From patchwork Fri Dec 22 02:50:23 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Zhihao Cheng X-Patchwork-Id: 1879497 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=J2iXOMGQ; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org; envelope-from=linux-mtd-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org; receiver=patchwork.ozlabs.org) Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4SxBh86Nl7z20R1 for ; Fri, 22 Dec 2023 13:53:42 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Date:Subject:CC :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=85X26wY1qyA0HStCfr6R9KjUnyYCm1wqiV7IS+wU9oI=; b=J2iXOMGQCqSR3p 5sBemhHdrk+9cKcPwUSZE4iOeRDTsMwwoQNy5PcuwJgRTeC6hCv3okA8Q0khrJa6AkP1Ipg9kdcYK g+uNTaHEtwlk9fWfskv466L0rbZgstG+gRRy5bEFFE/UaJWGqzOS5tf1GiEtGuOTRu8VDkKIz7wsA rndBMx4R0VqGY1tfvRVU6/9yuY3MggEi+P3mdpGdjFCNKrjGn/XxobsOXnPy5AKk7NGL7hwfA7bsz udFAVmasXVQUyIImyjWD6BXPJ5hH6MngtLQTssxMaaqC/NdQXvGrQfJP0y/oSbTH+u9Cp7pt7on2e gCwX7tj/k77vaVO40ixA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.96 #2 (Red Hat Linux)) id 1rGVeV-004hVG-0u; Fri, 22 Dec 2023 02:52:43 +0000 Received: from szxga02-in.huawei.com ([45.249.212.188]) by bombadil.infradead.org with esmtps (Exim 4.96 #2 (Red Hat Linux)) id 1rGVeS-004hT7-04 for linux-mtd@lists.infradead.org; Fri, 22 Dec 2023 02:52:41 +0000 Received: from mail.maildlp.com (unknown [172.19.163.48]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4SxBfJ05bBzWjy7; Fri, 22 Dec 2023 10:52:08 +0800 (CST) Received: from kwepemm000013.china.huawei.com (unknown [7.193.23.81]) by mail.maildlp.com (Postfix) with ESMTPS id 1AC861800B9; Fri, 22 Dec 2023 10:52:30 +0800 (CST) Received: from huawei.com (10.175.104.67) by kwepemm000013.china.huawei.com (7.193.23.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Fri, 22 Dec 2023 10:52:29 +0800 From: Zhihao Cheng To: , , , CC: Subject: [PATCH 0/2] ubifs: Fix two kmemleaks in error path Date: Fri, 22 Dec 2023 10:50:23 +0800 Message-ID: <20231222025025.2940450-1-chengzhihao1@huawei.com> X-Mailer: git-send-email 2.39.2 MIME-Version: 1.0 X-Originating-IP: [10.175.104.67] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To kwepemm000013.china.huawei.com (7.193.23.81) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20231221_185240_225247_63C99110 X-CRM114-Status: UNSURE ( 5.11 ) X-CRM114-Notice: Please train this message. X-Spam-Score: -2.3 (--) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: First memleak is found by mounting corrupted UBIFS image with chk_index enabled. Second memleak is found by powercut testing for encryption scenario. Zhihao Cheng (2): ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path Content analysis details: (-2.3 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 RCVD_IN_MSPIKE_H5 RBL: Excellent reputation (+5) [45.249.212.188 listed in wl.mailspike.net] -2.3 RCVD_IN_DNSWL_MED RBL: Sender listed at https://www.dnswl.org/, medium trust [45.249.212.188 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record 0.0 RCVD_IN_MSPIKE_WL Mailspike good senders X-BeenThere: linux-mtd@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Linux MTD discussion mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-mtd" Errors-To: linux-mtd-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org First memleak is found by mounting corrupted UBIFS image with chk_index enabled. Second memleak is found by powercut testing for encryption scenario. Zhihao Cheng (2): ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path fs/ubifs/dir.c | 3 +++ fs/ubifs/super.c | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-)