue, 20 Sep 2022 11:35:06 -0700 (PDT) X-Google-Smtp-Source: AMsMyM508cTqwiiJd+gSgGHrxUUzh1ibWKpONNU432Moli6IkuP1NUEQApTZ+G+sCEe37Sfzinb5 X-Received: by 2002:a62:fb18:0:b0:548:9dff:89da with SMTP id x24-20020a62fb18000000b005489dff89damr25351183pfm.23.1663698905695; Tue, 20 Sep 2022 11:35:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663698905; cv=none; d=google.com; s=arc-20160816; b=bzprZOsXgI1HvENMRhC73AvK7zV3S7pqlEqTUfC16hJ14XTq2IVlvHe8l/9LnFXH/o UJaHP27ch6oxELpNajLQMK9jQ/eBruOnQn65D5us57odEl1ubKG0UrGxmY8LZ94rxc2c 96uQ3Qf4VWJbSkA/qr54dc5yhscxV2VQYx+l1f5I5EUKNEVeZFRyZpOUEeah2Q+Ng9lk /x3pI2EmtOLAbkcly2QKVdh7F9lNNdxi+bPJawlqH1Ev9XawnZpseQL32oLda8SoGhBN lQu5nCIbZ1uRtdYhSTuCI7YXYcMtSGFv5vlpEhHp8Jw2pGvam2zJmFJjybhV+IgNtRD7 eE1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=N9/V5cxGiJAaqb8cXUgxOqB/C+ctD5aFKolhPC4udMY=; b=m/5BDf27pvVqey1lgA8YlMajx3oPjRRRW+K3+2PpUGKL1H7eQIVNGkT/uoNKxjxrR8 Of/R7d5pldSFTA7KVxBi4KKXbuurmryeqLqH7hqFHnBaCSLoJJ+RjQsPhxVPqhkNgsNs aFbTOoER8NYQWvO4/lShd6mbLoDJXJtkCp8rtsUczPZnwVVdt20iLqAJF25cjpWyEGxN LzYsSHirelJIct2JPPkw316sLBoseE8Tfwgs6h3YAXWa6ztR/ntxUGgk3p9VdQApzKBe jE3coI7dcqRA4vys/2UyWyU78zpkOSWz1BajZRTj0DZDyCQuGoQZZEYTzTKsCxoxangq odMw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y184-20020a638ac1000000b0041d12ad44f3si419104pgd.760.2022.09.20.11.34.38; Tue, 20 Sep 2022 11:35:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230049AbiITS0K (ORCPT + 99 others); Tue, 20 Sep 2022 14:26:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60470 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230255AbiITS0K (ORCPT ); Tue, 20 Sep 2022 14:26:10 -0400 Received: from smtp6-g21.free.fr (smtp6-g21.free.fr [IPv6:2a01:e0c:1:1599::15]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CE74D5E67D; Tue, 20 Sep 2022 11:26:06 -0700 (PDT) Received: from [192.168.103.121] (unknown [88.163.97.197]) by smtp6-g21.free.fr (Postfix) with ESMTPS id EAECD780333; Tue, 20 Sep 2022 20:25:59 +0200 (CEST) Message-ID: Date: Tue, 20 Sep 2022 20:25:59 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: [PATCH -next 1/2] ext4: fix potential memory leak in ext4_fc_record_regions() Content-Language: en-US To: yebin , tytso@mit.edu, adilger.kernel@dilger.ca, linux-ext4@vger.kernel.org Cc: linux-kernel@vger.kernel.org, jack@suse.cz References: <20220919144021.2162295-1-yebin10@huawei.com> <20220919144021.2162295-2-yebin10@huawei.com> <02fc228b-7cc5-b470-9b5c-8ad726b18158@partition-saving.com> <6329126D.8060704@huawei.com> From: Damien Guibouret In-Reply-To: <6329126D.8060704@huawei.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org Hello, Le 20/09/2022 à 03:07, yebin a écrit : > > > On 2022/9/20 2:40, Damien Guibouret wrote: >> Hello, >> >> Le 19/09/2022 à 16:40, Ye Bin a écrit : >>> As krealloc may return NULL, in this case 'state->fc_regions' may not be >>> freed by krealloc, but 'state->fc_regions' already set NULL. Then will >>> lead to 'state->fc_regions' memory leak. >>> >>> Signed-off-by: Ye Bin >>> --- >>>   fs/ext4/fast_commit.c | 14 ++++++++------ >>>   1 file changed, 8 insertions(+), 6 deletions(-) >>> >>> diff --git a/fs/ext4/fast_commit.c b/fs/ext4/fast_commit.c >>> index 9217a588afd1..cc8c8db075ba 100644 >>> --- a/fs/ext4/fast_commit.c >>> +++ b/fs/ext4/fast_commit.c >>> @@ -1677,15 +1677,17 @@ int ext4_fc_record_regions(struct super_block >>> *sb, int ino, >>>       if (replay && state->fc_regions_used != state->fc_regions_valid) >>>           state->fc_regions_used = state->fc_regions_valid; >>>       if (state->fc_regions_used == state->fc_regions_size) { >>> +        struct ext4_fc_alloc_region *fc_regions; >>> + >>>           state->fc_regions_size += >>>               EXT4_FC_REPLAY_REALLOC_INCREMENT; >>> -        state->fc_regions = krealloc( >>> -                    state->fc_regions, >>> -                    state->fc_regions_size * >>> -                    sizeof(struct ext4_fc_alloc_region), >>> -                    GFP_KERNEL); >>> -        if (!state->fc_regions) >>> +        fc_regions = krealloc(state->fc_regions, >>> +                      state->fc_regions_size * >>> +                      sizeof(struct ext4_fc_alloc_region), >>> +                      GFP_KERNEL); >>> +        if (!fc_regions) >> >> Would it not be safer to restore state->fc_regions_size to its >> previous value in that case to keep consistency between size value and >> allocated size (or to update state->fc_regions_size only after >> allocation as it is done in second part of this patch) ? >> > Actually, If   'ext4_fc_record_regions()' return -ENOMEM, then will stop > replay journal. > 'state->fc_regions_size' will not be used any more, so it's safe. There are at least two calls in ext4_ext_clear_bb (ext4/extents.c) that do not check for return code of ext4_fc_record_regions. But perhaps these are these calls that should be fixed. >>>               return -ENOMEM; >>> +        state->fc_regions = fc_regions; >>>       } >>>       region = &state->fc_regions[state->fc_regions_used++]; >>>       region->ino = ino; >> Regards, Damien