Message ID | 20211018221559.ulag88CbY%akpm@linux-foundation.org (mailing list archive) |
---|---|
State | New |
Headers | show
Return-Path: <SRS0=mZRB=PG=kvack.org=owner-linux-mm@kernel.org> X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C4A88C4332F for <linux-mm@archiver.kernel.org>; Mon, 18 Oct 2021 22:16:02 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 783E16113D for <linux-mm@archiver.kernel.org>; Mon, 18 Oct 2021 22:16:02 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 783E16113D Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linux-foundation.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kvack.org Received: by kanga.kvack.org (Postfix) id 18DE894000E; Mon, 18 Oct 2021 18:16:02 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 116BF940007; Mon, 18 Oct 2021 18:16:02 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id F20E994000E; Mon, 18 Oct 2021 18:16:01 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0176.hostedemail.com [216.40.44.176]) by kanga.kvack.org (Postfix) with ESMTP id E2348940007 for <linux-mm@kvack.org>; Mon, 18 Oct 2021 18:16:01 -0400 (EDT) Received: from smtpin40.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id 9FEB62DECC for <linux-mm@kvack.org>; Mon, 18 Oct 2021 22:16:01 +0000 (UTC) X-FDA: 78710966922.40.9900B15 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf13.hostedemail.com (Postfix) with ESMTP id 4BEBD103EE94 for <linux-mm@kvack.org>; Mon, 18 Oct 2021 22:15:58 +0000 (UTC) Received: by mail.kernel.org (Postfix) with ESMTPSA id CF0AC610FB; Mon, 18 Oct 2021 22:15:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1634595360; bh=hNMtuF4oGaw8xVzQviaGPI9CVESM1tAI/kQadZH8Dcc=; h=Date:From:To:Subject:In-Reply-To:From; b=cNZK2mDidHhQe2r1tNf+UflS+bwhPI1cGf56EPv4sFTsBUIgELnrmQIGnEslg96hM afgdAuOyPkFago3G9v1CxMsGndA5a/4+v0xD+XD405kyAm4ut8WjXS/N3PnbCL1/qF om15o20GwWEsQPznCUjtqCbp5xry8JS34t3kjYj4= Date: Mon, 18 Oct 2021 15:15:59 -0700 From: Andrew Morton <akpm@linux-foundation.org> To: akpm@linux-foundation.org, andreyknvl@gmail.com, bharata@linux.ibm.com, cl@linux.com, faiyazm@codeaurora.org, gregkh@linuxfoundation.org, guro@fb.com, iamjoonsoo.kim@lge.com, keescook@chromium.org, linmiaohe@huawei.com, linux-mm@kvack.org, mm-commits@vger.kernel.org, penberg@kernel.org, rientjes@google.com, ryabinin.a.a@gmail.com, stable@vger.kernel.org, torvalds@linux-foundation.org, vbabka@suse.cz Subject: [patch 12/19] mm, slub: fix potential memoryleak in kmem_cache_open() Message-ID: <20211018221559.ulag88CbY%akpm@linux-foundation.org> In-Reply-To: <20211018151438.f2246e2656c041b6753a8bdd@linux-foundation.org> User-Agent: s-nail v14.8.16 X-Stat-Signature: 17sz7c6sqwkr71z37mut96h5cs6zom77 Authentication-Results: imf13.hostedemail.com; dkim=pass header.d=linux-foundation.org header.s=korg header.b=cNZK2mDi; spf=pass (imf13.hostedemail.com: domain of akpm@linux-foundation.org designates 198.145.29.99 as permitted sender) smtp.mailfrom=akpm@linux-foundation.org; dmarc=none X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 4BEBD103EE94 X-HE-Tag: 1634595358-255891 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: <linux-mm.kvack.org> |
Series |
[01/19] mm/userfaultfd: selftests: fix memory corruption with thp enabled
|
expand
|
--- a/mm/slub.c~mm-slub-fix-potential-memoryleak-in-kmem_cache_open +++ a/mm/slub.c @@ -4210,8 +4210,8 @@ static int kmem_cache_open(struct kmem_c if (alloc_kmem_cache_cpus(s)) return 0; - free_kmem_cache_nodes(s); error: + __kmem_cache_release(s); return -EINVAL; }