From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751678AbdF1Sbs (ORCPT ); Wed, 28 Jun 2017 14:31:48 -0400 Received: from verein.lst.de ([213.95.11.211]:50909 "EHLO newverein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751505AbdF1Sbn (ORCPT ); Wed, 28 Jun 2017 14:31:43 -0400 Date: Wed, 28 Jun 2017 20:31:41 +0200 From: Christoph Hellwig To: Keith Busch Cc: wenxiong@linux.vnet.ibm.com, linux-kernel@vger.kernel.org, axboe@fb.com, bjking@linux.vnet.ibm.com, hch@lst.de Subject: Re: [PATCH] fs: System memory leak when running HTX with T10 DIF enabled Message-ID: <20170628183141.GA12722@lst.de> References: <1498667571-14275-1-git-send-email-wenxiong@linux.vnet.ibm.com> <20170628171031.GC2650@localhost.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170628171031.GC2650@localhost.localdomain> User-Agent: Mutt/1.5.17 (2007-11-01) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 28, 2017 at 01:10:31PM -0400, Keith Busch wrote: > On Wed, Jun 28, 2017 at 11:32:51AM -0500, wenxiong@linux.vnet.ibm.com wrote: > > diff --git a/fs/block_dev.c b/fs/block_dev.c > > index 519599d..e871444 100644 > > --- a/fs/block_dev.c > > +++ b/fs/block_dev.c > > @@ -264,6 +264,10 @@ static void blkdev_bio_end_io_simple(struct bio *bio) > > > > if (unlikely(bio.bi_error)) > > return bio.bi_error; > > + > > + if (bio_integrity(&bio)) > > + bio_integrity_free(&bio); > > + > > return ret; > > } > > We don't want to leak the integrity payload in case of bi_error either. And we should just call __bio_free. Which btw every user of bio_init probably needs.