lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1231266334.21895.25.camel@pc1117.cambridge.arm.com>
Date:	Tue, 06 Jan 2009 18:25:34 +0000
From:	Catalin Marinas <catalin.marinas@....com>
To:	Denis ChengRq <crquan@...il.com>
Cc:	Andrew Morton <akpm@...ux-foundation.org>,
	linux-kernel <linux-kernel@...r.kernel.org>
Subject: Minor kmemleak report via bdev_cache_init

Hi Denis,

With the commit c2acf7b908217 (fs/block_dev.c: __read_mostly improvement
and sb_is_blkdev_sb utilization), the bd_mnt is only local and kmemleak
reports the corresponding vfsmnt structure as unreferenced (together
with the duplicated name) since it can no longer track a valid pointer
to it:

unreferenced object 0xdf813848 (size 128):                                      
  comm "swapper", pid 0, jiffies 4294937384                                     
  backtrace:                                                                    
    [<c00872c0>] kmemleak_alloc+0x144/0x27c                                     
    [<c00848c8>] kmem_cache_alloc+0x108/0x13c                                   
    [<c009fc00>] alloc_vfsmnt+0x20/0x144                                        
    [<c008bc34>] vfs_kern_mount+0x30/0xac                                       
    [<c008bccc>] kern_mount_data+0x1c/0x20                                      
    [<c00104a8>] bdev_cache_init+0x54/0x90                                      
    [<c000fd7c>] vfs_caches_init+0xfc/0x128                                     
    [<c0008984>] start_kernel+0x1f8/0x254                                       
unreferenced object 0xdf8033d0 (size 32):                                       
  comm "swapper", pid 0, jiffies 4294937384                                     
  backtrace:                                                                    
    [<c00872c0>] kmemleak_alloc+0x144/0x27c                                     
    [<c0085e10>] __kmalloc_track_caller+0x15c/0x194                             
    [<c0071704>] kstrdup+0x3c/0x58                                              
    [<c009fc5c>] alloc_vfsmnt+0x7c/0x144                                        
    [<c008bc34>] vfs_kern_mount+0x30/0xac                                       
    [<c008bccc>] kern_mount_data+0x1c/0x20                                      
    [<c00104a8>] bdev_cache_init+0x54/0x90                                      
    [<c000fd7c>] vfs_caches_init+0xfc/0x128                                     
    [<c0008984>] start_kernel+0x1f8/0x254                                       

Can this object be freed (as below) or should I just tell kmemleak to
ignore it (or is it referenced and that's a kmemleak false positive)?


diff --git a/fs/block_dev.c b/fs/block_dev.c
index 349a26c..78e469c 100644
--- a/fs/block_dev.c
+++ b/fs/block_dev.c
@@ -344,6 +344,7 @@ void __init bdev_cache_init(void)
 	if (IS_ERR(bd_mnt))
 		panic("Cannot create bdev pseudo-fs");
 	blockdev_superblock = bd_mnt->mnt_sb;   /* For writeback */
+	free_vfsmnt(bd_mnt);
 }
 
 /*


Thanks.

-- 
Catalin

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ