Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3700288pxv; Mon, 28 Jun 2021 10:36:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJympaIGXHBfU17xJBiWT9BlQbIlgftq5DpP6SXii8jD8+fT1Ejd6Qn0Tu8iCULegEyljDC+ X-Received: by 2002:aa7:da02:: with SMTP id r2mr15483145eds.350.1624901784922; Mon, 28 Jun 2021 10:36:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624901784; cv=none; d=google.com; s=arc-20160816; b=KlfYxHuJ7ePoDneFDMS6CUhmZx+sF6Tb61wcohWCvBsDi2NtPbm6xGF3NWmf2jcRBT RsN2vCsE9RkdiofSkEWjdlgpqFYnGPSaaOIZFlyrIyoJLwJO6KiWqmfW694iECssI9BL 1FAQP8mOdRVn6pZRUQKIAOpPMPtMomp6vETqmV9R4hAZtPVdOsovimfaEtpb8MsGE1vD +ZSC/Rr+jqFe7kEqoqeHDAW8uP5PcdAjOohtEU76WYRI/PN4T2sJyRpQ2BpcMDLFgGGP BWzNvikqYScfWkNKWahobwL88aspSWDtrePoZRkmVd6Ixzs9qKFxmzmr7/s+7NZET8yQ a4LA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Guf6YPmaTsxt17EGNaEFY8b1DyFRBNOYwdEntuKn118=; b=Hyx1vq9CL/neStDl8NhZQC4T4L5cQgbL97oh+hl9a8OeK5lY7FHWfS+8T4RtS1rT4V aSjSCbSZh2WPK9F9Ou4cUb0pv8jBl2MdiGWzv4Iq91bviaCNXKgffNyHcHmLlIet6umP jD1sl3kmQfTBEgEZWjNyzyFtFM7u7FuCV51ZO5vSVE1ny+Mhv1Kxi9qFoSCK6jeDo/lh NvxxMagb9KciwjLb/2/vRsI9Ho1sfslnwqjzvwJARAQHXdT2+vHKLGwUtJEEbf+OiPG4 BrhRFYKODyHHZcwMPuuw8PDewvpOFry+1iIoZU6Nfrx9IoqmwLM9GV6EzneNj2LvW8hL /NzQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="DlO/lQeK"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d2si14286731ejl.35.2021.06.28.10.35.59; Mon, 28 Jun 2021 10:36:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="DlO/lQeK"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233987AbhF1O0o (ORCPT + 99 others); Mon, 28 Jun 2021 10:26:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:54378 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233201AbhF1OWC (ORCPT ); Mon, 28 Jun 2021 10:22:02 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A76A0619BF; Mon, 28 Jun 2021 14:19:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1624889967; bh=kWtUTq6WVWrZAk1658c581SNcx68NzBUN84oOZqbgZg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DlO/lQeKO5d09jCl0LL4s45iW8LTyuZywzWl59rPhki39QeQUelj6Y+9Bn+ciEQoN 1SET//uXm33kok83CeMuteQwo819OkKmCz8NiHESUvqW27EAHS6m7KOucopJCf7Dzp BAx8MSuUKnOs4ZA/M1CZtGDDEBfw79btJSl0uwXvB+vNonoef2oQ40LSKZy8aVRgHp PYmNutRL3JN19NUP0QiPgy4qgY4r5okXhXol6dD7XW42Xt9NDoXmz0I8Ofz4coE+GX 3Hur/Mv4oYxFKQKheHcdRsxxmHWro1JIQanYsXn75cJGuAaKLtVItd2sP7iuY4caoQ McpWPHm5LHrCQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Pavel Skripkin , Ryusuke Konishi , "Michael L . Semon" , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 5.12 068/110] nilfs2: fix memory leak in nilfs_sysfs_delete_device_group Date: Mon, 28 Jun 2021 10:17:46 -0400 Message-Id: <20210628141828.31757-69-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210628141828.31757-1-sashal@kernel.org> References: <20210628141828.31757-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.12.14-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.12.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.12.14-rc1 X-KernelTest-Deadline: 2021-06-30T14:18+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pavel Skripkin [ Upstream commit 8fd0c1b0647a6bda4067ee0cd61e8395954b6f28 ] My local syzbot instance hit memory leak in nilfs2. The problem was in missing kobject_put() in nilfs_sysfs_delete_device_group(). kobject_del() does not call kobject_cleanup() for passed kobject and it leads to leaking duped kobject name if kobject_put() was not called. Fail log: BUG: memory leak unreferenced object 0xffff8880596171e0 (size 8): comm "syz-executor379", pid 8381, jiffies 4294980258 (age 21.100s) hex dump (first 8 bytes): 6c 6f 6f 70 30 00 00 00 loop0... backtrace: kstrdup+0x36/0x70 mm/util.c:60 kstrdup_const+0x53/0x80 mm/util.c:83 kvasprintf_const+0x108/0x190 lib/kasprintf.c:48 kobject_set_name_vargs+0x56/0x150 lib/kobject.c:289 kobject_add_varg lib/kobject.c:384 [inline] kobject_init_and_add+0xc9/0x160 lib/kobject.c:473 nilfs_sysfs_create_device_group+0x150/0x800 fs/nilfs2/sysfs.c:999 init_nilfs+0xe26/0x12b0 fs/nilfs2/the_nilfs.c:637 Link: https://lkml.kernel.org/r/20210612140559.20022-1-paskripkin@gmail.com Fixes: da7141fb78db ("nilfs2: add /sys/fs/nilfs2/ group") Signed-off-by: Pavel Skripkin Acked-by: Ryusuke Konishi Cc: Michael L. Semon Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- fs/nilfs2/sysfs.c | 1 + 1 file changed, 1 insertion(+) diff --git a/fs/nilfs2/sysfs.c b/fs/nilfs2/sysfs.c index 303d71430bdd..9c6c0e2e5880 100644 --- a/fs/nilfs2/sysfs.c +++ b/fs/nilfs2/sysfs.c @@ -1053,6 +1053,7 @@ void nilfs_sysfs_delete_device_group(struct the_nilfs *nilfs) nilfs_sysfs_delete_superblock_group(nilfs); nilfs_sysfs_delete_segctor_group(nilfs); kobject_del(&nilfs->ns_dev_kobj); + kobject_put(&nilfs->ns_dev_kobj); kfree(nilfs->ns_dev_subgroups); } -- 2.30.2